Biometrics and data security: An investigation on biometric templates in computing environment

Research output: Book chapter/Published conference paperConference paperpeer-review


Much research on biometric technology and information system focuses on privacy and security such as access control and information security. Few researches infer issues and challenges in biometrics and how they relate to privacy and security within biometric technology. Thus, this research investigates how issues and challenges in biometric are correlated with privacy and security of data and information in biometric technology and organizational information system network. The outcomes would assist organizational management to determine whether implementing biometric technology invades. A survey that has been conducted on fingerprint and facial recognition (aged in between 20-50) found that there is a substantial relationship between biometric user authentication system and privacy and security of user data and information. Additionally, the implementation of biometric technology for user authentication and access control draw the attention and curiosity and this technology were not apparent to be depraved, abusive and fierce. Biometric technology that contains user information is more efficient in identification and verification purpose and does not need to remember like password but once stolen could not be replaced. The outcomes further point out that biometric data and information are irreplaceable and once compromised, then cannot be replaced or changed like passwords. Biometrics technology is apposite and user friendly even though the contentious stratagem of data uniqueness and its cost of stolen. Organization management should therefore carefully understand the need of organization and the feature and risk factor of biometric technology should be considered while implementing it.
Original languageEnglish
Title of host publicationProceedings of the 1st International Conference on Machine Learning and Data Engineering, Sydney, Australia (2017)
Number of pages12
ISBN (Electronic)9780648014737
Publication statusPublished - 2017
Event1st International Conference on Machine Learning and Data Engineering: iCMLDE 2017 - Western Sydney University, Parramatta, Sydney, Australia
Duration: 20 Nov 201722 Nov 2017 (Conference website) (Conference proceedings)


Conference1st International Conference on Machine Learning and Data Engineering
CityParramatta, Sydney
Other1st International Conference on Machine Learning and Data Engineering, Sydney, 2017 (iCMLDE 2017) will bring international and national experts in Artificial Intelligence, Computer Vision, Machine Learning and Data Engineering researcher to Sydney to present and share their latest research and practice. iCMLDE 2017 will be held in Sydney, which is one of the largest cities in Australia. The conference is supported by Global Circle for Scientific, Technological and Management Research (GCSTMR) and Science, Technology and Management Crest, Australia (STAMCA). GCSTMR endeavors to create a platform for young researchers to exchange ideas and share information with experts in their respective fields. GCSTMR encourages and facilitates trans-national collaborations among its members and associates in research, training and professional activities. Multidisciplinary international conference series run by GCSTMR open vast opportunities for researchers to interact on the global platform and take advantage of knowledge sharing in the digital arena.

iCMLDE 2017 will be held at Western Sydney University’s Parramatta campus, which is situated 20km from the Sydney CBD and is well connected by rail, road and ferry networks. The traditional landmarks of Sydney including Sydney Harbour, Sydney Opera House and Harbour Bridge are within easy reach of the conference venue as is the Blue Mountains World Heritage National Park.
Internet address


Dive into the research topics of 'Biometrics and data security: An investigation on biometric templates in computing environment'. Together they form a unique fingerprint.

Cite this