A Study on Biometric Authentication Systems, Privacy Concerns and Mitigation Strategies

Authors

  • Tejas B. Sawant  Department of MCA, Finolex Academy of Management and Technology, Ratnagiri, Maharashtra, India
  • Waman R. Parulekar  Department of MCA, Finolex Academy of Management and Technology, Ratnagiri, Maharashtra, India
  • Tejas V. Joshi  Department of MCA, Finolex Academy of Management and Technology, Ratnagiri, Maharashtra, India

DOI:

https://doi.org/10.32628/IJSRST52310413

Keywords:

Biometric Authentication, Fingerprints, Voice Recognition, Iris Patterns, Technology

Abstract

Biometric authentication systems have gained significant attention in recent years as a secure and convenient means of verifying an individual's identity. These systems utilize unique biological and behavioural characteristics, such as fingerprints, facial features, iris patterns, and voice recognition, to authenticate users. While biometric authentication offers several advantages over traditional authentication methods, it also raises concerns regarding privacy and data security. This study aims to explore the landscape of biometric authentication systems, identify privacy concerns associated with their implementation, and propose effective mitigation strategies.

References

  1. K. Dharavath, F. A. Talukdar and R. H. Laskar, "Study on biometric authentication systems, challenges and future trends: A review," 2013 IEEE International Conference on Computational Intelligence and Computing Research, Enathi, India, 2013, pp. 1-7
  2. Malathi R., Jeberson Retna Raj R., “An Integrated Approach of Physical Biometric Authentication System”, 2016, vol. 85
  3. Zdenˇek Ríha, Václav Matyáš, “Biometric Authentication Systems”, Nov 2000
  4. Antonelli, A., Cappelli, R., Maio, D. & Maltoni, D., 2006. Fake finger detection by skin distortion analysis. IEEE Transactions on Information Forensics and Security, 1(3) p. 360-373.
  5. "Harmonized Biometric Vocabulary," ISO/IEC JTC1 SC37, standing document 2, version 8, 2007. Available online accessed 3 June, 2008.
  6. Ekpezu, Akon O. et al. “Biometric Authentication Schemes and Methods on Mobile Devices.” (2020).
  7. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer-Verlag, 2003.

Downloads

Published

2023-08-30

Issue

Section

Research Articles

How to Cite

[1]
Tejas B. Sawant, Waman R. Parulekar, Tejas V. Joshi "A Study on Biometric Authentication Systems, Privacy Concerns and Mitigation Strategies" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 10, Issue 4, pp.199-205, July-August-2023. Available at doi : https://doi.org/10.32628/IJSRST52310413