Abstract
The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has the potential to augment both access control parameters and the secure transmission of sensitive biometric data. However, despite these efforts, the amalgamation of biometric and steganographic methods has failed to transition from the research lab into real-world applications. In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing exchange of steganography keys, identifying and address legal implications, and developing industry standards.
Reference100 articles.
1. Surveying the Development of Biometric User Authentication on Mobile Phones
2. Security and Privacy in Biometrics;Campisi,2013
3. Image security and biometrics: A review;Marqués,2012
4. What Is the Dark Web?https://www.experian.com/blogs/ask-experian/what-is-the-dark-web/
5. Here’S How Much Your Personal Information Is Selling for on The Dark Webhttps://www.experian.com/blogs/ask-experian/heres-how-much-your-personal-information-is-selling-for-on-the-dark-web/
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication;International Journal of Computational and Experimental Science and Engineering;2024-09-02
2. WITHDRAWN: Hybrid Architecture for Secure Data Communication Within the Private Cloud;2024-05-07
3. Exploiting multimodal biometrics for enhancing password security;Logic Journal of the IGPL;2024-03-16
4. A Wavelet Transformation Technique and Cryptographic Encryption for Image Steganography;Lecture Notes in Networks and Systems;2024
5. A Comparative Analysis of Image Steganography Techniques in Spatial and Transform Domains;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14