IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • The Future Risk of Biometric Data Theft in Cybersecurity


    Author(s): STOICA, Iulia-Teodora

    Quick view | Full article | Citations | Views: 268


    Author(s) keywords: , , , ,


    Reference keywords: , ,


    Abstract:

    The aim of this paper is to analyze the technical and engineering issues surrounding the future risk of biometric data theft in cyber security. Biometric data, such as fingerprints, facial recognition, and voice recognition, are increasingly being used as a means of authentication in various industries. However, the collection, storage, and transmission of biometric data present unique security challenges, as this data is highly personal and cannot be changed if compromised. In this paper, we will examine the vulnerabilities in biometric authentication technologies, the risks associated with the use of biometrics in various industries, and the measures that can be taken to mitigate these risks.



    References:

    [1]. Jain, A. K., Ross, A., Prabhkar, S., Jan. 2004. An introduction to biometric recognition. IEEE Transactions on Information Forensics and Security 1 (2), 125-143.
    [2]. John R. Vacca, Biometric Technologies and Verification Systems, Elsevier, 2007.
    [3]. Raghavendra Ramachandra, Venkateshappa P., and Manjunatha M., "Biometric Recognition: A Comprehensive Study," International Journal of Innovative Research in Science, Engineering and Technology, vol. 4, no. 7, pp. 5764-5774, July 2015.
    [4]. J. Feng and A. Jain, "Fingerprint Biometrics: Concepts, Applications and Challenges," SpringerBriefs in Computer Science, 2016.
    [5]. Hong, L., Wan, Y., & Jain, A. K. (1998). Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(8), 777-789.
    [6]. A. K. Jain, A. Ross, and K. Nandakumar, "Introduction to Biometrics," Springer, 2011.
    [7]. J. Daugman, "How iris recognition works," IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, 2004.
    [8]. D. Dean and B. Kanawati, "Voice Biometrics: Fundamentals and Forensics," Springer, 2018.
    [9]. Rupinder Saini, Narinder Rana, “Comparison of Various Biometric Methods”, (IJAST) Vol 2 Issue 1 (March 2014).
    [10]. B. Kumar and R. K. Singh, "Biometric Encryption Techniques," in International Journal of Computer Applications, vol. 139, no. 3, pp. 26-30, April 2016.
    [11]. D. D. Dabas and D. Dahiya, "Multifactor Authentication for Enhancing Security in Cloud Environment: A Review," in International Journal of Computer Science and Mobile Computing, vol. 7, no. 5, pp. 218-223, May 2018.
    [12]. P. Bhatt and N. Chavda, "A Survey of Biometric Tokenization Techniques," in International Journal of Computer Science and Information Security, vol. 16, no. 5, pp. 39-45, May 2018.
    [13]. D. Maltoni, D. Maio, A. K. Jain and S. Prabhakar, "Handbook of Fingerprint Recognition," Springer, 2nd edition, 2009.
    [14]. C. Rathgeb and A. Uhl, "Biometric template protection: Bridging the gap between security and privacy," in Computer Networks, vol. 81, pp. 56-72, April 2015.
    [15]. Rupinder Saini ,Narinder Rana, “Comparison of Various Biometric Methods,” (IJAST) Vol 2 Issue I (March 2014).



    Additional Information

    Article Title: The Future Risk of Biometric Data Theft in Cybersecurity
    Author(s): STOICA, Iulia-Teodora
    Date of Publication: 2024-06-28
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2024.01.04
    Issue: Volume 13, Issue 1, Year 2024
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 49-58 (10 pages)



    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.