Definition
Authentication: Process to verify the identity of a request to access confidential information or service. It confirms if the requester is authorized to access and if so then what the privilege is.
Biometrics: Biological characteristics of an individual that are unique to the person and don’t change significantly over time and environment.
Cryptography: Process a given message to a form that an unauthorized person cannot interpret but an authorized user can retrieve the secret message.
Security: Protection of information and system from unauthorized access, modification, or destruction.
Steganography: Process to hide confidential information inside another public information, including an image.
Introduction
Biometrics is the science of measurement and statistical analysis of an individual’s physical and behavioral characteristics (Das 2019). It has been observed that every human being has a set of unique biometric features, which can be utilized to identify the person....
References
Campisi, P. (2013). Security and privacy in biometrics. London: Springer.
Chen, A., & Chandran, V. (2010). Biometric template security using higher order spectra. In Proceedings of IEEE international conference on acoustics, speech and signal processing, 1730–1733. IEEE, USA.
Das, R. (2019). The science of biometrics. Taylor & Francis.
Islam, M. N. (2011). Encryption and multiplexing of fingerprints for enhanced security. In Proceedings of IEEE long Island systems, applications and technology conference (LISAT). IEEE, USA.
Islam, M. F., & Islam, M. N. (2012a). A biometrics-based security architecture for mobile computing. In Proceedings of IEEE long Island systems, applications and technology conference (LISAT). IEEE, USA.
Islam, M. F., & Islam, M. N. (2012b). A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography. In SPIE Proceedings in optical pattern recognition XXIII, volume 8398, SPIE, USA.
Prabhakar, S., Pankathi, S., & Jain, A. K. (2009). Biometric recognition: Security and privacy concerns. IEEE Xplore, 22–45. IEEE, USA.
Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3), 614–634.
Stallings, W., & Brown, L. (2018). Computer security: Principles and practice. Hoboken: Pearson.
Strickland, E. (2012). The biometric wallet. In IEEE spectrum. IEEE, USA.
Future Reading
Bala, D. (2008). Biometrics and information security. Proceedings of the 5th annual conference on Information security curriculum development (InfoSecCD ’08) ACM, 64–66.
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. IEEE International Conference on Computer Science and Electronics Engineering.
Kaufman, L. M., (2009). Data security in the world cloud of computing. IEEE Security and Privacy, 7(4), 61–64.
Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks, 17(1), 51–58.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this entry
Cite this entry
Islam, M.N. (2020). Biometrics. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_10-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-69891-5_10-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69891-5
Online ISBN: 978-3-319-69891-5
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences