Special feature
Biometrics, is it a viable proposition for identity authentication and access control?

https://doi.org/10.1016/0167-4048(95)97054-EGet rights and content

Abstract

In modern society, where a welfare recipient signs up for benefits under six identities, a child is released to a stranger from a day care centre, a hacker accesses sensitive databases, and a counterfeiter makes copies of bank cards, a trustworthy means of identifying employees or customers is urgently in demand. Biometrics is emerging as the most foolproof method of automated personal identification in today's highly computer dependent world. Biometric systems are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristics or some behavioural aspects. No one biometric system is likely to dominate the marketplace since all have limitations that compromise possible system solutions. The trade-offs in developing such systems invoke hardware cost, reliability, discomfort in using a device, the amount of data needed, and other factors. This article looks at different types of biometrics systems and discusses in detail the various security implications associated with their application.

References (26)

  • W. Caelli
  • T Forester et al.

    Computer Ethics: Cautionary tales and ethical dilemmas in computing

    (1994)
  • K. Dittrich

    Computer Security and Information Integrity

    (1991)
  • I.O Angell et al.

    Information Systems Management: Opportunities and Risks

    (1991)
  • R.L. Sherman

    Bometrics Futures

  • R.L. Sherman

    The Right Look Can Open Doors

  • W.R Cheswick et al.

    Firewalls and Internet Security: Repelling the Wily Hacker

    Addison-Wesley Professional Computing Series

    (1994)
  • B. Miller

    Vital Signs of Identity

    EEE Spectrum

    (Feb 1994)
  • F.M. Tuerkheimer

    The underpinning of privacy protection

    Communications of the ACM

    (Aug 1993)
  • R.A. Clark

    Information Technology and Dataveillance

    Communications of the ACM

    (May 1988)
  • RUSSELL, D and GANGEMI Sr, G.T. Computer Security Basics, O'Reilly and Associates...
  • R Joyce et al.

    Identity Authentication Based on Keystroke Latencies

    Communications of the ACM

    (Feb 1990)
  • R.D. Peacocke et al.

    An Introduction to Speech and Speaker Recognition

    IEEE Computer

    (Aug 1990)
  • Cited by (31)

    • Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment

      2018, Decision Support Systems
      Citation Excerpt :

      There are few theoretically grounded studies that focus on the determinants of users' perceptions of biometrics authentication. Most extant literature provides descriptions of biometrics technologies, its architecture or viability [38]. Today, biometrics technology seemingly enjoys a wider acceptance due to the inclusion of fingerprint biometrics and more user-friendly applications on mobile devices.

    • One-time password authentication scheme based on the negative database

      2017, Engineering Applications of Artificial Intelligence
      Citation Excerpt :

      Thus far, many one-time password authentication schemes have been proposed to protect the authentication data and user password. The security of the schemes proposed in early years was primarily based on information known by the user (Joyce, 1990; Kim, 1999), such as the one-time password authentication scheme based on a one-way hash function proposed by Lamport (1981) and its improved versions (Haller, 1995; Sandirigama et al., 2000; Chen and Ku, 2002). One-time password authentication schemes using smart cards were subsequently proposed in later studies (Yang and Shieh, 1999; Liao et al., 2006; Chang and Wu, 1991; Xu et al., 2009; Wu et al., 2012).

    • Hierarchy of users' web passwords: Perceptions, practices and susceptibilities

      2014, International Journal of Human Computer Studies
      Citation Excerpt :

      Maintaining a unique identity of this type typically requires remembering a unique username and a password for that site, much like the authentication procedures on more security-sensitive sites, such as those for banking, stock trading, email, and online social networks. Advances in technology and design have led to various other forms of user authentication, such as biometrics (Roddy and Stosz, 1997; Marino et al., 2006; Kim, 1995), graphical passwords (Goldberg et al., 2002; Brostoff and Sasse, 2000; Wiedenbeck et al., 2005b), and token-based authentication (Corner and Noble, 2002; Syta et al., 2010). Still, password-based authentication remains the most popular due to its simplicity and cost effectiveness.

    • A password authentication scheme over insecure networks

      2006, Journal of Computer and System Sciences
    View all citing articles on Scopus
    View full text