A Survey on Biometric Authentication: Towards Secure and Privacy-Preserving Identification

被引:139
作者
Rui, Zhang [1 ]
Yan, Zheng [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
基金
中国国家自然科学基金; 芬兰科学院;
关键词
Aliveness detection; biometric authentication; password management; privacy protection; IRIS AUTHENTICATION; ALIVENESS-DETECTION; PROTECTION; SYSTEM;
D O I
10.1109/ACCESS.2018.2889996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to overcome the difficulty of password management and improve the usability of authentication systems, biometric authentication has been widely studied and has attracted special attention in both academia and industry. Many biometric authentication systems have been researched and developed, especially for mobile devices. However, the existing biometric authentication systems still have defects. Some biological features have not been deeply investigated. The existing systems could be vulnerable to attacks, such as replay attack and suffer from user privacy intrusion, which seriously hinder their wide acceptance by end users. The literature still lacks a thorough review on the recent advances of biometric authentication for the purpose of secure and privacy-preserving identification. In this paper, we classify and thoroughly review the existing biometric authentication systems by focusing on the security and privacy solutions. We analyze the threats of biometric authentication and propose a number of criteria with regard to secure and privacy-preserving authentication. We further review the existing works of biometric authentication by analyzing their differences and summarizing the advantages and disadvantages of each based on the proposed criteria. In particular, we discuss the problems of aliveness detection and privacy protection in biometric authentication. Based on our survey, we figure out a number of open research issues and further specify a number of significant research directions that are worth special efforts in future research.
引用
收藏
页码:5994 / 6009
页数:16
相关论文
共 59 条
[1]   Structural tolerance and Delaunay triangulation [J].
Abellanas, M ;
Hurtado, F ;
Ramos, PA .
INFORMATION PROCESSING LETTERS, 1999, 71 (5-6) :221-227
[2]  
[Anonymous], 2009, Consumer Communications and Networking Conference
[3]  
[Anonymous], 2010, Computing, DOI DOI 10.1145/1749603.1749605
[4]  
[Anonymous], 2008, Advances in biometrics: sensors, algorithms and systems
[5]   An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices [J].
Antal, Margit ;
Szabo, Laszlo Zsolt .
2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, :343-350
[6]  
Baldisserra D, 2006, LECT NOTES COMPUT SC, V3832, P265
[7]   Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm [J].
Bhatt, Himanshu S. ;
Bharadwaj, Samarth ;
Singh, Richa ;
Vatsa, Mayank .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) :89-100
[8]  
Bhatt S., 2013, Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), P17, DOI 10.1109/ICPRIME.2013.6496441
[9]   A Survey of Wearable Biometric Recognition Systems [J].
Blasco, Jorge ;
Chen, Thomas M. ;
Tapiador, Juan ;
Peris-Lopez, Pedro .
ACM COMPUTING SURVEYS, 2016, 49 (03)
[10]  
Bodade R., 2009, PROC OFIEEE INT C CO, P1