The technology of biometric can be considered one of the authentication mechanism, which is widely used in recent times. It can be stated here that most of the possession and knowledge-based system of authentication can be easily fooled due to the factor that there is no link between authenticators and individuals. The authentication process, which is related to the biometric, can be considered to employ capability of advanced security. The system, which is related to the biometric, can be considered very much effective however; most of the people are concerned with the factor of the privacy, which is related to the concept. There are different types of biometric system, which can be implemented, which directly depends upon the need and the type of safety for which they would be involved into. The focus point of the report is to take into consideration different aspect, which are related to the concept of the biometric authentication process. The main emphasis would be in the sector of privacy and security, which are involved into the concept.
Biometric can be considered as a method, which is directly involved into the concept of the purpose of the identification or verification of an employee or a user. The operation, which is related to the biometric, is based on the aspect of pattern reorganization. Its working is based on the aspect of capturing of the data from an individual and them directly comparing it with the features, which are contained in a captured data with the features of the stored data in the system or the database. There are different types of biometric methods which are widely used some of the methods are fingerprint, signature recognition, Iris recognition, speaker recognition and hand geometry. Most of the type of biometric system can involve different level of functionality and approach in the focusing of the security aspect (Murillo-Escobar et al., 2015).
The data of the biometric is a personal data and in some cases, it can be stated to be sensitive data, which is private. There are different requirement, which are placed for the data processing, which are related to the personal data. Comparing it to the concept of the “on server” storage, which is related to the biometric data, matching of the data with the “on device” for the purpose of authentication is a compelling and very easy approach which is related to the global privacy requirement on cross border data transfer (Kim et al., 2015).
However it can be stated here that the concept is double-edged sword due to the factor that the data of the biometric is very much (extremely) sensitive because of the uniqueness and how it is intrinsic it is to a specific individual. It can be stated here that in the concept of the biometric effort has to be made which would be keeping the data secured including a choosing a proper system of compliance and infrastructure, training of the staff how to handle it and protecting it from authorized access or discloser of the personal data. Most of the time the data of the data, which is involved into the biometric, can be considered as one of the most disadvantage sector relating to the technology.
It can be stated that there are different type’s security implication, which can be seen in the concept of the biometric technology. The main security issue, which play a vital role, is the security of the data of the user. In some situation, it can be seen that the fake identity can be created if any other person gets access through identity of another person. This can lead to different types of unethical activity, which would be very much effective and could lead to problem. There are different types of security implications, which are enforced, which would be directly affecting the performance of the biometric system (Thomas, Vinod & Robinson, 2017). On the other hand, it can be stated that another effect of the biometric system is the false rejection aspect. The false rejection aspect takes place when the user has the personal data stored but the access through the system is not given to the user. It can be considered as one of the most disadvantage sector relating to the biometric system. The most critical aspect, which should be taken into consideration, is the security of the data, which is involved into the person. There are usually double layer protection, which is applicable to the process in recent times, which provides extra security features into the concept of the data. Privacy in any form of technology should play a vital role due to the factor of the involvement of the different personal information of the user. On the other hand how it would be effecting them if any other person
The report can be concluded on a note that the technology of biometric is being implemented in many areas. Mainly organization who are involved in vital area were restriction should be made in the entry of people implement the technology. There can be different types of biometric system, which are implemented according to the need, and the type of security it should involve into the concept. In the biometric concept, there are different loopholes, which directly affect the performance and directly alter the success rate factor, which is involved into the concept. In the near future, it can be stated that the role, which would be played by the process of biometric, would be very much dominating and would be useful in achieving a desired standard of security.
Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S. M., Cranor, L. F., & Savvides, M. (2015). Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. Proc. USEC, 1-2.
Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., & López-Gutiérrez, R. M. (2015). A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Systems with Applications, 42(21), 8198-8211.
Kim, H., Park, J., Lee, J., & Ryou, J. (2015). Biometric authentication technology trends in smart device environment. In Mobile and Wireless Technology 2015 (pp. 199-206). Springer, Berlin, Heidelberg.
He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal, 9(3), 816-823.
Thomas, K. P., Vinod, A. P., & Robinson, N. (2017, March). Online Biometric Authentication Using Subject-Specific Band Power features of EEG. In Proceedings of the 2017 International Conference on Cryptography, Security and Privacy (pp. 136-141). ACM.