Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques
DOI:
https://doi.org/10.21015/vtse.v12i1.1745Abstract
This paper provides an overview and analysis of existing biometric authentication methods. Biometric authentication enhances the security of traditional authentication methods by utilizing unique biological characteristics of individuals, such as fingerprints, facial features, or iris patterns, to verify identity. However, implementing biometric authentication may involve initial setup costs for service providers due to the need for specialized hardware and software. Additionally, users may experience some initial inconvenience during the enrollment process to register their biometric data. This paper presents a comparative analysis of the usability of biometric authentication techniques. Initially, a survey of existing work is conducted by comparing techniques, algorithms, and metrics used in research. Later the challenges of the distinct types of authentication techniques are discussed, and their problems are discovered. Subsequently, the findings of a quantitative study based on a are presented, aimed at assessing the usability of those techniques. The findings indicate that authentic biometric techniques are perceived as usable.
References
K. Papadamou, S. Zannettou, B. Chifor, S. Teican, G. Gugulea, A. Recupero, A. Caponi, C. Pisa, G. Bianchi, S.
Gevers, C. Xenakis and M. Sirivianos, "Killing the Password and Preserving Privacy with Device-Centric and
Attribute-based Authentication," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2183 - 2193,
E. D. Cristofaro, H. Du, J. Freudiger and G. Norcie, “A Comparative Usability Study of Two-Factor Authentication,” arXiv preprint arXiv, vol. 1309, no. 5344, 2014.
N. Yusuf, K. A. Marafa, K. L. Shehu, H. Mamman and M. Maidawa, “A survey of biometric approaches of authentication,” International Journal of Advanced Computer Research, vol. 10, no. 47, pp. 96-104, 2020.
S. S. Harakannanavar, P. C. Renukamurthy and K. B. Raja, “Comprehensive Study of Biometric Authentication
Systems, Challenges and Future Trends,” International Journal of Advanced Networking and Applications, vol. 10, no. 04, pp. 3958-3968, 2019.
A. A. Kaur and K. K. Mustafa, “A Critical appraisal on Password based Authentication,” International Journal
of Computer Network and Information Security, p. 15, 2019.
“types of authentication methods,” Available: https://optimalidm.com/resources/blog/types-ofauthentication-methods/, 2020.
K. B. Anderson, E. Durbin and M. A. Salinger, “Identity Theft,” Journal of Economic Perspectives, vol. 22, no. 2, pp. 171-192, 2008.
S. Irshad and T. R. Soomro, “Identity Theft and Social Media,” International Journal of Computer Science and Network Security, vol. 18, no. 1, pp. 43-55, 2018.
“improve-2fa-user-experience,” Available: https://www.wpexplorer.com/improve-2fa-userexperience/,
November 2023. [Online]
S. Das, A. Kim, B. Jelen, L. Huber and L. J. Camp, “NonInclusive Online Security: Older Adults’ Experience with
Two-Factor Authentication,” 54th Hawaii International Conference on System Sciences, Hawaii, 2021.
I. Gordin, A. Graur, S. Vlad and C. I. Adomnitei, “Moving forward passwordless authentication: challenges and
implementations for the private cloud,” 20th RoEduNet Conference: Networking in Education and Research (RoEduNet), Iasi, Romania, 2021.
S. Z. Syed Idrus, E. Cherrier, C. Rosenberger and J.-J. Schwartzmann, “A review on authentication methods,”
Australian Journal of Basic and Applied Sciences, vol. 7, no. 5, pp. 95-107, 2013.
V. Veeraiah, K. R. Kumar, P. L. Kumari, S. Ahamad, R. Bansal and A. Gupta, “Application of Biometric System
to Enhance the Security in Virtual World,” 2nd International Conference on Advance Computing and Innovative Technologies in Engineering, Greater Noida, 2022.
S. A. Abdulrahman, B. Alhayani, “A comprehensive survey on the biometric systems based on physiological
and behavioural characteristics,” Materials Today: Proceedings, vol. 80, no. 3, pp. 2642-2646, 2023.
N. Khan, M. Arif, M. Darus, et al., “digital-identity-and-security,” Available: https://www.thalesgroup.com/en/markets/digital-identityand-security/government/inspired/biometrics, Thales group, 20 May 2023. [Online].
V. Liskin, E. Serdobolskiy, I. Sopilko and T. Okhrimenko “Two-factor User Authentication Using Biometrics,” CybHyg, vol. 2654, pp. 526-535, 2019.
F. Ennaama, K. Benhida and A. Boulahoual, “Comparative and analysis study of biometric systems,” Journal of
Theoretical and Applied Information Technology, vol. 97, no. 12, pp. 3466-3476, 2019.
S. Parusheva, “A comparative study on the application of biometric technologies for authentication in online
banking,” Egyptian Computer Science Journal, vol. 39, no. 4, pp. 116-127, 2015.
N. Bawany, R. Ahmed and Q. Zakir, “Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation,” Research Journal of Computer and Information Technology Sciences, vol. 1, no. 4, pp. 5-14, 2013.
Author, “physiological vs behavioral biometrics difference,” Available: https://www.iproov.com/blog/physiological-vs-behavioralbiometrics-difference, iproov, 21 December 2022. [Online].
X. Bultel, J. Dreier, M. Giraud, M. Izaute, T. Kheyrkhah, P. Lafourcade, D. Lakhzoum, V. Marlin and L. Mota “Security analysis and psychological study of authentication methods with PIN codes,” 12th International Conference on Research Challenges in Information Science, Nantes, 2018.
S. R. Kodituwakku, “Biometric Authentication - A Review,” International Journal of Trend in Research and Development, vol. 2, no. 4, pp. 113-123, 2015.
V. M. Patel, C. Rama, C. Deepak and B. Brandon, “Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges,” IEEE Signal Processing Magazine, vol. 33, no. 4, pp. 49-61, 2016.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY