Security Implications of Biometric Gesture Recognition
DOI:
https://doi.org/10.17010/ijcs/2025/v10/i2/175103Keywords:
Data integrity
, Cybersecurity, Gesture recognition, Human-Computer Interaction (HCI), Privacy risks, Real-time authentication, Sensor-based recognition, Touchless interfaces, User authentication.Paper Submission Date
, February 8, 2025, Paper sent back for Revision, February 16, Paper Acceptance Date, February 20, Paper Published Online, April 5, 2025.Abstract
In this research, the emerging field of biometric gesture recognition is explored as a novel approach to user authentication within Human-Computer Interaction (HCI). By utilizing distinctive physical movements such as hand gestures, finger patterns, or full-body motions, this technology offers a touchless and user-friendly alternative to conventional input methods. While the usability and accessibility of gesture-based systems are noteworthy, it was observed that they also introduce significant security challenges. Through this study, key security implications including the risks of spoofing attacks, data interception, replay attacks, and potential breaches of user privacy are investigated. The robustness of existing gesture recognition algorithms is analyzed and common threat models are evaluated to understand where current security frameworks may fall short. Additionally, the authors examine the balance between user convenience and system security, and strategies are proposed to enhance the resilience of these systems, such as implementing multimodal authentication, live detection, and encrypted gesture templates. This work aims to contribute to the development of more secure and reliable gesture-based biometric systems for future applications.Downloads
Published
How to Cite
Issue
Section
References
D. Bhattacharyya, R. Ranjan, F. Alisherov, and C. Minkyu, “Biometric authentication: A review,†Int. J. u- e-Service, Sci. Technol., vol. 2, no. 3, pp. 13–28, Sep. 2009, doi: 10.1109/ICIS.2009.165.
A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,†IEEE Trans. Circuits Syst. Video Technol, vol.14, no. 1, pp. 4–20, 2004, doi: 10.1109/TCSVT.2003.818349.
N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems,†IBM Syst. J., vol. 40, no. 3, pp. 614–634, 2001. doi: 10.1147/sj.403.0614.
J. Galbally, S. Marcel, and J. Fierrez, “Biometric antispoofing methods: A survey in face recognition,†IEEE Access, vol. 2, pp. 1530–1552, 2014, doi: 10.1109/ACCESS.2014.2381273.
A. Ross and A. K. Jain, “Information fusion in biometrics,†Pattern Recognit. Lett., vol. 24, no. 13, pp. 2115–2125, Sep. 2003, doi: 10.1016/S0167-8655(03)00079-5.
R. Tolosana, R. Vera-Rodriguez, J. Fierrez, and J. Ortega-Garcia, “DeepFakes and beyond: A survey of face manipulation and fake detection,†Inf. Fusion, 64, pp. 131–148, Dec. 2020, doi: 10.1016/j.inffus.2020.06.014.
S. Eberz, K. B. Rasmussen, V. Lenders, and I. Martinovic, “Evaluating behavioral biometrics for continuous authentication: Challenges and metrics,†Proc. ACM Meas. Anal. Comput. Syst., vol. 2, no. 3, pp. 1–30, 2018, doi: 10.1145/3276773.
J. A. Unar, W. C. Seng, and A. Abbasi, “A review of biometric technology along with trends and prospects,†Pattern Recognit., vol. 47, no. 8, pp. 2673–2688, 2014, doi: 10.1016/j.patcog.2014.01.016.
M. Alsheikh, D. Niyato, H. Tan, S. Lin, and Z. Han, "Mobile Big Data Analytics Using Deep Learning and Apache Spark," IEEE Netw., vol. 30, no. 3, pp. 22–29, May–Jun 2016, doi: 10.1109/MNET.2016.7474343.