Security Implications of Biometric Gesture Recognition

Authors

  •   Bharti Patle Student (MCA), Smt. Radhikatai Pandav College of Engineering, Bahadura Layout, Behind Umred Road, Nagpur, Maharashtra - 440 034
  •   Roshni Banothe Student (MCA), Smt. Radhikatai Pandav College of Engineering, Bahadura Layout, Behind Umred Road, Nagpur, Maharashtra - 440 034
  •   Bhagyashree Kumbhare HOD & Professor, Smt. Radhikatai Pandav College of Engineering, Bahadura Layout, Behind Umred Road, Nagpur, Maharashtra - 440 034
  •   Yamini Laxane Professor, Smt. Radhikatai Pandav College of Engineering, Bahadura Layout, Behind Umred Road, Nagpur, Maharashtra - 440 034

DOI:

https://doi.org/10.17010/ijcs/2025/v10/i2/175103

Keywords:

Data integrity

, Cybersecurity, Gesture recognition, Human-Computer Interaction (HCI), Privacy risks, Real-time authentication, Sensor-based recognition, Touchless interfaces, User authentication.

Paper Submission Date

, February 8, 2025, Paper sent back for Revision, February 16, Paper Acceptance Date, February 20, Paper Published Online, April 5, 2025.

Abstract

In this research, the emerging field of biometric gesture recognition is explored as a novel approach to user authentication within Human-Computer Interaction (HCI). By utilizing distinctive physical movements such as hand gestures, finger patterns, or full-body motions, this technology offers a touchless and user-friendly alternative to conventional input methods. While the usability and accessibility of gesture-based systems are noteworthy, it was observed that they also introduce significant security challenges. Through this study, key security implications including the risks of spoofing attacks, data interception, replay attacks, and potential breaches of user privacy are investigated. The robustness of existing gesture recognition algorithms is analyzed and common threat models are evaluated to understand where current security frameworks may fall short. Additionally, the authors examine the balance between user convenience and system security, and strategies are proposed to enhance the resilience of these systems, such as implementing multimodal authentication, live detection, and encrypted gesture templates. This work aims to contribute to the development of more secure and reliable gesture-based biometric systems for future applications.

Downloads

Download data is not yet available.

Published

2025-04-05

How to Cite

Patle, B., Banothe, R., Kumbhare, B., & Laxane, Y. (2025). Security Implications of Biometric Gesture Recognition. Indian Journal of Computer Science, 10(2), 31–38. https://doi.org/10.17010/ijcs/2025/v10/i2/175103

References

D. Bhattacharyya, R. Ranjan, F. Alisherov, and C. Minkyu, “Biometric authentication: A review,†Int. J. u- e-Service, Sci. Technol., vol. 2, no. 3, pp. 13–28, Sep. 2009, doi: 10.1109/ICIS.2009.165.

A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,†IEEE Trans. Circuits Syst. Video Technol, vol.14, no. 1, pp. 4–20, 2004, doi: 10.1109/TCSVT.2003.818349.

N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems,†IBM Syst. J., vol. 40, no. 3, pp. 614–634, 2001. doi: 10.1147/sj.403.0614.

J. Galbally, S. Marcel, and J. Fierrez, “Biometric antispoofing methods: A survey in face recognition,†IEEE Access, vol. 2, pp. 1530–1552, 2014, doi: 10.1109/ACCESS.2014.2381273.

A. Ross and A. K. Jain, “Information fusion in biometrics,†Pattern Recognit. Lett., vol. 24, no. 13, pp. 2115–2125, Sep. 2003, doi: 10.1016/S0167-8655(03)00079-5.

R. Tolosana, R. Vera-Rodriguez, J. Fierrez, and J. Ortega-Garcia, “DeepFakes and beyond: A survey of face manipulation and fake detection,†Inf. Fusion, 64, pp. 131–148, Dec. 2020, doi: 10.1016/j.inffus.2020.06.014.

S. Eberz, K. B. Rasmussen, V. Lenders, and I. Martinovic, “Evaluating behavioral biometrics for continuous authentication: Challenges and metrics,†Proc. ACM Meas. Anal. Comput. Syst., vol. 2, no. 3, pp. 1–30, 2018, doi: 10.1145/3276773.

J. A. Unar, W. C. Seng, and A. Abbasi, “A review of biometric technology along with trends and prospects,†Pattern Recognit., vol. 47, no. 8, pp. 2673–2688, 2014, doi: 10.1016/j.patcog.2014.01.016.

M. Alsheikh, D. Niyato, H. Tan, S. Lin, and Z. Han, "Mobile Big Data Analytics Using Deep Learning and Apache Spark," IEEE Netw., vol. 30, no. 3, pp. 22–29, May–Jun 2016, doi: 10.1109/MNET.2016.7474343.