Comparative Analysis of Biometric and Facial Recognition as Security Measures in Web Development
Keywords:
Biometric Authentication Systems, Digital Identity Protectio, Cybersecurity Threat MitigationAbstract
With the constantly evolving digital landscape, web application security has been a top priority with the increasing sophistication of cyber attacks. This study presents a comparative analysis of biometric authentication and facial recognition technologies as security implementations in web development. Quantitative research design was employed, and data were gathered from 52 participants including web developers, cybersecurity professionals, and general users using structured questionnaires. The technologies were evaluated on aspects such as security effectiveness, usability, implementation complexity, and data privacy compliance. Findings showed that biometric authentication is perceived as more secure and reliable, whereas facial recognition is more user-friendly. Implementation cost and privacy concerns are, however, still primary concerns. The study shows that the combination of both technologies a hybrid approach—can be best in terms of usability and robust security. This study presents practical implications to help developers and companies on the deployment of sophisticated authentication methods to enhance web security without sacrificing regulatory compliance
References
A. Kumar and D. Zhang, "Personal recognition using hand shape and texture," IEEE Transactions on Image Processing, vol. 15, no. 8, pp. 2454–2461, Aug. 2006. [Online]. Available: https://doi.org/10.1109/TIP.2006.875235
A. K. Jain, A. Ross and S. Prabhakar, "An Introduction to Biometric Recognition," IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4–20, Jan. 2004. [Online]. Available: https://doi.org/10.1109/TCSVT.2003.818349
A. Ross and A. Jain, "Information fusion in biometrics," Pattern Recognition Letters, vol. 24, no. 13, pp. 2115–2125, 2003. [Online]. Available: https://doi.org/10.1016/S0167-8655(03)00079-5
J. Galbally, S. Marcel and J. Fierrez, "Biometric Antispoofing Methods: A Survey in Face Recognition," IEEE Access, vol. 2, pp. 1530–1552, 2014. [Online]. Available: https://doi.org/10.1109/ACCESS.2014.2381273
K. Cao and A. K. Jain, "Hacking Mobile Phones Using 2D Printed Fingerprints," MSU Technical Report, 2016. [Online]. Available: https://biometrics.cse.msu.edu/Publications/Fingerprint/CaoJain_HackingMobilePhon esUsing2DPrintedFingerprints_MSUTechnicalReport_2016.pdf
M. Gomez-Barrero et al., "Multibiometric Template Protection Based on Homomorphic Encryption," IEEE Access, vol. 5, pp. 16766–16784, 2017. [Online]. Available: https://doi.org/10.1109/ACCESS.2017.2734643
N. Ratha, J. Connell and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614–634, 2001. [Online]. Available: https://doi.org/10.1147/sj.403.0614
R. Ramachandra and C. Busch, "Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey," ACM Computing Surveys (CSUR), vol. 50, no. 1, pp. 1–37, 2017. [Online]. Available: https://doi.org/10.1145/3038924
S. Z. Li and A. K. Jain, Handbook of Face Recognition, 2nd ed., Springer, 2011. [Online]. Available: https://link.springer.com/book/10.1007/978-0-85729-932-1
S. Marcel, M. S. Nixon and S. Z. Li, Handbook of Biometric Anti-Spoofing, 2nd ed., Springer, 2019. [Online]. Available: https://link.springer.com/book