Open Access Open Access  Restricted Access Subscription Access

Secure Biometric Authentication with Blockchain Integration

Aman Kumar, Gopal Khorwal, Ruchi Banarjee

Abstract


Biometric authentication has become a dominant approach for secure access control, with face recognition gaining widespread adoption in mobile devices, surveillance systems, and financial applications. However, traditional biometric systems are vulnerable to spoofing attacks such as photo, video, and 3D mask impersonation. This research proposes a secure face recognition framework that integrates blockchain technology for decentralized storage and verification, combined with advanced anti-spoofing techniques powered by deep learning. The use of blockchain ensures tamper-proof storage of biometric templates, while convolutional neural networks (CNNs) and liveness detection models mitigate spoofing threats. The proposed framework enhances trust, transparency, and resilience in biometric authentication systems.

 


Full Text:

PDF

References


Chingovska, I., Anjos, A., & Marcel, S. (2012). On the effectiveness of local binary patterns in face anti-spoofing. IEEE BIOSIG.

Yang, J., Lei, Z., & Li, S. Z. (2019). Face liveness detection with depth and infrared imaging. IEEE Transactions on Information Forensics and Security.

Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2020). Smart contract-based access control for the Internet of Things. IEEE Internet of Things Journal.

Goodfellow, I., Pouget-Abadie, J., Mirza, M., et al. (2014). Generative adversarial nets. NeurIPS.

Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.

Li, L., Xu, J., & Chen, Z. (2021). A survey on face anti-spoofing: Algorithms, databases, and evaluations. ACM Computing Surveys (CSUR), 54(6), 1–36.

Liu, Y., Jourabloo, A., & Liu, X. (2018). Learning deep models for face anti-spoofing: Binary or auxiliary supervision. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 389–398.

Xu, K., Li, Y., & Deng, W. (2020). Towards secure and privacy-preserving face authentication in the cloud. IEEE Transactions on Information Forensics and Security, 15, 1413–1428.

Sharma, P., Jindal, R., & Borah, M. D. (2020). Blockchain-based decentralized identity management: A review. Cluster Computing, 23(3), 2395–2413.

Raghavendra, R., Raja, K. B., & Busch, C. (2017). Presentation attack detection methods for face recognition systems: A comprehensive survey. ACM Transactions on Intelligent Systems and Technology (TIST), 9(1), 1–35.


Refbacks

  • There are currently no refbacks.