Submit your papers Submit Now
International Peer-Reviewed Journal
For Enquiries: editor@iiardjournals.org
πŸ“„ Download Paper

Secure Biometric Signal Processing; A Review

Chukumeka Gift Iroanwusi, Davies Isobo Nelson, Aniefiok Tom Bassey

Abstract

In recent year, biometric technologies have become an integral part of modern authentication systems, offering distinct advantages such as convenience, uniqueness, and resistance to credential theft. However, as these systems are increasingly deployed in critical applications ranging from border control and e-governance to mobile security and financial transactions the security and privacy of biometric signal processing have emerged as paramount concerns. This study discussed the critical challenges faced by biometric systems, focusing on recognition accuracy, scalability, and ethical implications related to surveillance and consent. The study examines advanced security techniques, including cancelable biometrics, steganography and watermarking, homomorphic encryption, highlighting their potential to enhance the security of biometric data. Additionally, the integration of multimodal biometrics is discussed as a strategy to improve resilience against emerging threats like sensor attacks and template inversion. The study emphasizes the necessity of adopting privacy-by-design principles to mitigate unauthorized access and data breaches, ensuring user control over biometric information. Further, the findings underscore the importance of developing robust defense mechanisms that adapt to evolving security threats while preserving user privacy. By synthesizing recent advancements in secure biometric signal processing, this paper provides a comprehensive framework for enhancing security, usability, and efficiency in future biometric applications.

Keywords

Steganography Watermarking Cancelable Biometrics Homomorphic

References

Baldimstise, F., Kiayias, A., & Samari, K. (2017). Watermarking Public-Key cryptographic
functionalities and implementations. https://www.eprint.iacr.org/2017/557.pdf.
Barni, M. Droandi, G., & Lazzereti, R., (2015). Privacy Protection in Biometric-Based
recognition system. A marriage between cryptography and signal processing. IEEE
signal processing magazine. https://www.researchgate.net/publication
Choudhunry, B., Patrick, T., Isaac, B. Roman, V., & Halder, M.K. (2018). A survey on
biometric and cancelable biometric system. International journal of image and graphics.
18 (01).https://www.researchgate.net/publication/322680611
Christian Rathgeb, Frank Breitinger, Christoph Busch, Harald Baier. 2014. On Application of
Bloom Filters to Iris Biometrics. IET Biometrics, 3(4). (2014) 207-218. DOI:
http://dx.doi.org/10.1049/iet-bmt.2013.0049Dakic, M.
(2023). What
is
voice
recognition technology and it’s benefits. https://www.zesium.com/what-is-voice-
recognition-and-its-benefits/
Ekong V.E (n.d.). Current trends in computing: Biometrics technologies (Lecture note).
Department of computer science, University of Uyo.
Faundez-Zanuy, M. (2022). Biometrics security technology. https://www.areiv.org.
Hashim, M. M., Taha, M.S., Aman, A. H.M., Hashiam, A. H. A., Rahim, M. S. M., & Islam,
S. (2019). Securing medical data transmission systems based on integrating algorithm
of encryption and stegamography. In 2019 7th International Conference on
Mechatronics
Engineering
(ILOM)
(Pp
1-6).
IEEE.
https://www.researchgate.net/publication/341775133.
Jain, R. & Kant, C. (2015). Attack on biometric systems: An overview. International journal of
advances
on
scientific
research
1
(7).
https://www.researchgate.net/publication/322225967
Kamaldeep (2011). A review of various attacks on biometric system and their known solutions.
International Journal of Computer Technology and Application, 2(6).
Kour, J. & Verma, D. (2014). Steganogrpahy techniques. A review paper. International
Journal of Emerging Research in Managements & Technology, 3(5).
https://www.diwa/tnts/xzle.clondfront.net/61279125..
Meitei, T. G., Singh, S. A., & Majunder, S. (2018). Handbook of research on information
security
in
biomedical
signal
processing.
https://www.researchgate.net/publication/324517001
Prathusha, P., Lakshmi, K., haritha, K., divya, B. S., & Navya, B. V. (2022). An Efficient and
Privacy-Preserving Biometrics Identification Scheme In Cloud Computing. Journal of
Engineering Sciences 13(07). https://www.jespublication.com
Bayer, F., & Rathgeb, C. (2025). AMB-FHE: Adaptive multi-biometric fusion with fully
homomorphic encryption. arXiv. https://arxiv.org/abs/2503.23949
Rane, S., Wange, Y., Daper S.C., & Ishwar, P. (2013). Secure biometrics; concepts,
authentication architectures and challenges. IEEE signal processing magazine 30 (5).
https://www.ieeexplore.ieee.org/document/6582729
Rawat, M. & Kumar, N. (2020). Cancelable biometrics: A comprehensive survey artificial
intelligence review 53 (1). https://www.researchgate.net/publication/322225967.
Taha, M.S., Rahim, M.S.M; Zeebaree, D.Q, Hashim, M.M, Khadlid, H.N. (2020). Information
hiding: A tools for securing biometric information. Technology report of Kansai
university 62 (04):1383-1394. https://www.researchgate/publication/341775733.
Vain, R. & Kant, C. (2015). Attacks on Biometric systems: an overview. International Journal
of Advance in Scientific Research, 1(7): 283.
https//www.researchgate.net/publication/322225967_Attacks_on_Biometric_Systems
_An_Overview.
Yu, M., Wang,Y., & Jiang, G. (2019). High dynamic range image watermarking based on
tucker decomposition. IEEE Access. Pp(99).
https://www.researchgate.net/publication/335200734.
Office of the Victorian Information Commissioner. (2019). Biometrics and privacy: Issues and
challenges.
https://ovic.vic.gov.au/resource/biometrics-and-privacy-issues-and-
challenges/
Jain, A. K., Nandakumar, K., & Ross, A. (2021). 50 years of biometric research:
Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 147, 80–
https://doi.org/10.1016/j.patrec.2021.03.023
Maltoni, D., Maio, D., Jain, A. K., & Prabhakar, S. (2019). Handbook of fingerprint recognition
(2nd ed.). Springer. https://doi.org/10.1007/978-1-4471-6874-9