IT in Industry, vol. 4, no. 1, 2016
Published online 30-Sep-2016
Hazards of Biometric Authentication in Practice
Samantha S. S. Phang
Christopher J. Pavlovski
Commonwealth Bank of Australia
Digital Protection Group
Sydney, NSW, Australia
Commonwealth Bank of Australia
Digital Protection Group
Sydney, NSW, Australia
Abstract—With the increase in cyber threats and attacks
many institutions are exploring how newer technologies may be
applied to strengthen the way users are verified when bestowing
permissions for carrying out web transactions. In particular,
many institutions are under increasing pressure to improve the
security instruments used to authenticate users, while permitting
access to their personal records to approve transactions. Whilst
multifactor authentication protocols have been adopted to
validate more sensitive transactions, this has added an additional
physical interaction during the verification process. More
recently, the industry has turned its attention to the use of
biometric authentication as a way to securely verify user
identities. This has reduced the complexity associated with
existing authentication processes that require passwords, tokens,
and challenge-response keywords. This paper explores these new
authentication techniques, discussing the benefits while
highlighting the challenges in practice to using biometrics. In
particular, identity theft of biometric markers and its potential
impact to customers and liability challenges for institutions are
presented.
these existing systems which have seen cyber attackers
successfully obtained credentials of the users. For instance, one
study estimated that 50% of users reuse their passwords [1]; it
follows that the attacker need only compromise one (less
secure) site to gain credentials for other potentially more
sensitive online accounts for the same user. Hence, there are
motivations for institutions to explore alternative and stronger
forms of authentication to counter these cyber threats. In
particular, biometric authentication has emerged as a strong
candidate to fulfil this need.
Keywords—biometric authentication; cyber threat; identity theft
The industry applications of biometric authentication
and the projected trends for use are assessed;
In this paper, the industry application of biometric
authentication is critically examined. The most recent
innovations to apply this form of authentication are assessed to
understand the benefits these new technologies bring and also
the potential challenges that may arise. Given that the security
protocols involve the use of the most sensitive human personal
data, biometric information, there is particular importance to
understand what risks may be encountered when applying such
tools in practice. Hence, the main contributions of this paper
include the following.
I. INTRODUCTION
Analysis is conducted of the industry challenges in
practice with the use of human biometric markers; and
As newer digital technologies evolve to become available
for use in industry applications the opportunity exists to
improve the way customer interact with on-line systems while
strengthening security and improving ease of use. Biometric
authentication is one such technology which has been
regarding as an advanced tool to improve the strength of the
verification process of users but also improve the usability
aspects by simplifying the authentication process for people.
Whilst a range of biometric technologies have been in use for
some time for several authentication systems, such as access to
restricted areas or sensitive (secret) facilities, it has recently
gained attention as a technology option for mainstream
industry. In particular, it has been suggested as a practical way
to strengthen and improve the authentication of on-line
customer wishing to conduct personal and sensitive
transactions.
The potential consequences and liabilities to people and
institutions are assessed.
In the next section a review of the literature related to
biometric authentication is discussed. Section three discusses
the set of human biometric identifiers that have been
considered as tools in building or enhancing authentication
systems. In section four, several applications that have been
proposed for the industry in practice are explored. This is
followed by section five where the challenges and risks to
using biometric markers are evaluated with the risks and
liabilities for both the customer and business, in particular the
implications to the industry in the event of a data breach is
examined. The paper is concluded in section six with a
discussion of the key observations made in the paper while
several areas of further work are presented.
Cyber threats have continued to increase in volume and
complexity and in some cases exponential growth has been
experienced in certain types of attack. The traditional means
for authenticating users has often relied heavily upon the
username and password credential. This has often been
strengthened with digital certificates, secure hardware tokens,
or the addition of multiple authentication challenges; as seen in
multi-factor authentication. There are several drawbacks to
Copyright
© Phang and Pavlovski 2016
II. RELATED WORK
There has been a great deal of work related to the use of
biometrics for authentication purposes. Much of that work has
focused on applying a variety of biometric identifiers to
strengthen the existing authentication protocols and schemes.
34
ISSN (Print): 2204-0595
ISSN (Online): 2203-173
IT in Industry, vol. 4, no. 1, 2016
Published online 30-Sep-2016
While an adopted form of biometric authentication is its use
in border security, one study on the use of facial recognition
suggests that this is inadequate in large applications such
as border control [2]. Multimodal biometric schemes have
also been proposed for border control applications that
utilize facial recognition together with fingerprinting on epassports [3]. Further works suggests the use of multi-modal
biometric schemes can also be used to overcome some of the
limitations of using single biometric identifiers in
authentication [4].
III. BIOMETRIC AUTHENTICATION MARKERS
Biometric identifiers for authentication purposes are
generally derived from two categories: i) physiology or ii)
behavioral human traits. Physiological traits as biometric
identifiers are related to the shape of body parts. This includes
fingerprints, hand geometry, palm print, facial appearance, iris
pattern, retina pattern and human DNA. Conversely, voice,
pulse rate, body heat signature, gait, keystroke dynamic, and
hand signature (pen pressure and signature speed) are biometric
identifiers related to pattern of a person’s behavior. We now
discuss in more detail some of the more commonly applied
traits for these two categories.
Two factor authentication systems have also been proposed
as an approach for strengthening traditional username
password credential based systems. The use of a biometric
marker (voice) together with an additional (non-biometric)
authentication factor was analyzed in [5]; the authors conclude
that the second factor may not contribute to strengthen the
overall protocol. Combining biometrics with mobile
technology has also been studied together with a username
password authentication factor [6]. The paper examines the use
of facial, voice, and gestures, revealing issues in usability and
performance, in particular noting that facial and voice are not
universally usable. A further study reported an alternative view
in which biometrics are considered more usable in comparison
to passwords on a mobile device [7]. Several additional
approaches to using biometrics have also been investigated,
such as biometrics authentication as a service for enterprise
identity management [8], approaches to using biometrics in
authentication in ad-hoc networks without the presence of an
authentication server [9], and augmenting traditional web
applications with a voice biometric authentication capability to
improve confidence in the customer identity and reduce
transaction fraud [10].
A. Physiological Biometric Identifiers
The fingerprint is uniquely identified by a pattern of ridges
and valleys, known as minutiae features, on the surface of the
fingertip. The fingerprint of each finger is different and is
unique for each individual, including identical twin. Fingerprint
formation is fully developed during the first seven months of
fetal development. The pattern remains stable over a person’s
lifetime with exception of damage caused by external factors
such as injury or disease. The distinct features of the fingerprint
are segmented and extracted through advanced image
processing techniques after the live scan. Correlation-based
matching and pattern-based (ridges or valleys) matching are the
common fingerprint identification techniques used.
Hand geometry is a biometric that identifies an individual
by the shape, size of palm, length and width of fingers of the
hand. Standard optical camera or flat-bed scanners are common
devices used to capture hand images in hand geometry
recognition systems. In many cases finger position guides are
used to ensure consistency of hand image capture. The key
features of the person hand are extracted from the black and
white silhouette of the digitized grey scale hand image. Some
of the common matching approaches used include Euclidean
distance metrics, correlation method and principal component
analysis [14].
Finally, we observe the literature related to understanding
the risk and challenges of using biometric [11–13]. In [11], the
authors disclose biometric uses and corresponding security and
privacy issues of using these, suggesting that biometrics does
indeed raise several privacy concerns and that a sound trade-off
between security and privacy may be necessary. A further
investigation of issues concerning biometric profiling is
presented in [12], where it is observed that biometrics may be
used as a source for profiling information with the risks
including loss of control over personal data, concerns in
discrimination, and legal implication. Schneier remarks that
while biometric identifiers are difficult to forge they are easy to
steal [13]. Moreover, he observes that biometric data are
unique identifiers but are not secrets; once it is stolen there is
no mechanism to revoke the identifier, it is effectively stolen
for life [13].
The iris is composed of a random texture pattern within the
human eye and is unique for each individual including identical
twin. Iris patterns on the left and right eyes are also different.
The iris pattern stabilizes within the first 2 years of life and
remains unchanged unless there is damage due to eye disease
(e.g. cataract) or unsuccessfully eye surgery. A common
approach for iris recognition systems is to apply near infrared
light to acquire iris images. This is more effective in revealing
rich texture for dark brown eyes compared to light colored
eyes. The iris code can be generated in one dimension using
normalization resolution levels of iris features, or two
dimensions using techniques such as Gabor filters [15] and
Laplacian pyramid [16]. The Hamming distance [17] and
Fisher discriminant [18] are some of the well-known matching
approaches used to measure the similarity of two irises. A
related biometric is the retina scan which involves detects the
patterns of veins in the back of the eye to accomplish
recognition.
The work herein may be considered an extension of this
particular focus area of risk, as an in-depth assessment of
the risks and challenges are covered for institutions and
people. In particular, noting the potential harm that may be
caused (the human aspect), which in turn will ultimately
lead to financial and legal liabilities for institutions,
whether this is due to an institutional data breach or
the universal ability to covertly steal biometric marker from
people.
Copyright
© Phang and Pavlovski 2016
Palm-print recognition measures the inner surface of the
hand. The process obtains geometric features (i.e. palm shape),
minutiae features, principal lines, wrinkles and delta point
35
ISSN (Print): 2204-0595
ISSN (Online): 2203-173
IT in Industry, vol. 4, no. 1, 2016
Published online 30-Sep-2016
features that are unique to the individual. Identical twins have
enough distinctive palm-print features for recognition
purposes. Given the richness and breadth of palm-print
features, it is considered a more accurate biometric identifier
compared to hand geometry and fingerprints. Methods used to
represent palm-prints can be divided into five categories [19],
these are: i) line-based, ii) appearance-based, iii) local statistic
based, iv) global statistic based, and v) coding based. In
addition to the fingerprint and hand geometry matching
algorithms, the Hamming distance approach is also commonly
used to match two palm-prints.
signature; which are very difficult to mimic. Individuals must
sign their name multiple times during an enrolment process.
Enrolment can be divided into reference-based and modelbased approaches depending on the matching strategy. In
reference based systems a set of signature templates are
generated, with the features extracted from the set of enrolled
data. While a model-based system involves a statistical model
which describes the behavior of the signor which is estimated
from the enrolled data. Popular matching techniques applied
for signature recognition are dynamic time warping, hidden
Markov models and vector quantization [21].
Facial recognition involves identification based upon the
attributes of a person face. Recognition data is extracted in
either two or three dimensional facial images. There are two
broad categories to face recognition approaches. Feature-based,
which uses properties and geometric (e.g. areas, distances and
angles) relations of between facial features as recognition
descriptors. The second is an appearance-based method which
involves an analysis of the face image intensity pattern. Some
of the popular matching algorithms used include Principal
component analysis, Linear Discriminant Analysis and Tensor
faces, Manifold Learning method, and Kernel method [20].
Gait recognition is the identification of a person based on
the manner in which they walk. This can be used to from a
distance which make this trait suitable appropriate in
surveillance applications. Model based gait recognition
techniques involve extraction of spatial-temporal attributes of a
moving individual. This is derived from the silhouette or
optical flow associated with a set of dynamically moving
points of the moving human body and used to describe the gait
of an individual. Approaches that recognize individual through
binary gait silhouette sequence belong to appearance-based
approaches.
Deoxyribonucleic acid (DNA) is classified as a chemical
biometric. This marker may be used for authentication and the
identification of an individual is achieved through the analysis
of partial segments of the DNA strand.
Keystroke dynamic is determined by how a person types on
a keyboard and is based upon habitual typing rhythmic
patterns. While this trait is not as unique as other biometric
traits, the minor variation is said to offer sufficient
discriminatory information to identify a person. Some of the
common keystroke recognition techniques include static at
login which observes typing pattern using a known keyword or
phrase, periodic dynamic that analyses the typing pattern
characteristic over a specific timeframe, and continuous
dynamic which monitors the typing behavior during a series of
interactions. Other techniques include keyword-specific,
achieved by continuously monitoring the typing pattern for
specific set of keywords and digraph latency which measures
the time between the key-up and next key-down action.
B. Behavioural Biometric Identifiers
Voice as an authenticator may be applied with a
combination of acoustic and behavioral patterns. The acoustic
patterns are influenced by the shape and size of vocal tracts,
mouth, and nasal cavities, while the behavioral patterns are
defined by voice pitch, speaking style, and sociolinguistic trait.
The acoustic patterns are more stable than behavioral patterns
over time due to age, medical conditions, and emotional state.
The key features extracted from a person voice forms the voice
print used for authentication. Template matching and feature
analysis are two widely used voice recognition approaches.
The goal of matching is used to find similarities between the
stored and the actual voice print. Template matching involves
detection of a near-exact match between a previously stored
voice print and the voice print to be authenticated. For feature
analysis, voice data for matching is processed using statically
models like Fourier transformations, hidden Markov models or
Gaussian mixture models to generate the voice print. Textdependent and text-independent are two types of commercially
used voice recognition systems. The matching of the former
system is based on utterance of fixed predetermined phrase for
enrollment and for verification, whilst there is no constraint on
the speech content for the latter in the matching process.
IV. BIOMETRIC APPLICATIONS IN PRACTICE
In the past, the application of biometric technology has
predominantly been used for forensic purposes such as
fingerprint collection at a crime scene or determining heritage
via DNA matching. The adoption of biometric technology to
solve other business problems has increased as the technology
has matured. These solutions can be generally categorized into
commercial and government applications. The government
applications may include national identification cards, driving
licenses, and passports. These have subsequently been
extended for use in border control, passport control and
welfare-disbursement. For example, recent border control
systems allow travelers to use a kiosk then pass through a facial
recognition system that is compared with the image stored on
an e-passport microchip to verify the person.
Hand written signatures are a behavioral characteristic of a
person signing their name. Signature recognition can be
operated in off-line or on-line manner. Off-line analysis detects
the similarity of the signature shape for two digitized static
signature images. On-line mode refers to acquiring signature in
real time using acquisition devices like touch screens or
digitizing tablets and capturing dynamic features like position
trajectories, timing, pressure, speed of signing and size of
Copyright
© Phang and Pavlovski 2016
Some governments have adopted Iris recognition
technology for social benefit claim, while humanitarian
organizations use this for aid distribution control to manage aid
entitlement for people. More recently, Amber Alert, a face
recognition technology, has been launched by government
agencies in various countries and social media company to find
36
ISSN (Print): 2204-0595
ISSN (Online): 2203-173
IT in Industry, vol. 4, no. 1, 2016
Published online 30-Sep-2016
missing persons [22, 23]. In some countries biometric
technology is used to prevent voter fraud. The Mobile Offender
Recognition and Information System (MORIS) has been
developed for police officers to scan biometrics and retrieve
any criminal history of a subject in near real time [24].
Surveillance monitoring is another application where law
enforcement authorities apply facial identification technology
to identify criminal in the live surveillance streaming at airport.
This type of application is also common in places such as
Casinos to identify and alert relevant staff to the presence of
blacklisted or high risk customers.
in many sensitive and public areas for close monitoring and
negative recognition (i.e. prevent a single person from using
multiple identities by establishing whether the person is who
that person implicitly or explicitly denies being). Banks also
use biometrics as negative recognition to prevent lawbreaker
from creating new accounts or lines of credit.
Biometrics based time and attendance terminals are
becoming increasingly popular in many industries to ensure
that employees cannot clock-in for one another, thereby
preventing employee time theft. This concept has also been
adopted in the education industry to track accurate student
attendance, and in distance learning to ensure students actually
attended the minimum number of hours for online lectures.
Many banks have deployed biometric based Automatic Teller
Machines to prevent fraudulent withdrawals using fake, lost or
stolen credit cards. In the U.S, some retail stores have deployed
biometric systems to help customer cash their pay-checks or
make a payment after a purchase.
The commercial applications of biometric technology are
more extensive. The applications include wireless
authentication, device security authentication, logical access
control, physical access control, negative recognition, time and
attendance, and transactional authentication. Laptops and
notebooks are now built with biometric scanning devices that
enable a user to quickly logon. Additionally, many smart
phones are equipped with cameras and biometric scanning
tools for authentication. These ideas have unlocked a range of
network, online and mobile applications to include biometric as
an alternative authentication method. For instance, there are a
number of Android applications that employ facial recognition
to ensure the application is only accessible by the purchaser or
selected user. There are also applications available that allow
the user to encrypt their document using their hand written
signature or to generate cryptographic keys based on time
functions of their hand written signatures.
V. ADOPTION CHALLENGES AND LIABILITIES
In this section some of the challenges of adopting biometric
authentication in practice are presented. Invariably many of
these challenges may be addressed with improvements in
sensory technology. However, biometric identity theft presents
a difficult challenge to industry and is likely to compound as
biometrics adoption becomes more widespread. Moreover, an
analysis is presented of the potential liabilities that institutions
may incur due to biometric data breaches and general biometric
identify theft from individual due to malicious surveillance.
Banking, telecommunications, and the health sector are the
few major industries that use biometrics for granting controlled
logical access. The solutions rely upon the native biometric
capability built into smartphones and notebooks and enable
customers to access their financial and phone accounts. Some
financial institutions use passive speaker recognition to verify
telephone customers [25], while telecommunications carriers
have adopted voice recognition to identify telephone
customers, with the aim to reduce the operational cost of the
call center. The media industry uses voice biometrics to
control access to media content for media authors, producers,
and final users. In the health industry, biometric systems are
used by medical staff and patients to access patient electronic
medical records. Furthermore, some hospitals leverage hand
vascular systems in their medical supply dispensation systems
to ensure that restricted and expensive drugs are not stolen.
A. General Challenges in Practice
While the matching accuracy of fingerprints to identify a
person is relatively high, fingerprint recognition still faces
challenges with the poor quality of acquired data due to several
issues. This includes large pixel displacement of fingerprints
(resulting from different finger location on the sensor during
acquisition), non-linear distortion of converting three
dimensional objects to two dimensional images, and
differences in pressure applied on the sensor and varying skin
conditions of the finger. The sensor technologies available
belong to optical, ultrasound or solid-state (capacitive, thermal,
electric field, piezoelectric) families [26]. Additional problems
occur with the formation of scar tissue and dirt upon the
fingertips. Fingerprint residues are left almost everywhere by
people making them extremely vulnerable to illegal capture.
Biometric authentication for physical access control has
been widely used by the sporting and entertainment industry.
For example, controlling access to the Atlanta Olympic Village
was accomplished with the fingerprints of athletes, staff and
volunteers. The approach has been also used to manage paid
physical access where subject’s biometrics are used as the
ticket or pass. One motivation for theme park venues was to
prevent visitors buying unused ticket or partially used tickets
from others. Biometrics is often used to gain access to highly
sensitive restricted premises, such as access company data
center or a hospital operating room. Physical access control has
also widely been used in the government sector to control
highly restricted and sensitive premises such as nuclear plants.
Many government agencies have deployed biometric systems
Copyright
© Phang and Pavlovski 2016
In general, hand geometry is not very distinctive trait as one
in every 100 people have very similar hand features to another
person, hence this identifier is not suitable for identification of
an individual when drawn from large population size. Similar
to the fingerprints, humans leave residue of the hands
constantly and hence the ability to capture hand geometry is
straightforward for a threat actor. Hand geometry varies across
a persons’ age due to physiological changes of the person (e.g.
physical growth or weight gain). Template adaptation
techniques that adapt the hand geometry to the individual’s
physiology changes over time and has shown to improve
matching performance [14]. The advantage of this identifier is
that factors like weather or individual anomalies do not affect
the accuracy of recognition. However, obstructions such as
37
ISSN (Print): 2204-0595
ISSN (Online): 2203-173
IT in Industry, vol. 4, no. 1, 2016
Published online 30-Sep-2016
rings, dirt, and large bandages could affect the matching
performance. Conversely, palm-print recognition faces both
challenges of physical changes over time and external
obstructions that hinder the performance of the system.
when an organization collects data for one purpose and decides
to apply this for another purpose, without the person’s consent,
they are likely to be ethical and liable ramifications. For
instance, a recent lawsuit on facial recognition software is a
classic example where users sued an organization for violating
their privacy by identifying and tagging them in photos without
their consent [30].
The matching performance of commercially available facial
recognition systems are constrained due to factors such as
facial poses, camera view points, ageing, makeup, and
eyeglass. In particular, illumination and expressions conditions
have been the focus of face recognition research. Computer
vision approaches such as Active Appearance Models and
Elastic Bunch Graph Matching have been shown to improve
the recognition performance for facial images with different
poses and facial expression [27].
Another privacy challenge is the covert collection of an
individual’s biometric without a person’s knowledge, and the
subsequent masquerade and use without consent. The human
face may now be captured in a very straightforward manner,
without the person being aware. This is more simplistic with
the era of social media where facial images or video can be
downloaded from a persons’ social media site. Similarly,
fingerprint can be easily obtained from latent prints on any
touched surface.
The accuracy and the speed of iris recognition is very high.
The iris system has very low False Acceptance Rate (FAR), but
rather has a high False Rejection Rate (FRR) compared to other
biometric traits [28]. The major challenge of iris recognition is
the hippus movement of pupil due to changes in lighting
condition. While this movement is used to measure the
liveliness of the iris, it distorts the iris pattern which result in
high FRR when performing matches against it. Although
techniques can be used to restore the iris pattern to desired
pupil size [29]. Other major problems include poor quality of
iris images acquired due to eyelid, eyelashes, and reflections
hindering the iris features extraction.
Many biometrics, especially behavioral biometrics, could
reveal secondary information about an individual. This may
include general health disposition, the likely occupation, and
social economic status. In some cases, the secondary
information may be used to place those individuals at a
disadvantage. The majority of the biometric data captured and
stored are unregulated and there are very few regions that have
biometrics information privacy acts to protect the public from
misuse. Moreover, there is no law (to date) that restricts others
from collecting biometric data without a person’s knowledge.
While the regulatory constraints are not in place the prospect of
human biometric data being used beyond what is initially
consented to is very high.
While DNA is a very distinctive trait the key challenge in
the adoption of DNA based biometric system has been due to
the debate regarding its potential for misuse and this being
generally intrusive; (i.e. human profiling, and health status, and
ethics).
The human voice pattern not a very distinctive identifier
and the accuracy of voice recognition systems in authentication
are affected by changes in behavioral patterns of the voice,
background noise and differences in the devices used between
enrolment and voice recognition stage.
When a personal identity is stolen today, one may
ultimately resort to changing their name. Given the intrinsic
properties of biometric identity to an individual, the ability to
change this identifier will no longer be available – once stolen
the person is impacted for the remainder of life and all
authentication systems that rely upon this data are effectively
compromised. Not only is it relatively easy to obtain raw
biometric data of a person in public, many biometric systems in
place have flaws in protecting both the biometric data and
personal identifiable information stored. For example, security
flaws are noted in an e-passport system [31], where attackers
can access the RFID in the passport, which contains digitally
signed biometric information, wirelessly without the passport’s
holder knowledge.
The gait of a person can be modified by many factors
which changes the normal locomotive traits, in some cases
permanently. The factors include extrinsic such as footwear
and clothing, intrinsic such as age, and physical attributes such
as weight & height. In addition, pathological insults can also
influence a persons’ gait; this includes trauma, musculoskeletal
anomalies, and psychiatric disorders.
Hand related behavioral biometrics such as keystroke
dynamic and signatures are not common. Factors like
emotional state, type of keyboard used and its position with
respect to the person could vary the person’s typing pattern.
While the key disadvantages of hand signature recognition are
the large intra-class variation and the behavior is influenced by
physical and emotional conditions.
If the digitized biometric data is not encrypted either at rest
or in transit, it will be subjected to man-in-the-middle
(interception) attacks. Furthermore, if an institution trusts a
new biometric system beyond appropriate levels, then they run
the risk of assuming identities and transactions are legitimate
when they may not be. Moreover, they may initially place the
onus on the customer to show that a transaction is fraudulent,
rather than the institution demonstrating that the transaction
was legitimate. If an imposter can spoof a biometric
characteristic, perhaps by creating a false finger, they may be
able to enroll or use a service without having to produce the
traditional identity documents that would normally be required.
B. Privacy Implictions of Biometric Authentication
While many early adopters of biometric technology see the
benefits in improving cost-effectiveness, improved efficiency,
and better customer service, this technology may well have
implications on human rights and privacy issues for those who
take part. Biometric data is mostly collected along with the
personal identifiable information of an individual. However,
Copyright
© Phang and Pavlovski 2016
38
ISSN (Print): 2204-0595
ISSN (Online): 2203-173
IT in Industry, vol. 4, no. 1, 2016
Published online 30-Sep-2016
as intended. However, the key challenge and implications of
biometric identity theft require much deeper consideration by
institutions considering the adopting of biometric markers for
authentication.
C. Biometric Identiy Theft: The Liabilities
The most obvious challenge with the use of biometric
markers for authentication is the propensity of these markers to
be easily stolen. Human biometric markers are generally
visible to everyone with people leaving physical residues on
everything we touch, everywhere we go. Hence, many traits
can be obtained in a generally straightforward manner using
commodity technology available in the marketplace. Moreover,
camera technology is sufficiently mature to enable high
resolution photography of facial features, geometric attributes,
and observable characteristics. For example, researchers from
Carnegie Mellon University have recently made covert
collection of iris scans, one of the most difficult biometric
markers to acquire, in good quality without the persons’
cooperation; this has been achieved from a distance of 12
meters from the target individual [32]. The most important
implication of this theft, as pointed out by Schneier [13], is that
once the biometric marker is stolen “it is stolen for life” and
can no longer be used again. Conversely, when a password is
stolen, this can be changed.
With conventional (non-biometric) identifiers, when a
person is victim to identity theft today, they may ultimately
resort to changing their name or identity; as this typically
involves non-biometric identifiers such as name, age, and
national identifier. This last resort measure is longer applicable
to biometric identifiers, since once stolen the person is
impacted from that point on and all IT systems that rely upon
the stolen biometric marker are also immediately
compromised.
Finally, the financial and legal impact that may be felt by
an organization that sustains a data breach of biometric data
may be considerable and long lasting. The impact may be felt
from its customers, the market, regulatory bodies, and
competing organizations. While the use of biometric markers is
still in its infancy, some of these risks may appear more
measured. However, as the technology becomes more widely
used and is becomes prevalent, the impacts are likely to grow
and become more substantial.
In general, there are two common biometric identity theft
scenarios: i) data breaches sustained by an organization and ii)
the general theft of biometric markers from illegitimate
surveillance by a threat actor. Moreover, where an institution
provides a biometric authentication capability to users without
an alternative authentication option, (i.e. the user has no choice
but to use it), it is likely that the institution is also liable for the
compromise of any customer account from biometric theft, due
to the ease of which biometric markers may be stolen.
Furthermore, once they are stolen, the institution will
ultimately require an alternative form of authentication, since it
is not possible to change biometric markers as one would easily
change a lost or stolen password.
Notwithstanding, where institutions decide to provide a
biometric authentication mechanism it seems prudent that at a
minimum the user be able to opt-out of using biometric data
and be provided with a suitable alternative authentication
system that does not involve biometric markers.
ACKNOWLEDGMENT
The authors are employees of the Commonwealth Bank of
Australia. Any views or opinions expressed in this article are
the author's own and do not necessarily reflect the view of the
Commonwealth Bank.
The potential consequences to an organization include
detrimental impact to corporate brand, loss of reputational
status, and erosion of trust within the marketplace. Further,
there are likely to be regulatory penalties imposed by
authorizes on any data breach that pertains to biometric data.
There is also the likelihood of class action legal pursuit from
the aggrieved customers for compensation. Furthermore, the
potential for additional financial impact from competing or
partner organizations exists. A company which sustains a data
breach of customers’ biometric data may also be liable to pay
for the losses (and other maintenance costs) of other companies
which uses the same biometric data of compromised
customers.
REFERENCES
[1]
[2]
[3]
[4]
VI. DISCUSSION AND CONCLUSIONS
There are several motivations to apply biometrics markers
for authentication purposes to the industry. This includes ease
of use for customers, cost-effective solution alternative, and
relative fast and efficient means of user authentication. The
application of these emerging techniques can also be viewed by
the industry as being market leading for the institution adopting
such technologies. While these benefits may be appealing there
are several key challenges facing the use of biometrics markers
that have been discussed. Many of the challenges are technical
obstacles in ensuring the authentication technologies function
Copyright
© Phang and Pavlovski 2016
[5]
[6]
[7]
39
A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, “The tangled
web of password reuse”, Network and Distributed System Security
(NDSS) Symposium, 2014.
M. Kosmerlj, T. Fladsrud, E. Hjelmas, and E. Snekkenes, “Face
recognition issues in a border control environment”, in International
Conference on Biometrics (ICB 2006), pp. 33–39.
T. Kwon and H. Moon, “Biometric authentication for border control
applications”, IEEE Transactions on Knowledge and Data Engineering,
vol. 20, no. 8, Aug 2008, pp. 1091–1096.
S. M. Rahal, H. A. Aboalsamah, and K. N. Muteb, “Multimodal
biometric authentication system – MBAS”, Information and
Communication Technologies, vol. 1, 2006, pp.1026–1030.
C. Rathgeb and A. Uhl, “Two-factor authentication or how to potentially
counterfeit experimental results in biometric systems”, in International
Conference Image Analysis and Recognition (ICIAR), 2010, pp. 296–
305.
S. Trewin, C. Swart1, L. Koved, J. Martino, K. Singh, and S. BenDavid, “Biometric authentication on a mobile device: a study of user
effort, error and task disruption”, in Proceedings of the 28th Annual
Computer Security Applications Conference (ACSAC), ACM, 2012, pp.
159–168.
L.M. Mayron, “Biometric authentication on mobile devices”, IEEE
Security and Privacy, vol. 13, no. 3, pp. 70–73, June 2015.
ISSN (Print): 2204-0595
ISSN (Online): 2203-173
IT in Industry, vol. 4, no. 1, 2016
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
Published online 30-Sep-2016
C. Senk and F. Dotzler, “Biometric authentication as a service for
enterprise identity management deployment: a data protection
perspective”, International Conference on Availability, Reliability and
Security, Aug 2011, pp. 43–50.
Q. Xiao, “A biometric authentication approach for high security ad-hoc
networks”, in Proceedings from the Fifth Annual IEEE SMC
Information Assurance Workshop, June 2004, pp. 250–256.
A. Kounoudes,V. Kekatos, and S. Mavromoustakos, “Voice biometric
authentication for enhancing Internet service security”, Information and
Communication Technologies, 2006, vol. 1, pp. 1020–1025.
S. Prabhakar, S. Pankanti, and A.K. Jain, “Biometric recognition:
security and privacy concerns”, IEEE Security and Privacy, 2003, pp.
33–42.
E. Kindt, “Need for legal analysis of biometric profiling”, in Profiling
the European Citizen, Cross-Disciplinary Perspectives, M. Hildebrandt
and S. Gutwirth. Springer Science, 2008, pp. 139–145.
B. Schneier, “The uses and abuses of biometrics”, Communications of
the ACM, vol. 42, no. 8, p. 136, Aug 1999.
N. Duta, “A survey of biometric technology based on hand shape”,
Pattern Recognition, vol. 42, no. 11, pp. 2797–2806, 2009.
L. Ma, Y. Wang, and T. Tan, “Iris recognition based on multichannel
Gabor filtering,” in Proceedings of the Fifth Asian Conference on
Computer Vision, Melbourne, Australia, 2002, pp. 279–283.
R. Wildes, J. Asmunth, G. Green, S. Hsu, R. Kolczyski, J. Matey, and S.
McBride, “A machine-vision system for iris recognition”, Machine
Vision and Applications, Springer-Verlag, vol. 9, no. 1, pp.1–8, 1996.
J. Daugman, “Demodulation by complex-valued wavelets for stochastic
pattern recognition,” International Journal of Wavelets, Multiresolution
and Information Processing, vol. 1, no. 1, pp. 1–17, 2003.
L. Ma, T. Tan, Y. Wang, and D. Zhang, D., “Local intensity variation
analysis for iris recognition”, Pattern recognition, vol. 37, no. 6, pp.
1287–1298, 2004.
W. Q. Yan, 2016, “Biometrics for surveillance”, in Introduction to
Intelligent Surveillance, Springer, pp. 85–92, 2016.
I. Sujit and A. M. Patil, “A review on image-based face recognition
techniques”, International Journal of Engineering Research and
Management (IJERM), Vol. 2, no. 1, pp. 47–50, 2015.
M. Faundez-Zanuy, “On-line signature recognition based on VQ-DTW”,
Pattern Recognition, vol. 40, no. 3, pp. 981–992, 2007.
J. Pereira and L. Sher, “How you can help find a missing child on
Facebook with new amber alert feature”, ABC News, viewed 2 Mar.
Copyright
© Phang and Pavlovski 2016
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
40
2016. [Online]. Available: http://abcnews.go.com/Technology/findmissing-child-facebook-amber-alert-feature/story?id=28173570
The European Child Rescue Alert and Police Network on Missing
Children, “AMBER alert Europe partners up with Facebook to save lives
of missing children”, AMBER Alert in the news, viewed 2 Mar. 2016.
[Online]. Available: http://www.amberalert.eu/amber-alert-europepartners-up-with-facebook-to-save-lives-of-missing-children/
E. Steel, “How a new police tool for face recognition works”, The Wall
Street Journal, viewed 2 Mar. 2016. [Online]. Available:
http://blogs.wsj.com/digits/2011/07/13/how-a-new-police-tool-for-facerecognition-works/
M. Warman, “Say goodbye to the pin: voice recognition takes over at
Barclays Wealth”, The Telegraph, viewed 2 Mar. 2016. [Online].
Available: http://www.telegraph.co.uk/technology/news/10044493/Saygoodbye-to-the-pin-voice-recognition-takes-over-at-BarclaysWealth.html
D. Maltoni, “A tutorial on fingerprint recognition”, in Advanced Studies
in Biometrics, Springer Berlin Heidelberg, pp. 43–68, 2005.
R. Sharma and M. S. Patterh, “Face recognition using face alignment
and PCA techniques: a literature survey”, IOSR Journal of Computer
Engineering (IOSR-JCE), vol. 17, no. 4, Ver. III, p. 17–30, 2015.
T. Mansfield, G. Kelly, D. Chandler, and J. Kane, “Biometric product
testing final report”, Centre for Mathematics and Scientific Computing,
National Physical Laboratory, Middlesex, UK, 2001.
S. S. Phang, Investigating and Developing a Model for Iris Changes
under Varied Lighting Conditions, Master thesis, School of Engineering
Systems, Faculty of Built Environment and Engineering, Queensland
University of Technology, 2007.
C. Zara, “Facebook keeps getting sued over face-recognition software,
and privacy groups say we should be paying more attention”,
International Business Times, viewed 29 Mar. 2016. [Online].
Available: http://www.ibtimes.com/facebook-keeps-getting-sued-overface-recognition-software-privacy-groups-say-we-2082166
V. Pasupathinathan, J. Pieprzyk, and H. Wang, “Security analysis of
Australian and E.U. E-passport implementation”, Journal of Research
and Practice in Information Technology, Vol. 40, no. 3, August 2008,
pp. 187–205.
S. Venugopalan, U. Prasad, K. Harun, K. Neblett, D. Toomey, J.
Heyman, and M. Savvides, “Long range iris acquisition system for
stationary and mobile subjects”, in International Joint Conference
Biometrics (IJCB), IEEE, 2011, pp. 1–8.
ISSN (Print): 2204-0595
ISSN (Online): 2203-173