Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications

2: Faculty of Computers and Information, Menoufia University, Egypt
3: Sultan Moulay Slimane University, Morocco
4: Department of Computer Science and Information Engineering (CSIE), Asia University, Taiwan
5: Faculty of Electronics and Information Technology, Institute of Computer Science and Head of the Computer Systems Security Group (CSSG), Warsaw University of Technology, Poland
The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify individuals' physical and behavioural characteristics. Although there are many challenges associated with extracting, storing and processing such data, biometric and cybersecurity technologies along with artificial intelligence (AI) are offering new approaches to verification procedures and mitigating security risks.
This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including machine and deep learning architectures, emerging applications and ethical and legal concerns. Topics include federated learning for enhanced cybersecurity; artificial intelligence-based biometric authentication using ECG signal; deep learning for email phishing detection methods; biometrics for secured IoT systems; intelligent authentication using graphical one-time-passwords; and AI in social cybersecurity.
Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications is aimed at artificial intelligence, biometrics and cybersecurity experts, industry and academic researchers, network security engineers, cybersecurity professionals, and advanced students and newcomers to the field interested in the newest advancements in artificial intelligence for cybersecurity and biometrics.
- Book DOI: 10.1049/PBSE020E
- Chapter DOI: 10.1049/PBSE020E
- ISBN: 9781839535475
- e-ISBN: 9781839535482
- Page count: 290
- Format: PDF
-
Front Matter
- + Show details - Hide details
-
p.
(1)
-
1 Introduction
- + Show details - Hide details
-
p.
1
–11
(11)
In today's digital age, the convergence of Artificial Intelligence (AI) and biometric security systems has become increasingly vital for ensuring the authenticity and security of digital identities. Biometric security systems, a key component of this technological revolution, rely on the utilization of unique biological traits to authenticate individuals, such as electrocardiogram (ECG), electroencephalogram, fingerprints, iris scans, and facial recognition. By leveraging these distinctive biological traits, biometric security systems provide a robust and reliable means of verifying individuals' identities. These systems offer several advantages over traditional authentication methods, such as passwords or personal identification numbers (PINs), which can easily be compromised or forgotten. Biometric authentication is convenient, as it requires individuals to present their unique traits for identification, eliminating the need for additional tokens or passwords.
-
2 AI in biometrics and cybersecurity
- + Show details - Hide details
-
p.
13
–36
(24)
This chapter provides an overview of the role of biometrics and artificial intelligence (AI) in enhancing cybersecurity. The chapter starts by defining biometrics and explaining the different types of biometric systems. It then delves into the challenges associated with traditional authentication methods and how biometric systems address these challenges. The chapter also discusses the use of AI in biometric systems, including machine learning techniques for identifying and authenticating users. Finally, the chapter highlights the importance of the integration of biometric and AI technologies in cybersecurity and the potential for future developments in this field.
-
3 Biometric security performance: analysis methods and tools for evaluation and assessment
- + Show details - Hide details
-
p.
37
–64
(28)
This chapter aims to provide a comprehensive survey of the various methods used to analyze the performance of biometric security systems. The chapter will begin by providing an overview of the background of biometric security, including a definition of biometric security and the different types of biometric technologies used. The chapter will then delve into the various metrics used to evaluate the performance of biometric security systems, including false acceptance rate (FAR), false rejection rate (FRR), receiver-operating characteristic (ROC) curve, equal error rate (EER), failure to enroll (FTE) rate, and failure to acquire (FTA) rate. The chapter will then examine the different methods used to evaluate the performance of biometric security systems, including testing and evaluation standards, performance testing procedures, and performance testing protocols. The chapter will also discuss various tools available for biometric security performance testing, analysis, and evaluation, including open-source and proprietary tools. In addition, the chapter will explore the security vulnerabilities of biometric security systems and the various threat models and attacks that these systems may face. The chapter will also discuss the different countermeasures and mitigation techniques that can be used to prevent and mitigate these attacks.
Finally, the chapter will present several case studies of biometric security performance evaluation, highlighting best practices and lessons learned from these evaluations. The chapter will conclude with a summary of key findings, implications for future research, and recommendations for biometric security performance evaluation.
-
4 Leveraging generative adversarial networks and federated learning for enhanced cybersecurity: a concise review
- + Show details - Hide details
-
p.
65
–87
(23)
The rise of cyber threats in recent years has made cybersecurity a critical concern for individuals, organizations, and governments worldwide. Machine learning has proven to be a powerful tool in security mechanisms, providing more effective and efficient detection and response capabilities to cyber threats. Deep learning, a subset of machine learning, has also shown promising results in various fields, including cybersecurity. This chapter explores the use of advanced technologies such as generative adversarial networks (GANs) and federated learning (FL) in cybersecurity to provide more effective and efficient detection and response capabilities to cyber threats while preserving data privacy. GANs can be used to generate synthetic data for training machine learning models and simulate cyber-attacks for training and testing cybersecurity defenses. FL enables devices or parties to collaborate and train a machine learning model without sharing their data with a central server, thereby mitigating the risks of data breaches and misuse while also enhancing model accuracy. The goal of using GANs and FL in cybersecurity is to develop novel approaches that leverage the power of artificial intelligence and machine learning to improve threat detection and response while also addressing the growing concerns around data privacy and security, ultimately contributing to a safer and more secure digital world.
-
5 A survey on face recognition methods with federated leaning
- + Show details - Hide details
-
p.
89
–122
(34)
Face recognition technology is a hot issue that today's neural networks need to continue to study in depth. With the development of deep neural networks, face recognition technology has achieved great results even in some datasets, and the computer's ability to recognize faces has exceeded human eye observations. However, with the widespread use of face recognition technology, the problem of privacy protection of face information has emerged. This chapter analyzes and summarizes the development status and technical achievements of face recognition technology under the federal learning framework. First of all, the definition status and development status of federated learning and traditional face recognition technology are introduced. Then the analysis summarizes the relevant achievements of face recognition technology based on the federated learning framework that have been proposed so far. Finally, we will analyze the possible problems and prospects for future development.
-
6 Artificial intelligence-based biometric authentication using ECG signal
- + Show details - Hide details
-
p.
123
–147
(25)
An electrocardiogram (ECG) signal is used to measure problems with the way the heart works. These days, the ECG is used not only as a diagnostic tool in hospitals but also as a new biometric tool in highly secured systems. ECG signal is a live indicator, it may be used as a tool for aliveness detection, and it possesses several key qualities to assess its usage as a biometric system, including universality, uniqueness, permanence, collectability, and circumvention.
-
7 A comparative analysis of email phishing detection methods: a deep learning perspective
- + Show details - Hide details
-
p.
149
–174
(26)
The study comprehensively evaluates deep learning models for detecting email phishing attacks. The study applies deep learning models, including convolutional neural networks, recurrent neural networks (RNNs), long short-term memory (LSTM), and bidirectional long short-term memory, to a dataset of phishing and legitimate emails. It evaluates their performance based on several metrics, including accuracy and precision, recall, and F1-score. The LSTM model achieved the highest accuracy of 99.41%, outperforming all other models, while the RNN model had the worst accuracy among all the models evaluated. This chapter provides valuable insights into the potential of deep learning models for detecting email phishing attacks. It highlights the need for further research to develop more effective and reliable approaches. The study also underscores the importance of developing robust and accurate phishing detection systems, given the significant impact that emails phishing attacks can have on individuals and organizations. The findings of this study have practical implications for the development of email phishing detection systems and provide a foundation for future research in this area.
-
8 Securing hardware coprocessors against piracy using biometrics for secured IoT systems
- + Show details - Hide details
-
p.
175
–193
(19)
Two crucial aspects need serious consideration concerning the underlying hardware used on the Internet of Things (IoT) systems: security and design optimization. Pirated or counterfeited hardware integrated into IoT systems may lead to different security threats such as confidential data leakage, malfunctioning of the device, and performance degradation. Therefore, the security of underlying hardware in IoT systems must be ensured for safe and reliable usage to end-users. This chapter discusses biometric-based methodologies to secure IoT hardware coprocessors against piracy and isolate counterfeited designs. Biometric-based approaches, such as fingerprint, facial, and palmprint biometrics, are discussed regarding their design flow, security strength, design cost overhead, tamper tolerance ability, and probability of coincidence (Pc). The biometric security in corresponding IoT hardware coprocessors is incorporated during the high-level synthesis phase (during the higher abstraction level of design) of the design process to ensure minimal design overhead and easy isolation of counterfeited designs. Moreover, for an adversary, the exact regeneration of digital templates to evade counterfeit detection is not possible due to incorporating unique biometric features during signature generation, unlike non-biometric-based approaches. The palmprint biometric hardware security approach renders higher tamper tolerance than the facial and fingerprint approaches (due to the larger encoding bits and signature strength), whereas the fingerprint biometric approach offers a smaller Pc than the facial and palmprint hardware security approaches.
-
9 Intelligent authentication system using graphical one-time passwords
- + Show details - Hide details
-
p.
195
–212
(18)
Conventional alphanumerical passwords have been the most common authentication medium for years; however, it is plagued by a fundamental problem: secure strong passwords are hard to create and remember, leading to insecure practices. There have been several studies proposing alternatives to replace alphanumerical passwords. However, such alternatives have not reached mainstream usage or widespread application. Our study has reviewed several authentication schemes and found that graphical authentication can be an alternative solution, leveraging visual components instead of text and taking advantage of the human mind's ability to remember graphical and positional information. Our study conducts an in-depth analysis of the existing graphical passwords and presents a graphical one-time-password (OTP) scheme as a replacement for alphanumerical passwords. The proposed one-time graphical password is built upon the user remembering their four preselected picture passwords displayed on a random 4×4 matrix and entering the (x,y) coordinate of the picture password on the matrix. Several different categories of picture passwords are provided, with the authentication matrix displaying decoy images along with the picture passwords. An in-depth analysis of the security, memorability and usability aspects is presented to show that our graphical OTP scheme can successfully thwart common graphical password attacks (such as shoulder-surfing and dictionary attacks). We also demonstrate that the proposed graphical authentication system can protect against various known attacks and satisfies different criteria as a replacement for alphanumerical passwords.
-
10 Role of AI in social cybersecurity: real-world case studies
- + Show details - Hide details
-
p.
213
–235
(23)
The rapid advancement of artificial intelligence (AI) has significantly influenced the field of social cybersecurity, addressing the challenges of protecting individuals and communities in the digital realm. This chapter explores the role of AI in social cybersecurity through real-world case studies, showcasing its application and impact in various contexts. The abstract delves into the practical implementations of AI technologies, such as machine learning and natural language processing, to detect and prevent cyber threats, identify malicious activities, and safeguard sensitive information. The case studies highlight how AI-powered solutions have improved the efficiency and effectiveness of cybersecurity measures, leading to enhanced threat intelligence, faster incident response, and proactive defense mechanisms. Moreover, ethical considerations and privacy concerns associated with AI in social cybersecurity are examined, emphasizing the need for responsible and transparent practices. This chapter concludes by discussing the potential future developments and challenges in the field, calling for continuous innovation, collaboration, and adaptation to ensure the resilient protection of individuals and societies in the face of evolving cyber threats.
-
11 Ethical and privacy concerns and challenges
- + Show details - Hide details
-
p.
237
–258
(22)
The chapter on "Ethical and privacy concerns and challenges" delves into the critical aspects of ethics and privacy in the context of artificial intelligence (AI) in social cybersecurity. In today's digital age, where AI technologies are increasingly integrated into various aspects of our lives, including cybersecurity practices, it is essential to recognize the potential ethical and privacy implications that accompany their use. This chapter aims to provide an in-depth exploration of these concerns and their significance in shaping responsible and sustainable AI deployment in the realm of social cybersecurity.
-
12 Conclusion
- + Show details - Hide details
-
p.
259
–261
(3)
In this book, we have delved into the intersection of artificial intelligence (AI), biometrics, and cybersecurity, exploring the advancements, challenges, and applications in these fields. Throughout the 12 chapters, we have provided a comprehensive exploration of various topics, offering insights into the integration of AI techniques with biometric authentication systems and their impact on cybersecurity.
-
Back Matter
- + Show details - Hide details
-
p.
(1)
Related content
