Biometrics: A tool for information security

被引:548
|
作者
Jain, Anil K. [1 ]
Ross, Arun
Pankanti, Sharath
机构
[1] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[2] W Virginia Univ, Dept Comp Sci & Elect Engn, Morgantown, WV 26506 USA
[3] IBM Corp, Thomas J Watson Res Ctr, Exploratory Comp Vis Grp, Yorktown Hts, NY 10598 USA
关键词
biometrics; cryptosystems; digital rights management; grand challenge; information security; multibiometrics;
D O I
10.1109/TIFS.2006.873653
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Establishing identity is becoming critical in our vastly interconnected society. Questions such as "Is she really who she claims to be?," "Is this person authorized to use this facility?" or "Is he in the watchlist posted by the government?" are routinely being posed in a variety of scenarios ranging from issuing a driver's license to gaining entry into a country. The need for reliable user authentication techniques has increased in the wake of heightened concerns about security and rapid advancements in networking, communication, and mobility. Biometrics, described as the science of recognizing an individual based on his or her physical or behavioral traits, is beginning to gain acceptance as a legitimate method for determining an individual's identity. Biometric systems have now been deployed in various commercial, civilian, and forensic applications as a means of establishing identity. In this paper, we provide an overview of biometrics and discuss some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security. The primary contribution of this overview includes: 1) examining applications where biometrics can solve issues pertaining to information security; 2) enumerating the fundamental challenges encountered by biometric systems in real-world applications; and 3) discussing solutions to address the problems of scalability and security in large-scale authentication systems.
引用
收藏
页码:125 / 143
页数:19
相关论文
共 50 条
  • [31] An Effective Machine-Vision System for Information Security and Privacy using Iris Biometrics
    Sonkamble, Sulochana
    Thool, Ravindra
    Sonkamble, Balwant
    [J]. WMSCI 2008: 12TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS, 2008, : 209 - +
  • [32] Network Security Risk Level Estimation Tool for Information Security Measure
    Singh, Umesh Kumar
    Joshi, Chanchala
    [J]. 2016 IEEE 7TH POWER INDIA INTERNATIONAL CONFERENCE (PIICON), 2016,
  • [33] Information Lifecycle Security Risk Assessment: A tool for closing security gaps
    Bernard, Ray
    [J]. COMPUTERS & SECURITY, 2007, 26 (01) : 26 - 30
  • [34] Computational biometrics, multimedia analysis, and security
    Yu, H
    [J]. IEEE MULTIMEDIA, 2003, 10 (02) : COVER2 - +
  • [35] Security Role of Biometrics in Electronic Transactions
    Tyagi, Anshuman
    Singh, Piyush Bhushan
    Yadav, Vikash Singh
    Singh, Sangharsh Kumar
    Tiwari, Amod
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 625 - 627
  • [36] SECURITY OF BIOMETRICS USING MULTIMODAL APPROACH
    Ahmed, AbdulHaseeb
    Malik, Hafiz
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 130 - 135
  • [37] Evaluating and selecting the biometrics in network security
    Liu, Che-Hung
    Wang, Jen-Sheng
    Peng, Chih-Chiang
    Shyu, Joseph Z.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) : 727 - 739
  • [38] Mobile phones security using biometrics
    Shabeer, H. Abdul
    Suganthi, P.
    [J]. ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 270 - +
  • [39] Upgrading security and protection in ear biometrics
    Sinha, Harsh
    Ajmera, Pawan K.
    [J]. IET BIOMETRICS, 2019, 8 (04) : 259 - 266
  • [40] Security concerns drive biometrics into the mainstream
    Kincade, K
    [J]. LASER FOCUS WORLD, 2004, 40 (02): : 96 - +