To install StudyMoose App tap and then “Add to Home Screen”
Save to my list
Remove from my list
Biometric authentication is form of access control that gives access permission to individuals based on verification using their physical features which are previously recorded on a scanner or a biometric security system (Lazkani & Liu, 2014). During the process of biometric authentication, the system makes a comparison between two sets of data: information recorded in the system and the one provided by the visitor. Permission is only granted if the device confirms that the two data sets are identical or nearly identical.
The most common biometric authentication methods include fingerprint affirmation, face recognition, retina and iris, and voice recognition.
The method of biometric authentication is used by both big and small organizations to control access to systems in the contemporary world (Pato, Millett, & Lynette, 2010). Despite the technology of biometric authentication gaining popularity in the recent past, the method has some weaknesses. One of the main problems with this method is the procedure used to capture and map the physical features to an individual.
The process requires high levels of accuracy and precision when capturing the details. Lack of accuracy or taking incomplete data will lead to failure of the whole system.
Another limitation is that biometrics are permanent for a lifetime. Any other form of authentication such as passwords can be changed by a user when need arises or when someone else learns about them. However, there is no means through which one can change their biometrics such as the retina, fingerprints and iris. In situations where a hacker gets a hold of these information, there is little that one can do to stay safe apart from changing the method of authentication or using another fingerprint.
In one of the biggest data breaches in history, hackers managed to get away with the fingerprints of more than 5.6 million employees of the Personal Management office. All the workers whose information was leaked will always have their identity compromised (Pato, Millett, & Lynette, 2010).
The third weakness entails errors in the biometric systems. The common errors include false accept and false reject. The errors usually occur because of a biometric device being unable to read the features of an individual due to several reasons. The false accept occurs when then system gives access to an unauthorized person while false reject is when the device fails to recognize an authorized individual. The system is not also applicable to the physically challenged. Apart from these weaknesses, the system has many other challenges. There are various controls which can be applied to overcome the challenges of biometric authentication.
One of the best methods used to correct the common privacy issues related to biometric authentication is the use of biometric template protection. The technique entails systems storing and transferring a changed version of the initial biometric features to avoid the adverse consequences of compromised databases and to protect peoples’ original data. Examples of biometric template protection methods include bio hashing and the use of cancellable biometrics. Cryptographic primitives could also be used to solve the problem of privacy in biometric authentication. The main cryptographic software used for such purposes include boom filters, secure multiparty computation and verifiable computation. Secure multiparty computation entails such techniques as oblivious transfer, garbled circuits and homomorphic encryption. The three techniques are usually combined to achieve privacy preservation (Pagnin & Mitrokotsa, 2017).
The last control is the use of error correction codes. The error correction codes are used to reduce the errors experienced biometric data capture and storage. The technique works by eliminating the small variations that occur in capturing the initial template of the biometrics. As a result, systems get templates that are free of errors and hence use cryptographic primitives without interrupting with the original templates (Pagnin & Mitrokotsa, 2017).
Biometric Authentication Methods in The Data Systems. (2024, Feb 18). Retrieved from https://studymoose.com/biometric-authentication-methods-in-the-data-systems-essay
👋 Hi! I’m your smart assistant Amy!
Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.
get help with your assignment