Physiological Biometric Authentication Systems Advantages Disadvantages And Future Development A Review

With the fast increasing of the electronic crimes and their related issues, deploying a reliable user authentication system became a significant task for both of access control and securing user’s private data. Human biometric characteristics such as face, finger, iris scanning ,voice, signature and other features provide a dependable security level for both of the personal and the public use. Many biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master role in degrading imposters’ attacks. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper aims to briefly address the psychological biometric authentication techniques. Also a brief summary to the advantages, disadvantages and future developments of each method is provided in this paper.

[1]  S. Liu,et al.  A practical guide to biometric security technology , 2001 .

[2]  Marcos Faúndez-Zanuy,et al.  Biometric security technology , 2006, IEEE Aerospace and Electronic Systems Magazine.

[3]  Naser Zaeri,et al.  Minutiae-based Fingerprint Extraction and Recognition , 2011 .

[4]  Ram B. Joshi,et al.  Highly Secure Authentication Scheme , 2015, 2015 International Conference on Computing Communication Control and Automation.

[5]  Svetlana N. Yanushkevich,et al.  Synthetic Biometrics: A Survey , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[6]  Alexander Eng,et al.  Look into My Eyes: A Survey of Biometric Security , 2013, 2013 10th International Conference on Information Technology: New Generations.

[7]  H.V. Poor,et al.  Privacy-security tradeoffs in biometric security systems , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[8]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Keerti Arse A Survey of Automated Biometric Authentication Techniques , 2014 .

[10]  Steven Furnell,et al.  Surveying the Development of Biometric User Authentication on Mobile Phones , 2015, IEEE Communications Surveys & Tutorials.

[11]  M. Grgic,et al.  A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[12]  Shambhu J. Upadhyaya,et al.  Continuous Authentication Using Behavioral Biometrics , 2017, IWSPA@CODASPY.

[13]  Gunjan Pahuja,et al.  Biometric authentication & identification through behavioral biometrics: A survey , 2015, 2015 International Conference on Cognitive Computing and Information Processing(CCIP).

[14]  Stark C. Draper,et al.  A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems , 2011, IEEE Transactions on Information Forensics and Security.

[15]  Rabul Hussain Laskar,et al.  Study on biometric authentication systems, challenges and future trends: A review , 2013 .

[16]  Qinghan Xiao,et al.  Technology review - Biometrics-Technology, Application, Challenge, and Computational Intelligence Solutions , 2007, IEEE Computational Intelligence Magazine.