Comprehensive survey: Biometric user authentication application, evaluation, and discussion

被引:12
作者
Alrawili, Reem [1 ]
AlQahtani, Ali Abdullah S. [2 ]
Khan, Muhammad Khurram [3 ]
机构
[1] North Carolina Agr & Tech State Univ, Coll Sci & Technol, Dept Appl Sci & Technol, Greensboro, NC 27411 USA
[2] North Carolina Agr & Tech State Univ, Coll Sci & Technol, Dept Appl Sci & Technol, Greensboro, NC 27411 USA
[3] King Saud Univ, Riyadh, Saudi Arabia
关键词
Biometric user authentication; Physiological traits; Behavioral traits; Cybersecurity in biometrics; Biometric traits analysis; PRESENTATION ATTACK DETECTION; VOICE AUTHENTICATION; KEYSTROKE DYNAMICS; LIVENESS DETECTION; GAIT RECOGNITION; SYSTEM; DISTANCE; PROTECTION; SIGNATURE; FEATURES;
D O I
10.1016/j.compeleceng.2024.109485
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a comprehensive review of the literature on biometric user authentication, encompassing an analysis of key aspects such as the selection of biometric traits for specific applications, the impact of performance factors including security, convenience, and robustness, along with the identification of potential countermeasures against cyber Attacks. Additionally, we investigate the factors that influence the accuracy of biometric systems and suggest possible enhancements. Our exploration covers both physiological and behavioral traits, assessing their benefits and limitations. We also examine the determinants of biometric system effectiveness, pinpointing areas for future improvement. Distinguishing itself from prior surveys, our study thoroughly investigates biometric traits across different application domains and scrutinizes strategies to combat cyber threats. The objective is to provide researchers and practitioners with a nuanced understanding of the current state of biometric authentication, offering insights that could steer the direction of forthcoming developments in the field.
引用
收藏
页数:29
相关论文
共 307 条
[1]   I-Am: Implicitly Authenticate Me-Person Authentication on Mobile Devices Through Ear Shape and Arm Gesture [J].
Abate, Andrea F. ;
Nappi, Michele ;
Ricciardi, Stefano .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (03) :469-481
[2]   Efficient Convolutional Neural Network-Based Keystroke Dynamics for Boosting User Authentication [J].
AbdelRaouf, Hussien ;
Chelloug, Samia Allaoua ;
Muthanna, Ammar ;
Semary, Noura ;
Amin, Khalid ;
Ibrahim, Mina .
SENSORS, 2023, 23 (10)
[3]   PERFORMANCE OF MULTIMODAL BIOMETRIC SYSTEMS USING FACE AND FINGERPRINTS (SHORT SURVEY) [J].
Abdul-Al, Mohamed ;
Kyeremeh, George Kumi ;
Parchin, Naser Ojaroudi ;
Abd-Alhameed, Raed A. ;
Qahwaji, Rami ;
Rodriguez, Jonathan .
2021 IEEE 26TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2021,
[4]  
Abdulhak SA, 2018, INT CONF ADV COMMUN, P68, DOI 10.23919/ICACT.2018.8323648
[5]   A comprehensive survey on the biometric systems based on physiological and behavioural characteristics [J].
Abdulrahman S.A. ;
Alhayani B. .
Materials Today: Proceedings, 2023, 80 :2642-2646
[6]   Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey [J].
Abuhamad, Mohammed ;
Abusnaina, Ahmed ;
Nyang, Daehun ;
Mohaisen, David .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (01) :65-84
[7]  
Achban A., 2019, 2019 5th International Conference on Science and Technology (ICST), V1, P1
[8]   Comparison of Cryptographic Algorithms GOST and RSA [J].
Achmad, R. B. N. .
2ND INTERNATIONAL CONFERENCE ON INFORMATICS, ENGINEERING, SCIENCE, AND TECHNOLOGY (INCITEST 2019), 2019, 662
[9]   11K Hands: Gender recognition and biometric identification using a large dataset of hand images [J].
Afifi, Mahmoud .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) :20835-20854
[10]  
Agbinya Johnson I., 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC). Proceedings, P160, DOI 10.1109/CCC.2019.00011