Abstract
Biometric system which is based on human physical and behavioral traits is implemented in a versatile field especially national security, wage control, access control, intruder detection and verification, forensic science, etc. Biometrics is more reliable and capable than conventional methods like PIN, token system, etc. because of its unique identity whether physical or behavioral trait verification of each and every person. In recent times, the awareness of biometrics for common man had been limited to its use in spy thrillers or fear instilling instruments of state of corporate surveillance in speculative fiction, forensic or as investigative tools; and was supposed to be ultimate in areas where it was applied. There has been a drastic change in areas where biometrics can be applied. A good biometrics is characterized by use of a feature that is highly unique, so that the chance of any two people having the same characteristic will be minimal; is stable, so that the feature does not change over time; and can be easily captured, in order to provide convenience to the user and prevent misrepresentation of the feature. Biometric identifications are harder to steal than other traditional traits.
Every innovation faces social, cultural, and legal constraints. These constraints influence the acceptance of system by clients, its throughput, or the decision to utilize biometrics as a primary security tool. Therefore, these constraints are especially considered to design framework. Effectiveness and acceptability of biometrics depend upon the social and cultural values of users’ population. Innovators, designers, or manufacturers try to make a system user-friendly and user acceptable; also it is considered to minimize the effect of constraints. Both acceptability and effectiveness of system can be improved by analyzing and by delivering social and legal issues properly. Consideration of vulnerability determines the integrity and reliability. The present chapter deals with the myths and misrepresentations, vulnerability points, and major concerns of biometrics and challenges, difficulties, and issues of various biometric systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Z.M. Noh, A.R. Ramli, M. Iqbal Saripan, M. Hanafi, Overview and challenges of palm vein biometric system. Int. J. Biom. 8(1) (2016), https://doi.org/10.1504/IJBM.2016.077102.
S. Asha, C. Chellappan, Biometrics: an overview of the technology, issues and applications. Int. J. Comput. Appl. 39(10), 35–52 (2012)
R. Bolle, J.H. Connell, S. Pankanti, N.K. Ratha, A.W. Senior, Guide to biometrics (Springer, New York, 2004)
A.K. Jain, J. Feng, Latent finger print matching. IEEE Trans. Patt. Anal. Mac. Intel. 33(1), 88–100 (2010)
A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video. Technol. 14(1), 4–20 (2004)
N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
B. Schneier, The uses and abuses of biometrics. Commun. ACM 42(8), 136 (1999)
N.K. Ratha, R.M. Bolle, Smart card based authentication, in Biometrics: Personal Identification in Networked Society, ed. by A. K. Jain, R. M. Bolle, S. Pankanti, (Kluwer Academic Press, Boston, 1999), pp. 369–384
B. Schneier, in Security Pitfalls in Cryptography, Proceedings of the CardTech/SecureTech Conference, CardTech/SecureTech, (Bethesda, 1998), pp. 621–626
T. Sabhanayagam, V.P. Venkatesan, K. Senthamaraikannan, A comprehensive survey on various biometric systems, Int. J. Appl. Eng. Res 13(5), 2276–2297 (2018) ISSN 0973-4562.
U. Uludag, S. Pankanti, S. Prabhakar, A. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE. 92, 948–960 (2004)
P. Campisi, Security and privacy in biometrics: towards a holistic approach, in Security and privacy in biometrics, (Springer London, 2013), pp. 1–23
A. Adler, R. Carppelli, Template Security in: Encyclopedia of Biometrics, (Springer, 2009), pp. 1322–1327
D.C.L. Ngo, A.B.J. Teoh, J. Hu, Biometric security (Cambridge Scholars Publishing, England, 2015)
K. Jain, K. Nandakumar, A. Ross, 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern. Recog. Let. 79, 80–105 (2016)
K. Nandakumar, A. Jain, Biometric template protection: bridging the performance gap between theory and practice. IEEE Sig. Proc. Mag. 32, 88–100 (2015)
N. Bartlow, B.Cukic, The vulnerabilities of biometric systems – an integrated look at old and new ideas. Technical Report (West Virginia University, 2005)
K. Jain, K. Nandakumar, A. Nagar, Biometric template security, EURASIP J. Adv. Sig. Proc. 2008, 1–17, 579416 (2008), https://doi.org/10.1155/2008/579416.
S. Tiwari, J.N. Chourasia, V.S. Chourasia, A review of advancements in biometric systems, Int. J. Innov. Res. Adv. Eng. (IJRAE). 2(1) 2015, ISSN 2349–2163
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Thakur, K., Vyas, P. (2019). Social Impact of Biometric Technology: Myth and Implications of Biometrics: Issues and Challenges. In: Sinha, G. (eds) Advances in Biometrics. Springer, Cham. https://doi.org/10.1007/978-3-030-30436-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-30436-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30435-5
Online ISBN: 978-3-030-30436-2
eBook Packages: Biomedical and Life SciencesBiomedical and Life Sciences (R0)