Abstract
Biometrics are physiological features that allow individuals to be identified. Popular biometrics include fingerprints, faces, and irises. A common use of biometric systems is to authenticate users desiring access to a system or resource. Universal Access can be promoted with biometrics. Biometrics provide a secure way to access information technology, although the use of biometrics presents challenges and opportunities unique to other authentication methods (such as passwords and tokens). Biometric systems are also vulnerable to poor usability. Such systems must be engineered with wide user accessibility and acceptability in mind, but also need to provide robust security. This paper considers the application of biometrics in Universal Access systems with regards to usability and security.
Chapter PDF
Similar content being viewed by others
References
Stephanidis, C.: The Universal Access Handbook. CRC (2009)
Bahr, G.S., Mayron, L.M., Gacey, H.J.: Cyber risks to secure and private universal access. In: Stephanidis, C. (ed.) Universal Access in HCI, Part I, HCII 2011. LNCS, vol. 6765, pp. 433–442. Springer, Heidelberg (2011)
Al-Harby, F., Qahwaji, R., Kamala, M.: Users acceptance of secure biometrics authentication system: Reliability and validate of an extended utaut model. Networked Digital Technologies, 254–258 (2010)
Toledano, D., Fernández Pozo, R., Hernández Trapote, Á., Hernández Gómez, L.: Usability evaluation of multi-modal biometric verification systems. Interacting with Computers 18(5), 1101–1122 (2006)
Jain, A., Ross, A., Nandakumar, K.: Introduction to biometrics. Springer (2011)
Cohen, S., Ben-Asher, N., Meyer, J.: Towards information technology security for universal access. In: Stephanidis, C. (ed.) Universal Access in HCI, Part I, HCII 2011. LNCS, vol. 6765, pp. 443–451. Springer, Heidelberg (2011)
Braz, C., Robert, J.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conferenceof the Association Francophone d’Interaction Homme-Machine, pp. 199–203. ACM (2006)
Cranor, L., Garfinkel, S.: Guest editors’ introduction: Secure or usable? IEEE Security & Privacy 2(5), 16–18 (2004)
Kumar, N.: Password in practice: a usability study. Journal of Global Research in Computer Science 2(5), 107–112 (2011)
Sasse, M.: Computer security: Anatomy of a usability disaster, and a plan for recovery. In: Proceedings of CHI 2003 Workshop on HCI and Security Systems. Citeseer (2003)
Sasse, M., Brostoff, S., Weirich, D.: Transforming the weakest linka human/computer interaction approach to usable and effective security. BT Technology Journal 19(3), 122–131 (2001)
Greene, S.: Security Policies and Procedures: Principles and Practices. Prentice Hall Security Series. Prentice-Hall, Inc. (2005)
Pfleeger, C., Pfleeger, S.: Security in computing. Prentice Hall PTR (2006)
Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? a field trial investigation. People and Computers, 405–424 (2000)
Patrick, A.S.: Usability and acceptability of biometric security systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 105–105. Springer, Heidelberg (2004)
International Organization for Standardization: 9241-11. Ergonomic Requirements for Office Work with Visual Display Terminals (VDTs)–Part II Guidance on Usability (1998)
Shneiderman, B.: Universal usability. Communications of the ACM 43(5), 84–91 (2000)
Kainda, R., Flechais, I., Roscoe, A.: Security and usability: Analysis and evaluation. In: ARES 2010 International Conference on Availability, Reliability, and Security, pp. 275–282. IEEE (2010)
Whitten, A., Tygar, J.: Why johnny cant encrypt: A usability evaluation of pgp 5.0. In: Proceedings of the 8th USENIX Security Symposium, vol. 99. McGraw-Hill (1999)
Garfinkel, S.: Design principles and patterns for computer systems that are simultaneously secure and usable. PhD thesis, Massachusetts Institute of Technology (2005)
Riley, C., Buckner, K., Johnson, G., Benyon, D.: Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society 24(3), 295–306 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mayron, L.M., Hausawi, Y., Bahr, G.S. (2013). Secure, Usable Biometric Authentication Systems. In: Stephanidis, C., Antona, M. (eds) Universal Access in Human-Computer Interaction. Design Methods, Tools, and Interaction Techniques for eInclusion. UAHCI 2013. Lecture Notes in Computer Science, vol 8009. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39188-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-39188-0_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39187-3
Online ISBN: 978-3-642-39188-0
eBook Packages: Computer ScienceComputer Science (R0)