The Future Risk of Biometric Data Theft in Cybersecurity
Author(s): STOICA, Iulia-Teodora
Author(s) keywords: authentication, biometric data, cybersecurity, risk, theft
Reference keywords: biometric, cybersecurity, data theft
Abstract:
The aim of this paper is to analyze the technical and engineering issues surrounding the future risk of biometric data theft in cyber security. Biometric data, such as fingerprints, facial recognition, and voice recognition, are increasingly being used as a means of authentication in various industries. However, the collection, storage, and transmission of biometric data present unique security challenges, as this data is highly personal and cannot be changed if compromised. In this paper, we will examine the vulnerabilities in biometric authentication technologies, the risks associated with the use of biometrics in various industries, and the measures that can be taken to mitigate these risks.
References:
[1]. Jain, A. K., Ross, A., Prabhkar, S., Jan. 2004. An introduction to biometric recognition. IEEE Transactions on Information Forensics and Security 1 (2), 125-143.
[2]. John R. Vacca, Biometric Technologies and Verification Systems, Elsevier, 2007.
[3]. Raghavendra Ramachandra, Venkateshappa P., and Manjunatha M., "Biometric Recognition: A Comprehensive Study," International Journal of Innovative Research in Science, Engineering and Technology, vol. 4, no. 7, pp. 5764-5774, July 2015.
[4]. J. Feng and A. Jain, "Fingerprint Biometrics: Concepts, Applications and Challenges," SpringerBriefs in Computer Science, 2016.
[5]. Hong, L., Wan, Y., & Jain, A. K. (1998). Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(8), 777-789.
[6]. A. K. Jain, A. Ross, and K. Nandakumar, "Introduction to Biometrics," Springer, 2011.
[7]. J. Daugman, "How iris recognition works," IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, 2004.
[8]. D. Dean and B. Kanawati, "Voice Biometrics: Fundamentals and Forensics," Springer, 2018.
[9]. Rupinder Saini, Narinder Rana, “Comparison of Various Biometric Methods”, (IJAST) Vol 2 Issue 1 (March 2014).
[10]. B. Kumar and R. K. Singh, "Biometric Encryption Techniques," in International Journal of Computer Applications, vol. 139, no. 3, pp. 26-30, April 2016.
[11]. D. D. Dabas and D. Dahiya, "Multifactor Authentication for Enhancing Security in Cloud Environment: A Review," in International Journal of Computer Science and Mobile Computing, vol. 7, no. 5, pp. 218-223, May 2018.
[12]. P. Bhatt and N. Chavda, "A Survey of Biometric Tokenization Techniques," in International Journal of Computer Science and Information Security, vol. 16, no. 5, pp. 39-45, May 2018.
[13]. D. Maltoni, D. Maio, A. K. Jain and S. Prabhakar, "Handbook of Fingerprint Recognition," Springer, 2nd edition, 2009.
[14]. C. Rathgeb and A. Uhl, "Biometric template protection: Bridging the gap between security and privacy," in Computer Networks, vol. 81, pp. 56-72, April 2015.
[15]. Rupinder Saini ,Narinder Rana, “Comparison of Various Biometric Methods,” (IJAST) Vol 2 Issue I (March 2014).
Article Title: The Future Risk of Biometric Data Theft in Cybersecurity
Author(s): STOICA, Iulia-Teodora
Date of Publication: 2024-06-28
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2024.01.04
Issue: Volume 13, Issue 1, Year 2024
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 49-58 (10 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.