Skip to main content

Social Impact of Biometric Technology: Myth and Implications of Biometrics: Issues and Challenges

  • Chapter
  • First Online:
Advances in Biometrics

Abstract

Biometric system which is based on human physical and behavioral traits is implemented in a versatile field especially national security, wage control, access control, intruder detection and verification, forensic science, etc. Biometrics is more reliable and capable than conventional methods like PIN, token system, etc. because of its unique identity whether physical or behavioral trait verification of each and every person. In recent times, the awareness of biometrics for common man had been limited to its use in spy thrillers or fear instilling instruments of state of corporate surveillance in speculative fiction, forensic or as investigative tools; and was supposed to be ultimate in areas where it was applied. There has been a drastic change in areas where biometrics can be applied. A good biometrics is characterized by use of a feature that is highly unique, so that the chance of any two people having the same characteristic will be minimal; is stable, so that the feature does not change over time; and can be easily captured, in order to provide convenience to the user and prevent misrepresentation of the feature. Biometric identifications are harder to steal than other traditional traits.

Every innovation faces social, cultural, and legal constraints. These constraints influence the acceptance of system by clients, its throughput, or the decision to utilize biometrics as a primary security tool. Therefore, these constraints are especially considered to design framework. Effectiveness and acceptability of biometrics depend upon the social and cultural values of users’ population. Innovators, designers, or manufacturers try to make a system user-friendly and user acceptable; also it is considered to minimize the effect of constraints. Both acceptability and effectiveness of system can be improved by analyzing and by delivering social and legal issues properly. Consideration of vulnerability determines the integrity and reliability. The present chapter deals with the myths and misrepresentations, vulnerability points, and major concerns of biometrics and challenges, difficulties, and issues of various biometric systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Z.M. Noh, A.R. Ramli, M. Iqbal Saripan, M. Hanafi, Overview and challenges of palm vein biometric system. Int. J. Biom. 8(1) (2016), https://doi.org/10.1504/IJBM.2016.077102.

    Article  Google Scholar 

  2. S. Asha, C. Chellappan, Biometrics: an overview of the technology, issues and applications. Int. J. Comput. Appl. 39(10), 35–52 (2012)

    Google Scholar 

  3. R. Bolle, J.H. Connell, S. Pankanti, N.K. Ratha, A.W. Senior, Guide to biometrics (Springer, New York, 2004)

    Book  Google Scholar 

  4. A.K. Jain, J. Feng, Latent finger print matching. IEEE Trans. Patt. Anal. Mac. Intel. 33(1), 88–100 (2010)

    Article  Google Scholar 

  5. A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video. Technol. 14(1), 4–20 (2004)

    Article  Google Scholar 

  6. N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  7. B. Schneier, The uses and abuses of biometrics. Commun. ACM 42(8), 136 (1999)

    Article  Google Scholar 

  8. N.K. Ratha, R.M. Bolle, Smart card based authentication, in Biometrics: Personal Identification in Networked Society, ed. by A. K. Jain, R. M. Bolle, S. Pankanti, (Kluwer Academic Press, Boston, 1999), pp. 369–384

    Chapter  Google Scholar 

  9. B. Schneier, in Security Pitfalls in Cryptography, Proceedings of the CardTech/SecureTech Conference, CardTech/SecureTech, (Bethesda, 1998), pp. 621–626

    Google Scholar 

  10. T. Sabhanayagam, V.P. Venkatesan, K. Senthamaraikannan, A comprehensive survey on various biometric systems, Int. J. Appl. Eng. Res 13(5), 2276–2297 (2018) ISSN 0973-4562.

    Google Scholar 

  11. U. Uludag, S. Pankanti, S. Prabhakar, A. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE. 92, 948–960 (2004)

    Article  Google Scholar 

  12. P. Campisi, Security and privacy in biometrics: towards a holistic approach, in Security and privacy in biometrics, (Springer London, 2013), pp. 1–23

    Google Scholar 

  13. A. Adler, R. Carppelli, Template Security in: Encyclopedia of Biometrics, (Springer, 2009), pp. 1322–1327

    Google Scholar 

  14. D.C.L. Ngo, A.B.J. Teoh, J. Hu, Biometric security (Cambridge Scholars Publishing, England, 2015)

    Google Scholar 

  15. K. Jain, K. Nandakumar, A. Ross, 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern. Recog. Let. 79, 80–105 (2016)

    Article  Google Scholar 

  16. K. Nandakumar, A. Jain, Biometric template protection: bridging the performance gap between theory and practice. IEEE Sig. Proc. Mag. 32, 88–100 (2015)

    Article  Google Scholar 

  17. N. Bartlow, B.Cukic, The vulnerabilities of biometric systems – an integrated look at old and new ideas. Technical Report (West Virginia University, 2005)

    Google Scholar 

  18. K. Jain, K. Nandakumar, A. Nagar, Biometric template security, EURASIP J. Adv. Sig. Proc. 2008, 1–17, 579416 (2008), https://doi.org/10.1155/2008/579416.

    Article  Google Scholar 

  19. S. Tiwari, J.N. Chourasia, V.S. Chourasia, A review of advancements in biometric systems, Int. J. Innov. Res. Adv. Eng. (IJRAE). 2(1) 2015, ISSN 2349–2163

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thakur, K., Vyas, P. (2019). Social Impact of Biometric Technology: Myth and Implications of Biometrics: Issues and Challenges. In: Sinha, G. (eds) Advances in Biometrics. Springer, Cham. https://doi.org/10.1007/978-3-030-30436-2_7

Download citation

Publish with us

Policies and ethics