Which of the following biometric authentication systems is considered to be the most secure?

What Is Federated Identity?

Derrick Rountree, in Federated Identity Primer, 2013

2.2.1.1.2 Biometrics

Biometric authentication involves using some part of your physical makeup to authenticate you. This could be a fingerprint, an iris scan, a retina scan, or some other physical characteristic. A single characteristic or multiple characteristics could be used. It all depends on the infrastructure and the level of security desired. With biometric authentication, the physical characteristic being examined is usually mapped to a username. This username is used to make decisions after the person has been authenticated. In some cases, the user must enter the username when attempting to authenticate; in others, a lookup is done on the biometric sample in order to determine the username.

Biometric authentication is performed by doing a comparison of the physical aspect you present for authentication against a copy that has been stored. For example, you would place your finger on a fingerprint reader for comparison against the stored sample. If your fingerprint matches the stored sample, then the authentication is considered to be successful.

In order to set up biometric authentication the appropriate infrastructure must be in place. Once the infrastructure is set up we register users. Some products allow users to register directly while others require a registration agent to perform the registration for the user. Let’s take the example of fingerprint-based authentication. During the registration process, the system will ask the user to submit a sample, in actual fact it will create multiple samples. The user places their finger on the fingerprint reader. The system will record images of the user’s fingerprint. The system will use the multiple images to determine a point pattern to identify the user’s fingerprint. These points are basically dots placed on different areas of the fingerprint. These dots are used to denote the pattern made by the fingerprint. Once a sufficient number of samples have been taken to form a consistent point pattern, the pattern is stored and used as the basis for later comparison during authentication.

Biometric authentication is a fairly solid method of authentication and is in use by many organizations today but, it is not without its issues or drawbacks. One of the problems with biometric authentication is that it usually requires special hardware such as a fingerprint reader, retina scanner, and so on. The hardware has to be installed and configured on each system (or endpoint) that will be used for login. This limits the overall usability of the solution. You can’t just walk up to any system and expect to use it to authenticate. It can be especially problematic when you are external to your organization (i.e., working remotely or on the road), as you need a system that has the necessary hardware installed and configured per the corporate policy. In addition, cost can also be an issue with biometrics. The specialized hardware required for biometric authentication can be expensive and has to be purchased for all authentication endpoints. Therefore, the initial investment required for a biometric solution can be quite sizeable.

A second potential concern with biometrics is security. Part of setting up a biometric solution includes configuring the sensitivity level for the sample. The sensitivity level determines how close a match you need for authentication to be successful. Configuring the sensitivity level can be somewhat tricky. If it’s set too low, one recorded sample could potentially match multiple physical samples. If it’s set too high, you could block access to someone who is legitimately authorized to access the system.

There have also been cases where people have been able to break biometric authentication. The main issue here is that in many cases, biometric authentication relies only on the image presented during authentication, so it can be tricked by a forged image (we see plenty of examples of this in modern-day spy films). In order to combat this, some biometric manufacturers have been adding other requirements to their biometric authentication solution. For example, a fingerprint reader may also check the temperature of the finger used to supply the fingerprint. If the temperature is not within a normal range for the human body, the system assumes the fingerprint is being supplied by some bogus method and the authentication fails.

For these reasons, we do not see a lot of Internet-based applications using biometric authentication. We see it more in corporate settings and, many times, it’s used just for certain applications or under special circumstances.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124071896000029

Retina biometrics for personal authentication

R. Manjula Devi, ... K. Devendran, in Machine Learning for Biometrics, 2022

Abstract

Biometric authentication is the process of authenticating the each and every individual identification based on biometric measures. Retina biometric has been regarded as secure approach among all the biometric measures available as it offers a unique stencil for each individual and also it does not alter during the person’s life. In this work, an efficient biometric retina identification using ANFIS-based Retina Biometric Authentication System (ARBAS) for person’s authentication has been suggested and proved it on a real-time dataset named as VARIA database that contains samples of retinal images collected from various people at distinct occasion of time. The authentication process using retina undergoes two phases: Enrollment Phase and Authentication Phase. In Enrollment Phase, the retina of the various people has been scanned; the biometric pattern has been derived based on the retina’s extracted feature and stored the template in the database for future use. In the Authentication Phase, the person’s retina has been scanned; the biometric pattern has been extracted from it and correlated the extracted pattern with the pattern stored in the database. If the pattern is matched, then the user is authenticated as an authorized user. ARBAS achieves FRR and the FAR with the percentage of 2.78% and 2.94%, respectively, on the VARIA database.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780323852098000055

Microsoft Vista: Securing User Access

In Microsoft Vista for IT Security Professionals, 2007

Biometrics Authentication

Biometrics authentication devices rely on physical characteristics such as a fingerprint, facial patterns, or iris or retinal patterns to verify user identity. Biometrics authentication is becoming popular for many purposes, including network logon. A biometrics template or identifier (a sample known to be from the authorized user) must be stored in a database for the device to compare to a new sample given during the logon process. Biometrics are often used in conjunction with smart cards in high-security environments. The most popular types of biometrics devices are the following:

Fingerprint scanners These are widely available for both desktop and portable computers from a variety of vendors, connecting via a USB or Personal Computer Memory Card International Association (PCMCIA, or PC Card) interface.

Facial pattern recognition devices These devices use facial geometry analysis to verify identity.

Hand geometry recognition devices These are similar to facial pattern devices but analyze hand geometry.

Iris scan identification devices Iris scanners analyze the trabecular meshwork tissue in the iris, which is permanently formed during the eighth month of human gestation.

Retinal scan identification devices Retina scanners analyze the patterns of blood vessels on the retina.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491396500078

Biometric Authentication for SCADA Security

Jack Wiles, in Techno Security's Guide to Securing SCADA, 2008

Summary

Biometric authentication regimes can solve important problems within your company's SCADA security system, but they are not helpful in all situations, and they present the system administrator with unique issues and risks. In a SCADA security network, biometric components are useful only at the edges of the network where people interact with the SCADA security and where secure facilities and equipment need authorized access. The variety of biometric readings, both invasive and remote, demonstrates that biometric security can meet a wide array of priorities within your overall security program.

However, each biometric authentication capture device provides its own set of choices, such as whether it is more important to your company to allow ready access in an emergency or whether it is more important take extreme steps to exclude any unauthorized people from accessing secure facilities. These devices are not foolproof and can be beaten at a number of different points of vulnerability, including tricking the scanners or reworking the system software. Storage and protection of biometric samples can also be hazardous. Finally, biometric systems are not yet so widespread that the law and regulations for biometric capture can be expected to remain constant over the several years of your company's investment in these systems.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492829000087

A secure biometric authentication system for smart environment using reversible data hiding through encryption scheme

V.M. Manikandan, in Machine Learning for Biometrics, 2022

Abstract

Biometric authentication is used in its fullest potential in all smart environments. Face recognition and fingerprint recognition are the two most popular approaches for biometric authentication. In some places, where a higher level of security is required can be equipped with the combination of face recognition and fingerprint recognition. In general, from the client side, the biometric data will be collected using a camera and fingerprint scanner, and that information will be transmitted to a cloud service provider to do the complex tasks, such as face recognition and fingerprint recognition. In such situations, the transmission of face images and fingerprints from the client side to a server is a major concern since an intruder may try to grab that information, and later, they can use that information to control the authentication system. In this chapter, we discuss a secure mechanism to send the face images and the fingerprints with the aid of a reversible data hiding (RDH) through the encryption scheme. RDH is a process of hiding some data by using a concealing medium in such a way that later the extraction of the hidden message is possible along with the recovery of the original images. In a RDH through encryption scheme, the RDH process and the image encryption process will be combined into a single task to hide the secret message in an image. In this chapter, we propose a new model in which the compressed fingerprint data as a secret message will be embedded into the face image through a reversible data hiding through the encryption scheme. The encrypted image obtained after RDH through encryption will be transmitted to the cloud service provider for further processing.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978032385209800002X

Passwords, Vulnerabilities, and Exploits

Littlejohn Shinder, Michael Cross, in Scene of the Cybercrime (Second Edition), 2008

Biometric Authentication

Biometric authentication devices rely on physical characteristics such as a fingerprint, facial patterns, or iris or retinal patterns to verify user identity. Biometric authentication is becoming popular for many purposes, including network logon. A biometric template or identifier (a sample known to be from the authorized user) must be stored in a database for the device to compare to a new sample given during the logon process. Biometrics is often used in conjunction with smart cards in high-security environments. The most popular types of biometric devices are the following:

Fingerprint scanners These are widely available for both desktop and portable computers from a variety of vendors, connecting via a Universal Serial Bus (USB) or PCMCIA (PC Card) interface.

Facial pattern recognition devices These devices use facial geometry analysis to verify identity.

Hand geometry recognition devices These are similar to facial pattern devices but analyze hand geometry.

Iris scan identification devices Iris scanners analyze the trabecular meshwork tissue in the iris, which is permanently formed during the eighth month of human gestation.

Retinal scan identification devices Retina scanners analyze the patterns of blood vessels on the retina.

A large number of physiological characteristics can be used as identifiers, and devices have been developed that verify identity based on knee scans, ear geometry, vein pattern recognition, and even body odor recognition. In addition, some devices analyze and compare behavioral traits using methods such as voice pattern recognition, signature verification, keystroke pattern recognition, breathing pattern recognition, gait pattern recognition, and even brainwave pattern recognition, although many of these are only in experimental stages. Biometrics is considered to be among the most reliable authentication methods possible.

On the Scene

Defeating “Foolproof” Authentication Mechanisms

In 2000, a French engineer/hacker named Serge Humpich (and known as “the Count of Monte Crypto”) was able to defeat the 640-bit encryption key used by smart cards issued by banks in France, which millions of French consumers used for purchasing items. The equipment he used to break the encryption key cost only $250.

Even supposedly “foolproof” biometric methods aren't foolproof. This is because the biometric data must be analyzed by a software program, and everyone who has worked with computers knows that there is no such thing as a software program that works perfectly. Thus, the vendors of biometric solutions establish fault-tolerance limits that are based on a certain level of false rejection and false acceptance rates (called FRRs and FARs, respectively). False rejection occurs when an authorized user is rejected by the system, and false acceptance occurs when an unauthorized user is “passed” by the software and is allowed access. In fact, fingerprint scanners have been defeated by such simple methods as blowing on the sensor surface to reactivate a fingerprint previously left there or by dusting a latent fingerprint on the sensor with graphite and then applying adhesive film to the surface and pressing on it gently. These techniques are examples of latent image reactivation. In a well-publicized case in May 2002, a cryptographer in Japan was able to create a phony fingerprint using gelatin, which he claimed fooled fingerprint scanners approximately 80 out of 100 times.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978159749276800011X

Contemporary survey on effectiveness of machine and deep learning techniques for cyber security

P. Suresh, ... H. Muthukrishnan, in Machine Learning for Biometrics, 2022

2.7 DNA biometrics system

Fig. 6 illustrates the DNA matching process. The most reliable way of biometric authentication is to use a person’s DNA code. It’s based on the human deoxyribonucleic acid chain’s special series. The procedure starts with the preparation of a DNA sample like buccal smear, saliva, sperm, blood, and other tissues. The sample is analyzed, a profile of DNA is established, and their identities are verified by comparing them with another sample. Since everyone’s DNA is different, it’s difficult to mimic this trait. Each person’s DNA carries a genetic trait inherited by his/her parents. This DNA is duplicated in every cell of the human body. The amount of variable number tandem repeat (VNTR) that repeats at a number of distinct samples can be calculated by DNA profiling. The DNA profile of a person is made up of quantities of VNTR. The system requires time as it has more complex steps to collect DNA from each individual. To begin, it must collect DNA from a physical sample given by each person. The samples must then be broken down into tiny fragments containing VNTR. Following that, each DNA fragment’s size is calculated and arranged before being matched with other samples [28].

Which of the following biometric authentication systems is considered to be the most secure?

Fig. 6. DNA matching.

DNA biometric system is highly unique, the chances of more than one people having the similar DNA profile are very unlikely, and the technology is still relatively new and is seldom used in public. It necessitates the use of a lot of costly devices for the purpose of effectively breaking down DNA and analyzing the specific features of DNA in order to build a DNA profile. To collect users’ DNA data, the system may also require physical samples (hair, blood, etc.) from them. Another element that contributes to the system’s underutilization is time. To complete all of the processes of building and checking each person’s DNA profile, the system takes a considerable amount of time. Unlike other biometric systems, it is not as widely used due to these drawbacks and barriers. In future, this unique and improved biometric technology will be used in everyday lives [29].

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780323852098000079

Embedded Systems Analysis

Ronald van der Knijff, in Handbook of Digital Forensics and Investigation, 2010

Don't Cause Security Barriers

Volatile data can contain information relating to security barriers previously passed by the user. Think of password entry, biometric authentication, or encrypted partitions. As long as the device is switched on, the security system usually does not influence the extraction of data, but after it is switched off the access procedure must be reenacted.

For GSM and UMTS phones, for example, a PIN code or a PUK code might be needed to access the chip card inside the phone when the phone is switched on, as discussed in the procedural portion of the section on data collection later in this chapter.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123742674000082

Securing the digital witness identity using blockchain and zero-knowledge proofs

Lynton Lourinho, ... Hamid Jahankhani, in Strategy, Leadership, and AI in the Cyber Ecosystem, 2021

1.3 Enrolment mechanisms

Biometrics are physical security mechanisms which deny any unauthorised access via authentication. This security process is referred to as biometric authentication and is reliant on individuals’ unique biological characteristics to identify the individual correctly. These traits can be used instead of passwords to verify and identify individuals as they are bound to the individual. Retina, iris, facial, fingerprint, or palm prints are all unique, but Garcia (2018) states that to preserve privacy, biometrics should never be stored in a public distributed ledger as it's accessible to anyone whether it's in an encrypted or template state. The reason for this is that there are no guarantees that the system will remain safe in future due to advances in quantum computing.

An important part of the process is the method used to compare the information presented versus the information on record as most common used methods still use signature and photo comparisons to perform most transactions. These methods are unreliable, more so when the person who is making the comparison doesn’t know the individual.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128214428000100

Big Data Analytics

Neeti Pokhriyal, ... Venu Govindaraju, in Handbook of Statistics, 2015

6 Discussions

This is also a study of biometrics in big data, i.e., when we have unprecedented amount of data available for biometric authentication and verification tasks. Big data implies that we not only need to address the challenges in volume, but also in the variety and uncertainty of the data. Our study deals with millions of blogs written by tens of thousands of authors. Here are some of our learnings while working with such data:

1.

We need to develop methods that are computationally inexpensive and scales well with the increasing data. We use a random sample of genuine and impostor data points, as the actual number of data points become prohibitively large to store and analyze,

2.

Since the inception of the biometric system, developers need to carefully choose programming environments and software tools appropriate for handling big data. Given that this analysis requires computing distance between every pair of blogs, the complexity of this authorship attribution is O(N2) in the number of blogs. To address this challenge, we used efficient data structures (such as associative maps in Java and Python) and scalable procedures involving large matrices.

3.

To reduce the uncertainty in the data, we constrained the dataset, by taking only the blogs which are personal stories written by an identifiable author.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780444634924000034

Is biometric authentication secure?

Despite its risks—all technologies come with risks—biometric authentication is still widely considered by experts to be one of the most accurate and secure methods of authenticating user identity because of its high level of accuracy.

What are biometric authentication systems?

Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they are who they say they are. Biometric authentication systems compare physical or behavioral traits to stored, confirmed, authentic data in a database.

Which of the following is an example of a biometric authentication?

Examples of biometric traits include fingerprint, face, iris, palmprint, retina, hand geometry, voice, signature and gait.

What is the most common form of authentication today?

Passwords are the most common methods of authentication. Passwords can be in the form of a string of letters, numbers, or special characters.