際際滷

際際滷Share a Scribd company logo
Problems with Biometric
                                                                    Authentication




Problems with Biometric Authentication

   NSF (National Science Foundation,USA) Report: Who Goes There?
   Authentication through the Lens of Privacy
   Recommendation: Biometric Technologies should not be used to authenticate users via
   remote authentication servers because of the potential for large-scale privacy and
   security compromises in the event of a successful attack (either internal or external)
   against such servers. The use of biometrics for local authentication  for example, to
   control access to a private key on a smart card  is a more appropriate type of use for a
   biometric.



Pitfalls with Biometric Authentication mechanisms:
      False Acceptance/False Rejection tradeoff
            Acceptable false rejection rate usually means non-negligible false acceptance
              rate
            Very expensive testing required to fully characterize
      Biometrics readers often can be fooled by artifacts
            Liveness detection largely a research topic
                   Very expensive testing needed to verify
            For high assurance the reader should be attended or at least observed until we
              get verifiably strong liveness detection

Challenges to be addressed with Biometrics:
In theory, biometrics are a great way to authenticate a user: it's impossible to lose your
fingerprint, you can't forget it like you could a password, and it's unique to you. In practice,
though, there are so many things that, for now, limit a more widespread use of this technology.

One of the problems is its uniqueness the thing that makes using biometric data an inherently
flawed choice for a primary method of authentication. Once you have your fingerprint scanned
it will give a unique data sequence which if compromised is not exactly something you can
change. Imagine having an option of only one password 'ever'. One loss and your identity is
compromised for-ever.

Another problem is that current scanners still can't recognize if the fingerprint is on a real finger
or an artificial one. In theory, one could get a hold of the user's fingerprint using techniques
used in crime detection and transfer it on an artificial finger. This will likely change as the
technology evolves, but for now the system is still fallible, and not suitable to be a primary
solution to the authentication problem.


                               ArrayShield | info@arrayshield.com                          Page 1

More Related Content

Similar to Problems with biometric authentication (20)

Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
GQ Research
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
Abduhalim Beknazarov
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Hai Nguyen
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
Bahaa Abdulhadi
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
International Center for Biometric Research
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
Vignesh Ravichandran
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
Ouzza Brahim
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
Srikanth457
CHAPTER - 6 - Authentication and Access control.pptx
CHAPTER - 6 - Authentication and Access control.pptxCHAPTER - 6 - Authentication and Access control.pptx
CHAPTER - 6 - Authentication and Access control.pptx
KemalHussen
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
Seetu
SeetuSeetu
Seetu
seetumishra2511
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
nishiyath
Biometrics
BiometricsBiometrics
Biometrics
Satish Chandra
Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
Arhind Gautam
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
Arsalan Mohammad
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
kanchannawkar
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
GQ Research
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Hai Nguyen
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
Bahaa Abdulhadi
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
Ouzza Brahim
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
Srikanth457
CHAPTER - 6 - Authentication and Access control.pptx
CHAPTER - 6 - Authentication and Access control.pptxCHAPTER - 6 - Authentication and Access control.pptx
CHAPTER - 6 - Authentication and Access control.pptx
KemalHussen
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
nishiyath
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
Arhind Gautam
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
Arsalan Mohammad
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
kanchannawkar

More from ArrayShield Technologies Private Limited (6)

PCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield ProductPCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield Product
ArrayShield Technologies Private Limited
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
ArrayShield Technologies Private Limited
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
ArrayShield Technologies Private Limited
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
ArrayShield Technologies Private Limited
Two Factor Authentication for Salesforce
Two Factor Authentication for SalesforceTwo Factor Authentication for Salesforce
Two Factor Authentication for Salesforce
ArrayShield Technologies Private Limited
Two Factor Authentication for Google Apps
Two Factor Authentication for Google AppsTwo Factor Authentication for Google Apps
Two Factor Authentication for Google Apps
ArrayShield Technologies Private Limited

Recently uploaded (20)

Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
ISOIEC 42001 AI Management System 際際滷s
ISOIEC 42001 AI Management System 際際滷sISOIEC 42001 AI Management System 際際滷s
ISOIEC 42001 AI Management System 際際滷s
GilangRamadhan884333
Dev Dives: Unlock the future of automation with UiPath Agent Builder
Dev Dives: Unlock the future of automation with UiPath Agent BuilderDev Dives: Unlock the future of automation with UiPath Agent Builder
Dev Dives: Unlock the future of automation with UiPath Agent Builder
UiPathCommunity
Blockchain for Businesses Practical Use Cases & Benefits.pdf
Blockchain for Businesses Practical Use Cases & Benefits.pdfBlockchain for Businesses Practical Use Cases & Benefits.pdf
Blockchain for Businesses Practical Use Cases & Benefits.pdf
Yodaplus Technologies Private Limited
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdfSECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
spub1985
Unlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & KeylockUnlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & Keylock
HusseinMalikMammadli
Getting Started with AWS - Enterprise Landing Zone for Terraform Learning & D...
Getting Started with AWS - Enterprise Landing Zone for Terraform Learning & D...Getting Started with AWS - Enterprise Landing Zone for Terraform Learning & D...
Getting Started with AWS - Enterprise Landing Zone for Terraform Learning & D...
Chris Wahl
William Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae - A Seasoned Professional RenownedWilliam Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
ThousandEyes
UiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilitiesUiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilities
DianaGray10
Caching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory DatastoreCaching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory Datastore
ScyllaDB
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
UiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and OpportunitiesUiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and Opportunities
DianaGray10
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great ProductGDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
James Anderson
Teaching Prompting and Prompt Sharing to End Users.pptx
Teaching Prompting and Prompt Sharing to End Users.pptxTeaching Prompting and Prompt Sharing to End Users.pptx
Teaching Prompting and Prompt Sharing to End Users.pptx
Michael Blumenthal (Microsoft MVP)
Not a Kubernetes fan? The state of PaaS in 2025
Not a Kubernetes fan? The state of PaaS in 2025Not a Kubernetes fan? The state of PaaS in 2025
Not a Kubernetes fan? The state of PaaS in 2025
Anthony Dahanne
AI in Medical Diagnostics The Future of Healthcare
AI in Medical Diagnostics  The Future of HealthcareAI in Medical Diagnostics  The Future of Healthcare
AI in Medical Diagnostics The Future of Healthcare
Vadim Nareyko
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
Leadership u automatizaciji: RPA prie iz prakse!
Leadership u automatizaciji: RPA prie iz prakse!Leadership u automatizaciji: RPA prie iz prakse!
Leadership u automatizaciji: RPA prie iz prakse!
UiPathCommunity
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
ISOIEC 42001 AI Management System 際際滷s
ISOIEC 42001 AI Management System 際際滷sISOIEC 42001 AI Management System 際際滷s
ISOIEC 42001 AI Management System 際際滷s
GilangRamadhan884333
Dev Dives: Unlock the future of automation with UiPath Agent Builder
Dev Dives: Unlock the future of automation with UiPath Agent BuilderDev Dives: Unlock the future of automation with UiPath Agent Builder
Dev Dives: Unlock the future of automation with UiPath Agent Builder
UiPathCommunity
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdfSECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
spub1985
Unlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & KeylockUnlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & Keylock
HusseinMalikMammadli
Getting Started with AWS - Enterprise Landing Zone for Terraform Learning & D...
Getting Started with AWS - Enterprise Landing Zone for Terraform Learning & D...Getting Started with AWS - Enterprise Landing Zone for Terraform Learning & D...
Getting Started with AWS - Enterprise Landing Zone for Terraform Learning & D...
Chris Wahl
William Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae - A Seasoned Professional RenownedWilliam Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae - A Seasoned Professional Renowned
William Maclyn Murphy McRae
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
ThousandEyes
UiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilitiesUiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilities
DianaGray10
Caching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory DatastoreCaching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory Datastore
ScyllaDB
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
UiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and OpportunitiesUiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and Opportunities
DianaGray10
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great ProductGDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
James Anderson
Not a Kubernetes fan? The state of PaaS in 2025
Not a Kubernetes fan? The state of PaaS in 2025Not a Kubernetes fan? The state of PaaS in 2025
Not a Kubernetes fan? The state of PaaS in 2025
Anthony Dahanne
AI in Medical Diagnostics The Future of Healthcare
AI in Medical Diagnostics  The Future of HealthcareAI in Medical Diagnostics  The Future of Healthcare
AI in Medical Diagnostics The Future of Healthcare
Vadim Nareyko
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
Leadership u automatizaciji: RPA prie iz prakse!
Leadership u automatizaciji: RPA prie iz prakse!Leadership u automatizaciji: RPA prie iz prakse!
Leadership u automatizaciji: RPA prie iz prakse!
UiPathCommunity

Problems with biometric authentication

  • 1. Problems with Biometric Authentication Problems with Biometric Authentication NSF (National Science Foundation,USA) Report: Who Goes There? Authentication through the Lens of Privacy Recommendation: Biometric Technologies should not be used to authenticate users via remote authentication servers because of the potential for large-scale privacy and security compromises in the event of a successful attack (either internal or external) against such servers. The use of biometrics for local authentication for example, to control access to a private key on a smart card is a more appropriate type of use for a biometric. Pitfalls with Biometric Authentication mechanisms: False Acceptance/False Rejection tradeoff Acceptable false rejection rate usually means non-negligible false acceptance rate Very expensive testing required to fully characterize Biometrics readers often can be fooled by artifacts Liveness detection largely a research topic Very expensive testing needed to verify For high assurance the reader should be attended or at least observed until we get verifiably strong liveness detection Challenges to be addressed with Biometrics: In theory, biometrics are a great way to authenticate a user: it's impossible to lose your fingerprint, you can't forget it like you could a password, and it's unique to you. In practice, though, there are so many things that, for now, limit a more widespread use of this technology. One of the problems is its uniqueness the thing that makes using biometric data an inherently flawed choice for a primary method of authentication. Once you have your fingerprint scanned it will give a unique data sequence which if compromised is not exactly something you can change. Imagine having an option of only one password 'ever'. One loss and your identity is compromised for-ever. Another problem is that current scanners still can't recognize if the fingerprint is on a real finger or an artificial one. In theory, one could get a hold of the user's fingerprint using techniques used in crime detection and transfer it on an artificial finger. This will likely change as the technology evolves, but for now the system is still fallible, and not suitable to be a primary solution to the authentication problem. ArrayShield | info@arrayshield.com Page 1