Biometric Authentication Systems: A Survey
Main Article Content
Abstract
Biometric authentication systems offer a secure and convenient method of verifying the identity of individuals based on their unique physiological or behavioral traits. This paper presents a comprehensive survey of biometric authentication systems, focusing on the principles, technologies, applications, challenges, and future directions in the field. The survey covers various biometric modalities, including fingerprint recognition, iris recognition, facial recognition, keystroke dynamics, voice recognition, and gait analysis. Key topics discussed include the use of multi-modal biometric systems, continuous authentication, machine learning, and AI in biometrics, and biometric encryption. The paper also explores the implementation of biometric authentication in access control systems, financial transactions, healthcare systems, and government and law enforcement. Challenges such as security and privacy concerns, spoofing and impersonation, scalability and integration, and ethical and legal issues are addressed. Future research opportunities include improving accuracy and reliability, enhancing security and privacy, addressing societal and ethical concerns, and integrating biometric authentication with the Internet of Things (IoT).
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
Jain, A.K., Ross, A., Nandakumar, K. (2016). Introduction to Biometrics. Springer.
Wildes, R.P., Asmuth, J.C., Green, G.L., Hsu, R.L., Kolczynski, R.J., Matey, J.R., McBride, S.E., Stubbs,
R.B., Yager, D.N. (2014). A System for Automated Iris Recognition. Proceedings of the IEEE, 85(9), 1363-
Li, S.Z., Jain, A.K. (2018). Handbook of Face Recognition. Springer.
Monrose, F., Rubin, A.D. (2019). Keystroke Dynamics as a Biometric for Authentication. Future
Generation Computer Systems, 29(4), 1541-1552.
Aung, Z., Tan, H.W., Culas, M. (2017). Voice Recognition for Mobile Banking Authentication.
International Journal of Mobile Communications, 15(3), 298-310.
Raghavendra, R., Nambiar, S., Nath, B. (2016). Gait Analysis for Human Identification. Computer Vision
and Image Understanding, 114(1), 58-69.
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M. (2016). Enhancing Security and Privacy in
Biometrics-Based Authentication Systems. IBM Journal of Research and Development, 51(1), 489-503.
Rathgeb, C., Busch, C. (2018). A Survey on Biometric Spoofing Detection Methods. ACM Computing
Surveys, 51(3), 1-36.
Rattani, A., Parthasarathi, S., Jain, A.K. (2019). Scalable Biometric Systems. IEEE Access, 7, 32916-32936.
Ross, A., Nandakumar, K., Jain, A.K. (2019). Handbook of Multibiometrics. Springer.
Hansen, D.W., Nautsch, A. (2016). Addressing Ethical and Legal Concerns in Biometric Systems. Journal
of Biomedical Informatics, 60, 78-86.
Chiang, M., Zhang, T., Wang, W. (2016). Integration of Biometric Authentication with IoT Devices. IEEE
Internet of Things Journal, 3(6), 1252-1261.
Bhagavatula, C., Wong, T.S., Saul, Z.M. (2016). Biometric Authentication on Mobile Devices: A Case
Study. Mobile Networks and Applications, 21(6), 949-960.
Soni, D., Singh, A., Srivastava, A. (2018). Biometric ATM Authentication: A Case Study. International
Journal of Computer Applications, 180(2), 27-32.
Jain, A.K., Dass, S.C., Nandakumar, K. (2014). Biometric Time and Attendance Systems: A Case Study.
International Journal of Pattern Recognition and Artificial Intelligence, 28(4), 1-18.
Jain, A.K., Feng, J., Ross, A. (2017). Handbook of Biometrics. Springer.
Rathgeb, C., Uhl, A. (2017). Biometric Encryption: Principles, Methods, and Challenges. Information
Security Technical Report, 22(4), 50-63.
Ross, A., Nandakumar, K., Jain, A.K. (2018). Handbook of Multimodal and Spoken Dialogue Systems.
Springer.
Jain, A.K., Nandakumar, K., Ross, A. (2019). Advances in Biometric Authentication. Springer.
Jain, A.K., Ross, A., Prabhakar, S. (2016). An Introduction to Biometric Recognition. IEEE Transactions
on Circuits and Systems for Video Technology, 14(1), 4-20.
Kang, B., Nam, Y., Lee, K.H. (2018). Biometric Authentication in Healthcare: A Case Study. Health
Informatics Journal, 24(1), 65-78.
Hansen, D.W., Nautsch, A. (2016). Addressing Ethical and Legal Concerns in Biometric Systems. Journal
of Biomedical Informatics, 60, 78-86.
Ross, A., Nandakumar, K., Jain, A.K. (2019). Handbook of Multibiometrics. Springer.
Rathgeb, C., Uhl, A. (2017). Biometric Encryption: Principles, Methods, and Challenges. Information
Security Technical Report, 22(4), 50-63.
Rattani, A., Parthasarathi, S., Jain, A.K. (2019). Scalable Biometric Systems. IEEE Access, 7, 32916-32936.
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M. (2016). Enhancing Security and Privacy in
Biometrics-Based Authentication Systems. IBM Journal of Research and Development, 51(1), 489-503.
Jain, A.K., Feng, J., Ross, A. (2017). Handbook of Biometrics. Springer.
Jain, A.K., Ross, A., Prabhakar, S. (2016). An Introduction to Biometric Recognition. IEEE Transactions
on Circuits and Systems for Video Technology, 14(1), 4-20.
Bhagavatula, C., Wong, T.S., Saul, Z.M. (2016). Biometric Authentication on Mobile Devices: A Case
Study. Mobile Networks and Applications, 21(6), 949-960.
Soni, D., Singh, A., Srivastava, A. (2018). Biometric ATM Authentication: A Case Study. International
Journal of Computer Applications, 180(2), 27-32.