The Role of Machine Learning in Advanced Biometric Systems
Abstract
:1. Introduction
1.1. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
1.2. Continuous Biometrics
1.3. Inclusions and Exclusions
2. Negative Impact of Machine Learning on Biometrics and Methodology
2.1. Adversarial Attacks
2.2. Data Poisoning
2.3. Model Inversion
2.4. Deepfakes
2.5. Transferability of Attacks
2.6. Bias and Discrimination
2.7. Scalability Issues
2.8. Methodology
3. Recommendations to Prevent Flaws in ML-Based Biometric Systems
3.1. Strong Training Data
3.2. Adversarial Defensive Mechanisms
3.3. Regular Model Updates
3.4. Integrated Biometrics
4. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
ML | Machine learning |
DL | Deep learning |
CAPTCHA | Completely Automated Public Turing Test to Tell Computers and Humans Apart |
SVM | Support Vector Machine |
PIN | Personal Identification Number |
FMR | False Match Rate |
GAN | Generative Adversarial Network |
References
- Scheidat, T.; Leich, M.; Alexandar, M.; Vielhauer, C. Support Vector Machines for Dynamic Biometric Handwriting Classification, AIAI-2009, Workshops Proceedings. 2009. Available online: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=90ee60f5df2d679dc851f13ca28165eb03519042 (accessed on 12 October 2023).
- Rathgeb, C.; Kolberg, J.; Uhl, A.; Busch, C. Deep Learning in the Field of Biometric Template Protection: An Overview. arXiv 2023, arXiv:2303.02715v1. [Google Scholar]
- Kumar, A.; Jain, S.; Kumar, M. Comparative Study of Multi-Biometrics Authentication Using Machine Learning Algorithms. In Proceedings of the 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 14–15 March 2024; pp. 1–5. Available online: https://ieeexplore.ieee.org/abstract/document/10522125 (accessed on 8 December 2023).
- Saurova, K.E.; Hayitbaeva, D.K. Artificial Intelligence based Methods of Identification and Authentication by Face Image. Acad. Res. Educ. Sci. 2024, 5, 123–130. Available online: https://cyberleninka.ru/article/n/artificial-intelligence-based-methods-of-identification-and-authentication-by-face-image/viewer (accessed on 8 December 2023).
- Shakil, S.; Arora, D.; Zaidi, T. Feature based classification of voice based biometric data through Machine learning algorithm. Materialstoday 2022, 51, 240–247. [Google Scholar] [CrossRef]
- Pryor, L.; Mallet, J.; Dave, R.; Seliya, N.; Vanamala, M.; Boone, E. Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning, Computer Science, Cryptography, Cornell University. arXiv 2022, arXiv:2205.08371. Available online: https://arxiv.org/abs/2205.08371 (accessed on 19 December 2023).
- Umasankari, N.; Muthukumar, B. Evaluation of Biometric Classification and Authentication Using Machine Learning Techniques. In Proceedings of the 2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF), Chennai, India, 5–7 January 2023; Available online: https://ieeexplore.ieee.org/abstract/document/10083610 (accessed on 19 December 2023).
- Mahadi, M.; Mohamad, M.; Kadir, M. A Survey of Machine Learning Techniques for Behavioral-Based Biometric User Authentication. Recent Adv. Cryptogr. Netw. Secur. 2018, 31, 43–59. Available online: https://www.intechopen.com/chapters/60937 (accessed on 19 December 2023).
- Siddiqui, N.; Dave, R.; Vanamala, M.; Seliya, N. Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication. Mach. Learn. Knowl. Extr. 2022, 4, 502–518. Available online: https://www.mdpi.com/2504-4990/4/2/23 (accessed on 18 January 2024). [CrossRef]
- Rosenberg, I.; Shabtai, A.; Elovici, Y. Adversarial ML Attacks and Defense Methods in the Cyber Security Domain. ACM Comput. Surv. 2021, 54, 1–36. [Google Scholar] [CrossRef]
- Sudar, K.M.; Deepalakshmi, P.; Ponmozhi, K.; Nagaraj, P. Analysis of Security Threats and Countermeasures for Various Biometric Techniques. In Proceedings of the 2019 IEEE International Conference on Clean Energy and Energy Efficient Electronics Circuit for Sustainable Development (INCCES), Krishnankoil, India, 18–20 December 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Li, K.; Baird, C.; Lin, D. Defend Data Poisoning Attacks on Voice Authentication. In IEEE Transactions on Dependable and Secure Computing; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Shafee, A.; Awaad, T.A. Privacy Attacks against Deep Learning Models and Their Countermeasures. J. Syst. Archit. 2020, 114, 101940. [Google Scholar] [CrossRef]
- Dionysiou, A.; Vassiliades, V.; Athanasopoulos, E. Exploring Model Inversion Attacks in the Black-Box Setting. Proc. Priv. Enhancing Technol. 2023, 2023, 190–206. [Google Scholar] [CrossRef]
- Jones, V.A. Artificial Intelligence Enabled Deepfake Technology: The Emergence of a New Threat—ProQuest. Available online: www.proquest.com2020.www.proquest.com/openview/60d6b06b94904dccf257c4ea7c297226/1?pq-origsite=gscholar&cbl=18750&diss=y (accessed on 12 January 2024).
- Minaee, S.; Abdolrashidi, A.; Su, H.; Bennamoun, M.; Zhang, D. Biometrics Recognition Using Deep Learning: A Survey. Artif. Intell. Rev. 2023, 56, 8647–8695. [Google Scholar] [CrossRef]
- Mittal, S.; Thakral, K.; Majumdar, P.; Vatsa, M.; Singh, R. Are Face Detection Models Biased? In Proceedings of the 2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG), Waikoloa Beach, HI, USA, 5–8 January 2023. [Google Scholar] [CrossRef]
- Popescu, G. Biometric Technologies and the Automation of Identity and Space. In Handbook on Geographies of Technology; Edward Elgar Publishing: Cheltenham, UK, 2017; Available online: http://www.elgaronline.com/abstract/9781785361159.xml (accessed on 27 June 2023).
- Alhomayani, F.; Mahoor, M. Deep Learning Methods for Fingerprint-Based Indoor Positioning: A Review. J. Locat. Based Serv. 2020, 14, 129–200. [Google Scholar] [CrossRef]
- Hasan, M.K.; Ghazal, T.; Saeed, R.; Pandey, B.; Gohei, H.; Esmawi, A.; Abdel-Khalek, S.; Alkhassawneh, H. A Review on Security Threats, Vulnerabilities, and Counter Measures of 5G Enabled Internet-of-Medical-Things. IET Commun. 2021, 16, 421–432. [Google Scholar] [CrossRef]
- Zhang, C.; Costa-Perez, X.; Patras, P. Adversarial Attacks against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms. IEEE/ACM Trans. Netw. 2022, 30, 1294–1311. [Google Scholar] [CrossRef]
- Wang, J.; Pan, J.; AlQerm, I.; Liu, Y. Def-IDS: An Ensemble Defense Mechanism against Adversarial Attacks for Deep Learning-Based Network Intrusion Detection. In Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, 19–22 July 2021; pp. 1–9. [Google Scholar] [CrossRef]
- Akulwar, P.; Vijapur, N. Secured Multi Modal Biometric System: A Review. In Proceedings of the 2019 Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics, and Cloud) (I-SMAC), Palladam, India, 12–14 December 2019. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ghilom, M.; Latifi, S. The Role of Machine Learning in Advanced Biometric Systems. Electronics 2024, 13, 2667. https://doi.org/10.3390/electronics13132667
Ghilom M, Latifi S. The Role of Machine Learning in Advanced Biometric Systems. Electronics. 2024; 13(13):2667. https://doi.org/10.3390/electronics13132667
Chicago/Turabian StyleGhilom, Milkias, and Shahram Latifi. 2024. "The Role of Machine Learning in Advanced Biometric Systems" Electronics 13, no. 13: 2667. https://doi.org/10.3390/electronics13132667
APA StyleGhilom, M., & Latifi, S. (2024). The Role of Machine Learning in Advanced Biometric Systems. Electronics, 13(13), 2667. https://doi.org/10.3390/electronics13132667