Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques

Authors

DOI:

https://doi.org/10.21015/vtse.v12i1.1745

Abstract

This paper provides an overview and analysis of existing biometric authentication methods. Biometric authentication enhances the security of traditional authentication methods by utilizing unique biological characteristics of individuals, such as fingerprints, facial features, or iris patterns, to verify identity. However, implementing biometric authentication may involve initial setup costs for service providers due to the need for specialized hardware and software. Additionally, users may experience some initial inconvenience during the enrollment process to register their biometric data. This paper presents a comparative analysis of the usability of biometric authentication techniques. Initially, a survey of existing work is conducted by comparing techniques, algorithms, and metrics used in research. Later the challenges of the distinct types of authentication techniques are discussed, and their problems are discovered. Subsequently, the findings of a quantitative study based on a are presented, aimed at assessing the usability of those techniques. The findings indicate that authentic biometric techniques are perceived as usable.

References

K. Papadamou, S. Zannettou, B. Chifor, S. Teican, G. Gugulea, A. Recupero, A. Caponi, C. Pisa, G. Bianchi, S.

Gevers, C. Xenakis and M. Sirivianos, "Killing the Password and Preserving Privacy with Device-Centric and

Attribute-based Authentication," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2183 - 2193,

E. D. Cristofaro, H. Du, J. Freudiger and G. Norcie, “A Comparative Usability Study of Two-Factor Authentication,” arXiv preprint arXiv, vol. 1309, no. 5344, 2014.

N. Yusuf, K. A. Marafa, K. L. Shehu, H. Mamman and M. Maidawa, “A survey of biometric approaches of authentication,” International Journal of Advanced Computer Research, vol. 10, no. 47, pp. 96-104, 2020.

S. S. Harakannanavar, P. C. Renukamurthy and K. B. Raja, “Comprehensive Study of Biometric Authentication

Systems, Challenges and Future Trends,” International Journal of Advanced Networking and Applications, vol. 10, no. 04, pp. 3958-3968, 2019.

A. A. Kaur and K. K. Mustafa, “A Critical appraisal on Password based Authentication,” International Journal

of Computer Network and Information Security, p. 15, 2019.

“types of authentication methods,” Available: https://optimalidm.com/resources/blog/types-ofauthentication-methods/, 2020.

K. B. Anderson, E. Durbin and M. A. Salinger, “Identity Theft,” Journal of Economic Perspectives, vol. 22, no. 2, pp. 171-192, 2008.

S. Irshad and T. R. Soomro, “Identity Theft and Social Media,” International Journal of Computer Science and Network Security, vol. 18, no. 1, pp. 43-55, 2018.

“improve-2fa-user-experience,” Available: https://www.wpexplorer.com/improve-2fa-userexperience/,

November 2023. [Online]

S. Das, A. Kim, B. Jelen, L. Huber and L. J. Camp, “NonInclusive Online Security: Older Adults’ Experience with

Two-Factor Authentication,” 54th Hawaii International Conference on System Sciences, Hawaii, 2021.

I. Gordin, A. Graur, S. Vlad and C. I. Adomnitei, “Moving forward passwordless authentication: challenges and

implementations for the private cloud,” 20th RoEduNet Conference: Networking in Education and Research (RoEduNet), Iasi, Romania, 2021.

S. Z. Syed Idrus, E. Cherrier, C. Rosenberger and J.-J. Schwartzmann, “A review on authentication methods,”

Australian Journal of Basic and Applied Sciences, vol. 7, no. 5, pp. 95-107, 2013.

V. Veeraiah, K. R. Kumar, P. L. Kumari, S. Ahamad, R. Bansal and A. Gupta, “Application of Biometric System

to Enhance the Security in Virtual World,” 2nd International Conference on Advance Computing and Innovative Technologies in Engineering, Greater Noida, 2022.

S. A. Abdulrahman, B. Alhayani, “A comprehensive survey on the biometric systems based on physiological

and behavioural characteristics,” Materials Today: Proceedings, vol. 80, no. 3, pp. 2642-2646, 2023.

N. Khan, M. Arif, M. Darus, et al., “digital-identity-and-security,” Available: https://www.thalesgroup.com/en/markets/digital-identityand-security/government/inspired/biometrics, Thales group, 20 May 2023. [Online].

V. Liskin, E. Serdobolskiy, I. Sopilko and T. Okhrimenko “Two-factor User Authentication Using Biometrics,” CybHyg, vol. 2654, pp. 526-535, 2019.

F. Ennaama, K. Benhida and A. Boulahoual, “Comparative and analysis study of biometric systems,” Journal of

Theoretical and Applied Information Technology, vol. 97, no. 12, pp. 3466-3476, 2019.

S. Parusheva, “A comparative study on the application of biometric technologies for authentication in online

banking,” Egyptian Computer Science Journal, vol. 39, no. 4, pp. 116-127, 2015.

N. Bawany, R. Ahmed and Q. Zakir, “Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation,” Research Journal of Computer and Information Technology Sciences, vol. 1, no. 4, pp. 5-14, 2013.

Author, “physiological vs behavioral biometrics difference,” Available: https://www.iproov.com/blog/physiological-vs-behavioralbiometrics-difference, iproov, 21 December 2022. [Online].

X. Bultel, J. Dreier, M. Giraud, M. Izaute, T. Kheyrkhah, P. Lafourcade, D. Lakhzoum, V. Marlin and L. Mota “Security analysis and psychological study of authentication methods with PIN codes,” 12th International Conference on Research Challenges in Information Science, Nantes, 2018.

S. R. Kodituwakku, “Biometric Authentication - A Review,” International Journal of Trend in Research and Development, vol. 2, no. 4, pp. 113-123, 2015.

V. M. Patel, C. Rama, C. Deepak and B. Brandon, “Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges,” IEEE Signal Processing Magazine, vol. 33, no. 4, pp. 49-61, 2016.

Downloads

Published

2024-03-31

How to Cite

Warda Hassan, & Nosheen Sabahat. (2024). Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques. VFAST Transactions on Software Engineering, 12(1), 105–120. https://doi.org/10.21015/vtse.v12i1.1745