SlideShare a Scribd company logo
Problems with Biometric
                                                                    Authentication




Problems with Biometric Authentication

   NSF (National Science Foundation,USA) Report: Who Goes There?
   Authentication through the Lens of Privacy
   “Recommendation: Biometric Technologies should not be used to authenticate users via
   remote authentication servers because of the potential for large-scale privacy and
   security compromises in the event of a successful attack (either internal or external)
   against such servers. The use of biometrics for local authentication – for example, to
   control access to a private key on a smart card – is a more appropriate type of use for a
   biometric.”



Pitfalls with Biometric Authentication mechanisms:
      False Acceptance/False Rejection tradeoff
           – Acceptable false rejection rate usually means non-negligible false acceptance
              rate
           – Very expensive testing required to fully characterize
      Biometrics readers often can be fooled by “artifacts”
           – “Liveness detection” largely a research topic
                  • Very expensive testing needed to verify
           – For high assurance the reader should be attended or at least observed until we
              get verifiably strong liveness detection

Challenges to be addressed with Biometrics:
In theory, biometrics are a great way to authenticate a user: it's impossible to lose your
fingerprint, you can't forget it like you could a password, and it's unique to you. In practice,
though, there are so many things that, for now, limit a more widespread use of this technology.

One of the problems is its uniqueness the thing that makes using biometric data an inherently
flawed choice for a primary method of authentication. Once you have your fingerprint scanned
it will give a unique data sequence which if compromised is not exactly something you can
change. Imagine having an option of only one password 'ever'. One loss and your identity is
compromised for-ever.

Another problem is that current scanners still can't recognize if the fingerprint is on a real finger
or an artificial one. In theory, one could get a hold of the user's fingerprint using techniques
used in crime detection and transfer it on an artificial finger. This will likely change as the
technology evolves, but for now the system is still fallible, and not suitable to be a primary
solution to the authentication problem.


                               ArrayShield | info@arrayshield.com                          Page 1

More Related Content

PDF
Examus pitch
PPTX
biometrics
PDF
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
PDF
Hazards of Biometric Authentication in Practice
PDF
IRJET - A Review of Cyber Security using Biometric Devices
PDF
Efficient and secure authentication on remote server using stegno video objec...
PDF
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
DOCX
Project proposal
Examus pitch
biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
Hazards of Biometric Authentication in Practice
IRJET - A Review of Cyber Security using Biometric Devices
Efficient and secure authentication on remote server using stegno video objec...
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Project proposal

Similar to Problems with biometric authentication (20)

PDF
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
PPTX
Biometric authentication
PPT
070327 biometrics
PDF
(2005) An Evaluation Of Fingerprint Image Quality Across An Elderly Populatio...
DOCX
Deployment of Biometrics & Password - NIST63B
PPTX
Biometric security using cryptography
PPTX
Privacy Implications of Biometric Data - Kevin Nevias
PDF
Brafton White Paper Example
PPTX
The How of Biometrics
ODP
India's UID Project: Biometrics Vulnerabilities & Exploits
PPTX
Financial services 20150503
PDF
Biometric and cyber security 1
PPT
Bio Metrics
PPTX
2019001791_Fingerprint_Authentication.pptx
PDF
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
PDF
Iciea08
PDF
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
PPTX
Biometrics Presentation By Sachin Yadav (S/W Engineer)
PDF
Iaetsd fpga implementation of rf technology and biometric authentication
PPTX
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
Biometric authentication
070327 biometrics
(2005) An Evaluation Of Fingerprint Image Quality Across An Elderly Populatio...
Deployment of Biometrics & Password - NIST63B
Biometric security using cryptography
Privacy Implications of Biometric Data - Kevin Nevias
Brafton White Paper Example
The How of Biometrics
India's UID Project: Biometrics Vulnerabilities & Exploits
Financial services 20150503
Biometric and cyber security 1
Bio Metrics
2019001791_Fingerprint_Authentication.pptx
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
Iciea08
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Iaetsd fpga implementation of rf technology and biometric authentication
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Ad

More from ArrayShield Technologies Private Limited (6)

PDF
PCQuest reviews ArrayShield Product
PDF
Compilation of phishing and keylogger attacks
PDF
What is Two Factor Authentication
PDF
Two Factor Authentication for VPN
PDF
Two Factor Authentication for Salesforce
PDF
Two Factor Authentication for Google Apps
PCQuest reviews ArrayShield Product
Compilation of phishing and keylogger attacks
What is Two Factor Authentication
Two Factor Authentication for VPN
Two Factor Authentication for Salesforce
Two Factor Authentication for Google Apps
Ad

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25-Week II
Assigned Numbers - 2025 - Bluetooth® Document
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
The AUB Centre for AI in Media Proposal.docx
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf

Problems with biometric authentication

  • 1. Problems with Biometric Authentication Problems with Biometric Authentication NSF (National Science Foundation,USA) Report: Who Goes There? Authentication through the Lens of Privacy “Recommendation: Biometric Technologies should not be used to authenticate users via remote authentication servers because of the potential for large-scale privacy and security compromises in the event of a successful attack (either internal or external) against such servers. The use of biometrics for local authentication – for example, to control access to a private key on a smart card – is a more appropriate type of use for a biometric.” Pitfalls with Biometric Authentication mechanisms:  False Acceptance/False Rejection tradeoff – Acceptable false rejection rate usually means non-negligible false acceptance rate – Very expensive testing required to fully characterize  Biometrics readers often can be fooled by “artifacts” – “Liveness detection” largely a research topic • Very expensive testing needed to verify – For high assurance the reader should be attended or at least observed until we get verifiably strong liveness detection Challenges to be addressed with Biometrics: In theory, biometrics are a great way to authenticate a user: it's impossible to lose your fingerprint, you can't forget it like you could a password, and it's unique to you. In practice, though, there are so many things that, for now, limit a more widespread use of this technology. One of the problems is its uniqueness the thing that makes using biometric data an inherently flawed choice for a primary method of authentication. Once you have your fingerprint scanned it will give a unique data sequence which if compromised is not exactly something you can change. Imagine having an option of only one password 'ever'. One loss and your identity is compromised for-ever. Another problem is that current scanners still can't recognize if the fingerprint is on a real finger or an artificial one. In theory, one could get a hold of the user's fingerprint using techniques used in crime detection and transfer it on an artificial finger. This will likely change as the technology evolves, but for now the system is still fallible, and not suitable to be a primary solution to the authentication problem. ArrayShield | info@arrayshield.com Page 1