A Comparative Analysis of Biometric Security Techniques

Evaluating Contact Touch-Based and Touch Less Biometric Techniques

Authors

  • Hina Ali Department of Software Engineering, Mehran University of Engineering and Technology, Hyderabad, Pakistan https://orcid.org/0009-0008-8550-078X
  • Dr. Din Muhammad Sangrasi Department of Software Engineering, Mehran University of Engineering and Technology, Hyderabad, Pakistan

DOI:

https://doi.org/10.5281/zenodo.18380777

Abstract

The increasing rise in electronic crimes has underlined the critical need for strong authentication techniques that enforce strict access control and data protection. Biometric authentication is a potential method that uses distinct physiological (like palm, eye retina, fingerprints etc.) and behavioral (like signature, keystroke etc.) traits for identity verification. This research compares touch based versus touch less biometric systems, focusing on performance, accuracy, and user acceptability. Addressing a gap in existing security standards, the study investigates the rising move towards touch less biometric driven by the desire to avoid physical contact and disease transmission. The research findings provide light on the potential of touch less technology to provide a more sanitary and dependable alternative to traditional procedures, with implications for wider adoption across a variety of sectors.

Author Biographies

Hina Ali, Department of Software Engineering, Mehran University of Engineering and Technology, Hyderabad, Pakistan

She is a Lecturer at the Department of Software Engineering, Mehran University of Engineering and Technology, Hyderabad, Pakistan. She is currently a PhD Scholar (Information Technology) at the University of Sindh, Hyderabad, Pakistan.

Dr. Din Muhammad Sangrasi, Department of Software Engineering, Mehran University of Engineering and Technology, Hyderabad, Pakistan

He is an Assistant Professor at the Department of Software Engineering, Mehran University of Engineering and Technology, Hyderabad, Pakistan. He has a PhD in AI from the University of Wollongong, Australia.

Keywords:

Touch based and touches less biometric, biometric techniques, Physiological bio-metrics, Behavioral bio-metrics, Biometric Security, Identifiers Covid-19

References

S. Anthony, "No Title Berkeley researchers replace passwords with past thoughts by reading your mind," 2013. [Online]. Available: www.extremetech.com/computing/152827-berkeley-researchers-authenticate-your-identity-with-just-your-brainwaves-replace-passwords-with-passthoughts.

C. Burt, "Biometric ear canal geometry recognition developed by University of Buffalo researchers," 2019. [Online]. Available: www.biometricupdate.com/201909/biometric-ear-canal-geometry-recognition-developed-by-university-of-buffalo-researchers.

J. Sim, H. Noh, W. Goo, N. Kim, S. Chae, and C. Ahn, "Identity recognition based on bioacoustics of the human body," IEEE Trans. Cybern., pp. 1–12, 2019.

"NEC develops biometrics technology that uses sound to distinguish individually unique ear cavity shape," 2016. [Online]. Available: www.nec.com/en/press/201603/global_20160307_01.html

U. Šošević, I. Milenković, M. Milovanović, and M. Minović, "Support platform for learning about multimodal biometrics," J. Univers. Comput. Sci., vol. 19, no. 11, pp. 1684–1700, 2013.

S. Salmeron-Majadas, M. Arevalillo-Herráez, O. C. Santos, M. Saneiro, R. Cabestrero, P. Quirós, and J. G. Boticario, "Filtering of spontaneous and low intensity emotions in educational contexts," in AIED, pp. 429–438, 2015.

R. Hariharan and S. Logeswari, "Fingerprint as a personal identification tool in forensic science," Global J. Res. Anal., vol. 8, no. 1, 2019.

Y. Levy and M. Ramim, "A theoretical approach for biometrics authentication of e-exams," Nova Southeastern Univ., USA, 2007.

O. L. Finnegan, J. W. White III, B. Armstrong, E. L. Adams, S. Burkart, M. W. Beets, and R. G. Weaver, "The utility of behavioral biometrics in user authentication and demographic characteristic detection: a scoping review," Syst. Rev., vol. 13, no. 1, p. 61, 2024.

S. H. Halili, "Technological advancements in education 4.0," Online J. Distance Educ. E-Learn., vol. 7, no. 1, pp. 63–69, 2019.

M. Hampson, "The bioacoustic signatures of our bodies can reveal our identities," 2019. [Online]. Available: spectrum.ieee.org/the-human-os/telecom/security/the-bioacoustic-signatures-of-our-bodies-can-reveal-our-identities.

C. Burt, "New technologies for finger vein, voice, and facial biometrics unveiled," 2019. [Online]. Available: www.biometricupdate.com/201908/new-technologies-for-finger-vein-voice-and-facial-biometrics-unveiled.

C. Buttle, "The problem of biometrics in education," Biometric Technol. Today, vol. 2013, no. 6, pp. 5–7. [Online]. Available: www.sciencedirect.com/science/article/abs/pii/S0969476513701115

T. Arakawa, "Ear acoustic authentication technology: using sound to identify the distinctive shape of the ear canal," 2018. [Online]. Available: www.nec.com/en/global/techrep/journal/g18/n02/180219.html

J. Aron, "Your heartbeat could keep your data safe," 2012. [Online]. Available: www.newscientist.com/article/mg21328516.500-your-heartbeat-could-keep-your-%0Adata-safe/%0A

S. A. Abdulrahman and B. Alhayani, "A comprehensive survey on the biometric systems based on physiological and behavioural characteristics," Mater. Today: Proc., vol. 80, pp. 2642–2646, 2023.

P. Martinez-Lozano, M. Kohler, and R. Zenobi, "Human breath analysis may support the existence of individual metabolic phenotypes," PLoS ONE, vol. 8, no. 4, p. e59909, 2018.

G. A. Dafoulas, C. C. Maia, J. S. Clarke, A. Ali, and J. Augusto, "Investigating the role of biometrics in education—the use of sensor data in collaborative learning," in Int. Conf. e-Learning, pp. 115–123, 2018.

Y. Gao, W. Wang, V. Phoha, W. Sun, and Z. Jin, "EarEcho," in ACM Interact., Mobile, Wearable Ubiquitous Technol., p. 1, 2019.

F. Jan, S. Alrashed, and N. Min-Allah, "Iris segmentation for non-ideal iris biometric systems," Multimedia Tools Appl., vol. 83, no. 5, pp. 15223–15251, 2024.

S. Baird, "Biometrics 'security technology': it is important for students to understand that technology can be used as part of a solution to a problem," Technol. Teach., vol. 61, no. 5, pp. 18–23, 2002.

J. Lee, "Researcher says brainwaves could be a way for security systems to verify identity," 2015. [Online]. Available: http://www.biometricupdate.com/201505/researcher-says-brainwaves-could-be-a-way-for-security-systems-to-verify-identity.

S. J. Elliott, J. L. Peters, and T. J. Rishel, "An introduction to biometrics technology: its place in technology education," J. Ind. Teach. Educ., vol. 41, no. 4, pp. 1–8, 2004.

R. Ferguson, "Learning analytics: drivers, developments and challenges," Int. J. Technol. Enhanced Learn., vol. 4, no. 5/6, pp. 304–317, 2012.

K. Yang, Y. Dou, S. Lv, F. Zhang, and Q. Lv, "Relative distance features for gait recognition with Kinect," J. Vis. Commun. Image Represent., vol. 39, pp. 209–217, 2016.

"Ears: the new fingerprints?," Yale Scientific, 2011. [Online]. Available: www.yalescientific.org/2011/05/ears-the-new-fingerprints.

K. H. Kim, S. W. Bang, and S. R. Kim, "Emotion recognition system using short-term monitoring of physiological signals," Med. Biol. Eng. Comput., vol. 42, no. 3, pp. 419–427, 2004.

T. D. Jager, "Application of biometric fingerprinting to encourage the active involvement of student teachers in lectures on differentiated instruction," South Afr. J. Educ., vol. 39, no. 2, pp. 1–11, 2019.

R. King, "Explainer: Facial thermography," 2013. [Online]. Available: www.biometricupdate.com/201308/explainer-facial-thermography.

S. L. Gray, "Biometrics in schools: the role of authentic and inauthentic social transactions," UCL Inst. Educ. [Online]. Available: discovery.ucl.ac.uk/id/eprint/1545213/3/Leaton_Gray_Biometrics_BSA_conference.pdf.

M. Mufandaidza, T. Ramotsoela, and G. Hancke, "Continuous user authentication in smartphones using gait analysis," in 44th Annu. Conf. IEEE Ind. Electron. Soc., 2018.

Z. Korotkaya, "Biometric person authentication: odor," Dept. Inf. Technol., Lab. Appl. Math., Lappeenranta Univ. Technol., 2003.

M. O. Krucoff, S. Rahimpour, M. W. Slutzky, E. V. Reggie, and D. A. Turner, "Enhancing nervous system recovery through neurobiologics, neural interface training, and neurorehabilitation, neuroprosthetics," Front. Neurosci., vol. 10, p. 584, 2016.

B. Hond, "Your brain’s unique response to words can reveal your identity," 2015. [Online]. Available: www.newscientist.com/article/dn27555-your-brains-unique-response-to-words-can-reveal-your-identity.

P. Huang, B. Li, L. Guo, Z. Jin, and Y. Chen, "A robust and reusable ECG-based authentication and data encryption scheme for eHealth systems," in 2016 IEEE Glob. Comm. Conf., pp. 1–6.

B. Grawemeyer, M. Mavrikis, W. Holmes, W. Gutierrez-Santos, M. Wiedmann, and N. Rummel, "Affecting O-task behavior: how affect-aware feedback can improve student learning," in LAK, pp. 104–113, 2016.

Dell Technologies Inc., "Gen Z is here. Are you ready?," 2020.

B. Vincent, "The space agency announced several health and biotech technology transfer opportunities," 2020. [Online]. Available: https://www.nextgov.com/emerging-tech/2020/02/nasa-tech-could-replace-passwords-your-heartbeat/163292/.

D. Thakkar, "Five unconventional biometrics that surprisingly exist!," 2018. [Online]. Available: https://www.bayometric.com/5-unconventional-biometrics/.

Thales, "Biometrics: authentication and identification (definition, trends, use cases, laws and latest news)—2020 review," 2020. [Online]. Available: https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/inspired/biometrics.

D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, 2009.

R. Cappelli, D. Maio, and D. Maltoni, "Performance evaluation of fingerprint verification systems," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 1, pp. 3–18, Jan. 2006.

A. K. Jain, Y. Chen, and M. Demirkus, "Pores and ridges: High-resolution fingerprint matching using level 3 features," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 1, pp. 15–27, Jan. 2007.

T. Matsumoto et al., "Impact of artificial 'gummy' fingers on fingerprint systems," in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275–289, 2002.

Y. Wang, J. Liu, and H. Wang, "Touchless biometric systems: A review," IEEE Access, vol. 8, pp. 170350–170369, 2020.

D. M. Gragnaniello et al., "Face anti-spoofing based on color texture analysis," in Proc. IEEE Intl. Conf. Image Processing (ICIP), 2013, pp. 1952–1956.

S. Taigman, M. Yang, M. Ranzato, and L. Wolf, "DeepFace: Closing the gap to human-level performance in face verification," in Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR), 2014, pp. 1701–1708.

S. Furui, "50 years of progress in speech and speaker recognition research," Ecti Transactions on Computer and Information Technology, vol. 1, no. 2, pp. 64–74, Nov. 2005.

C. Garvie, A. Bedoya, and A. Frankle, The Perpetual Line-Up: Unregulated Police Face Recognition in America, Georgetown Law Center on Privacy & Technology, 2016.

A. Ross and A. Jain, "Multimodal biometrics: An overview," in Proc. 12th European Signal Processing Conference, Vienna, Austria, 2007

R. Dave, N. Seliya, L. Pryor, M. Vanamala, E. Sowells, and J. Mallet, "Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning," arXiv preprint arXiv:2201.08564, Jan. 2022.arXiv

A. M. M. Chowdhury and M. H. Imtiaz, "Contactless Fingerprint Recognition Using Deep Learning—A Systematic Review," Journal of Cybersecurity and Privacy, vol. 2, no. 3, pp. 714–730, Sep. 2022.MDPI

S. H. Al Zaabi and R. Zamri, "Managing Security Threats through Touchless Security Technologies: An Overview of the Integration of Facial Recognition Technology in the UAE Oil and Gas Industry," Sustainability, vol. 14, no. 22, p. 14915, Nov. 2022.MDPI

M. Gomez-Barrero and J. Galbally, "Reversing the Irreversible: A Survey on Inverse Biometrics," arXiv preprint arXiv:2401.02861, Jan. 2024

A. K. Jain et al., "An introduction to biometric recognition," IEEE Trans. on Circuits and Systems for Video Technology, 2004.

Y. Wang et al., "Touchless biometric systems: A review," IEEE Access, vol. 8, pp. 170350–170369, 2020.

A. M. Chowdhury and M. H. Imtiaz, "Contactless Fingerprint Recognition Using Deep Learning—A Systematic Review," Journal of Cybersecurity and Privacy, 2022.

S. H. Al Zaabi and R. Zamri, "Managing Security with Face Recognition in the UAE Oil Sector," 2023.

Published

2025-12-31

How to Cite

Ali, H., & Sangrasi, D. M. (2025). A Comparative Analysis of Biometric Security Techniques: Evaluating Contact Touch-Based and Touch Less Biometric Techniques. Siazga Research Journal, 4(4), 222–230. https://doi.org/10.5281/zenodo.18380777

Issue

Section

Articles

Categories