The connection of biometric identification and AI, and its risk assessment possibilities
PDF (Hungarian)

Keywords

biometric identification, data protection, artificial intelligence, regulation

How to Cite

The connection of biometric identification and AI, and its risk assessment possibilities. (2025). Academic Journal of Internal Affairs, 73(5), 977-999. https://doi.org/10.38146/bsz-ajia.2025.v73.i5.pp977-999

Abstract

Aim: The aim of the study is to raise awareness of the links between the development of biometric identification and artificial intelligence (AI) and to present the methods developed for risk assessment of biometric identification solutions.

Methodology: The authors have reviewed a wide range of Hungarian and foreign literature, academic works and legislation on the theoretical methods and context. In doing so, the methods of analysis and synthesis were applied, the subject areas were broken down into their constituent parts and studied in depth separately, thus enabling the parts to be identified. In the course of the analyses, the separate parts and areas were reorganised and integrated into a logical whole. In doing so, the interlinkages were examined and it was concluded that the uptake of biometrics is not primarily an identification technology issue, but an IT methodological issue for processing biometric data and the associated data management and security risks. In their research, induction, deduction and analogy play an important role, as they have broken down the problems into parts, analysed them and drawn conclusions, going deeper and deeper as they move from the known to the unknown.

Findings: AI regulation is interlinked with biometric identification in multiple ways, and national and EU legislators are striving to create a regulatory environment of trust and confidence across the entire value chain, which can lead to a high level of trust and reduce the risks of biometric identification solutions.

Value: The authors have explored the context of biometric identification, the legal background to the processing of personal data and the relationship with AI, and have highlighted the risks associated with it. They developed a specific framework for risk assessment of biometric identification solutions.

PDF (Hungarian)

References

Ahmad, Z., Ajmal, M., Ahmad, F., Chaudary, M. H., & Naseer, M. (2018). Comparative analysis of biometric recognition techniques. Bahria University Journal of Information and Communication Technologies, 11(1), 21–30.

Balla J. (2019). A biometrikus adatokat tartalmazó úti és személyazonosító okmányok biztonságnövelő hatása a határ-, illetve közbiztonság alakulására. Dialóg Campus Kiadó.

Crisan, S. (2016). A novel perspective on hand vein patterns for biometric recognition: Problems, challenges, and implementations. In R. Jiang, S. Al-Maadeed, A. Bouridane, & P. Crookes (Eds.), Biometric security and privacy: Opportunities & challenges in the Big Data era (pp. 21–49). Springer. https://doi.org/10.1007/978-3-319-47301-7_2

Jain, A. K., Ross, A. A., & Nandakumar, K. (2011). Introduction to Biometrics. Springer. https://doi.org/10.1007/978-0-387-77326-1

Karimi, Z., Najafabadi, S. A., Nezhad, A. R., & Ahmadi, F. (2022). A big survey on biometrics for human identification. In T. Saba, A. Rehman, & S. Roy (Eds.), Prognostic models in healthcare: AI and statistical approaches (pp. 305–325). Springer. https://doi.org/10.1007/978-981-19-2057-8_14

Markowitz, J. (2000). Voice biometric. Communications of the ACM, 43(9), pp. 66–73. https://doi.org/10.1145/348941.348995

Őszi A. (2019). A biometrikus azonosítási rendszerek helye és szerepe az e-kereskedelemben (PhD-értekezés). Óbudai Egyetem. http://dx.doi.org/10.13140/RG.2.2.12200.14088

Őszi, A., & Kovács, T. (2011). Theory of the biometric-based technology in the field of e-commerce. In Proceedings of the 12th IEEE International Symposium on Computational Intelligence and Informatics (CINTI 2011). Óbuda University. https://doi.org/10.1109/CINTI.2011.6108570

Peña, A., Morales, A., Serna, I., Fierrez, J., & Lapedriza, A. (2021). Facial expressions as a vulnerability in face recognition. In 2021 IEEE International Conference on Image Processing (ICIP) (pp. 2988–2992). IEEE. https://doi.org/10.1109/ICIP42928.2021.9506444

Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). An analysis of minutiae matching strength. In J. Bigün & F. Smeraldi (Eds.), Audio- and video-based biometric person authentication (pp. 223–228). Springer. https://doi.org/10.1007/3-540-45344-X_32

Srivastava, H. (2013). A comparison based study on biometrics for human recognition. IOSR Journal of Computer Engineering, 15(1), 22–29. https://doi.org/10.9790/0661-1512229

Sunil, S. H., Prashanth, C. R., & Raja, K. B. (2019). Comprehensive study of biometric authentication systems, challenges and future trends. International Journal of Advanced Networking and Applications, 10(4), 3958–3968. https://doi.org/10.35444/IJANA.2019.10048

Tripathi, K. P. (2011). A comparative study of biometric technologies with reference to human interface. International Journal of Computer Applications, 14(5), 10–15. https://doi.org/10.5120/1842-2493

Wendehorst, C., & Duller, Y. (2021). Biometric recognition and behavioural detection (European Parliament Study No. 696968). European Parliament. https://www.europarl.europa.eu/RegData/etudes/STUD/2021/696968/IPOL_STU(2021)696968_EN.pdf

Yan, Z., Lv, S., Zhang, Y., Zhu, H., & Sun, L. (2019). Remote fingerprinting on internet-wide printers based on neural network. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1–6). IEEE. https://doi.org/10.1109/GLOBECOM38437.2019.9014144

Zhang, D., & Lu, G. (2013). 3D biometrics: Systems and applications. Springer. https://doi.org/10.1007/978-1-4614-7400-5

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2025 Academic Journal of Internal Affairs

Downloads

Download data is not yet available.