Biometric Authentication-Risks and advancements in biometric security systems

Authors

  • Gaurav Malik Goldmaan Sachs, United States

DOI:

https://doi.org/10.32996/jcsts.2024.6.3.14

Keywords:

Biometric Authentication, Security, Machine Learning, Data Protection, Privacy Concerns.

Abstract

Biometric authentication is a fast-growing, novel technology that makes the identity verification process secure and user-friendly with unique physiological and behavioral indicators. The paper attempts to meet a theory on biometric systems' development, hazards and constraints by examining various biometric technologies like fingerprint, facial acknowledgement, iris checking, and behavioral biometrics. The integration of machine learning and artificial intelligence has made these systems more accurate and reliable, and hence, they can be used on mobile devices, banks, and border control. Since biometric authentication systems are beneficial, there are many risks, including privacy, data breaches, spoofing attacks and regulatory issues. While these risks are unavoidable as more and more organizations are embracing biometric systems, it is only right that data protection is strong, that legal frameworks are abided by, and that the practice is ethical. The paper explains the need to balance security and user convenience that takes care of the secure storage and transmission of biometric data and maintains compliance with evolving regulations. In addition, it stresses the importance of repeatedly observing and updating the biometric authentication systems to guarantee their integrity and security. Biometric authentication is poised to become a powerful tool for increasing security in many sectors. However, this success depends largely on considering different technological, legal and ethical factors to diminish any risks such a system might present.

Downloads

Published

2024-08-25

Issue

Section

Research Article

How to Cite

Gaurav Malik. (2024). Biometric Authentication-Risks and advancements in biometric security systems. Journal of Computer Science and Technology Studies, 6(3), 159-180. https://doi.org/10.32996/jcsts.2024.6.3.14