Author:
Ding Sophia,Nunes Emilia,Bettendorff Pascal,Lin Weyde
Abstract
AbstractIn biometrics, physiological characteristics (e.g., fingerprints, facial features, voices) are measured to identify individuals. Since biometry does not share the same characteristics as other authentication techniques, such as passwords or PIN codes, it is widely used as a second-factor authentication. A fully integrated solution offers significant advantages as it aligns biometric hardware, key generation, validation, and storage with the cryptographic provider, providing a coherent control environment. As a result, designing and implementing secure biometric authentication methods requires highly specialized technical expertise and experience. In addition, as biometrics become prevalent and their integration with artificial intelligence systems increases, ethical and regulatory questions become more pressing.
Publisher
Springer Nature Switzerland
Reference33 articles.
1. National Institute of Standards and Technology. Biometrics. https://www.nist.gov/programs-projects/biometrics.
2. Ann Cavoukian and Alex Stoianov. Biometric Encryption. In Henk C. A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security, pages 90–98. Springer US, Boston, MA, 2011.
3. Kaspersky Lab. What is Biometrics? How is it used in security? https://www.kaspersky.com/resource-center/definitions/biometrics.
4. Ann Cavoukian and Alex Stoianov. Biometric Encryption. Technical report, Information and Privacy Commissioner of Ontario, March 2007.
5. GLOBALER MARKT FÜR BIOMETRIE – WACHSTUM, TRENDS, AUSWIRKUNGEN VON COVID-19 UND PROGNOSEN (2022–2027). Technical report.