European Journals of Emerging Computer Vision and Natural Language Processing
A-Z Journals

Safeguarding Identity: A Comprehensive Survey of Anonymization Strategies for Behavioral Biometric Data

Authors
  • Shane T. Aldrich

    Department of Computer Engineering, Politecnico di Milano, Italy
    Author
  • Kathy R. Smith

    School of Computer Science and Applied Mathematics, University of the Witwatersrand, South Africa
    Author
Keywords:
Behavioral Biometrics, Anonymization, Privacy Preservation, Data Utility
Abstract

Behavioral biometrics, encompassing unique patterns in human actions like gait, keystroke dynamics, voice, and eye movements, offer powerful tools for authentication and interaction. However, the rich, often sensitive information embedded in this data poses significant privacy risks, as it can inadvertently reveal personal attributes such as gender, age, health conditions, or emotional states. This article presents a comprehensive survey of anonymization techniques specifically designed for behavioral biometric data. It categorizes existing approaches based on modality (voice, gait, keystroke dynamics, ECG, EEG, eye movements, and gesture recognition) and strategy (data transformation, perturbation, and generative models). The discussion highlights the inherent trade-off between achieving strong privacy guarantees and maintaining sufficient data utility for intended applications. By reviewing the state-of-the-art and identifying persistent challenges, this survey aims to inform future research and foster the development of truly privacy-enhanced behavioral biometric systems.

Downloads
Download data is not yet available.
References

Alberto Abad, Alfonso Ortega, António Teixeira, Carmen García Mateo, Carlos D. Martínez Hinarejos, Fernando Perdigão, Fernando Batista, and Nuno Mamede (Eds.). 2016. Advances in Speech and Language Technologies for Iberian Languages (Lecture Notes in Computer Science, Vol. 10077). Springer International Publishing. DOI:https://doi.org/10.1007/978-3-319-49169-1

Mohammed Abo-Zahhad, Sabah Mohammed Ahmed, and Sherif Nagib Abbas. 2015. State-of-the-art methods and future perspectives for personal recognition based on electroencephalogram signals. Biometrics 4, 3 (Sept. 2015), 179–190. DOI:https://doi.org/10.1049/iet-bmt.2014.0040

Mohamed Abou-Zleikha, Zheng-Hua Tan, Mads Graesboll Christensen, and Soren Holdt Jensen. 2015. A discriminative approach for speaker selection in speaker de-identification systems. In European Signal Processing Conference (EUSIPCO). IEEE, 2102–2106. DOI:https://doi.org/10.1109/eusipco.2015.7362755

Richard A. Abrams, David E. Meyer, and Sylvan Kornblum. 1989. Speed and accuracy of saccadic eye movements: Characteristics of impulse variability in the oculomotor system. J. Exp. Psychol. Hum. Percept. Perform. 15, 3 (1989), 529. DOI:https://doi.org/10.1037/0096-1523.15.3.529

Christopher Ackad, Andrew Clayphan, Roberto Martinez Maldonado, and Judy Kay. 2012. Seamless and continuous user identification for interactive tabletops using personal device handshaking and body tracking. In Extended Abstracts on Human Factors in Computing Systems. ACM, 1775–1780. DOI:https://doi.org/10.1145/2212776.2223708

Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa M. Redmiles. 2018. Ethics emerging: The story of privacy and security perceptions in virtual reality. In Symposium on Usable Privacy and Security. USENIX, 427–442.

Ayush Agarwal, Amitabh Swain, and S. R. Mahadeva Prasanna. 2022. Speaker anonymization for machines using sinusoidal model. In IEEE International Conference on Signal Processing and Communications (SPCOM). 1–5. DOI:https://doi.org/10.1109/SPCOM55316.2022.9840792

Prachi Agrawal and P. J. Narayanan. 2011. Person de-identification in videos. Trans. Circ. Syst. Video Technol. 21, 3 (Mar. 2011), 299–310. DOI:https://doi.org/10.1109/tcsvt.2011.2105551

Hafiz Shehbaz Ali, Fakhar ul Hassan, Siddique Latif, Habib Ullah Manzoor, and Junaid Qadir. 2021. Privacy enhanced speech emotion communication using deep learning aided edge computing. In International Conference on Communications Workshops. IEEE, 1–5. DOI:https://doi.org/10.1109/ICCWorkshops50388.2021.9473669

Abdulaziz Almehmadi and Khalil El-Khatib. 2013. The state of the art in electroencephalogram and access control. In Conference on Communications and Information Technology (ICCIT). IEEE, 49–54. DOI:https://doi.org/10.1109/iccitechnology.2013.6579521

Ranya Aloufi, Hamed Haddadi, and David Boyle. 2020. Privacy-preserving voice analysis via disentangled representations. In Conference on Cloud Computing Security Workshop. ACM, 1–14. DOI:https://doi.org/10.1145/3411495.3421355

Arwa Alsultan and Kevin Warwick. 2013. Keystroke dynamics authentication: A survey of free-text methods. Int. J. Comput. Sci. Issues 10, 4 (2013), 1.

Abdulaziz Alzubaidi and Jugal Kalita. 2016. Authentication of smartphone users using behavioral biometrics. Commun. Surv. Tutor. 18, 3 (2016), 1998–2026. DOI:https://doi.org/10.1109/comst.2016.2537748

Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2013. Geoindistinguishability: Differential privacy for location-based systems. In ACM Conference on Computer and Communications Security (CCS). 901–914.

Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, and Thorsten Strufe. 2021. Inexpensive brainwave authentication: New techniques and insights on user acceptance. In 30th USENIX Security Symposium (USENIX Security). 55–72.

A. Terry Bahill, Michael R. Clark, and Lawrence Stark. 1975. The main sequence, a tool for studying human eye movements. Math. Biosci. 24, 3-4 (Jan. 1975), 191–204. DOI:https://doi.org/10.1016/0025-5564(75)90075-9

Fahimeh Bahmaninezhad, Chunlei Zhang, and John Hansen. 2018. Convolutional neural network based speaker deidentification. In Speaker and Language Recognition Workshop. ISCA, 255–260. DOI:https://doi.org/10.21437/odyssey.2018-36

Dustin Bales, Pablo A. Tarazaga, Mary Kasarda, Dhruv Batra, A. G. Woolard, J. D. Poston, and V. V. N. S Malladi. 2016. Gender classification of walkers via underfloor accelerometer measurements. Internet Things J. 3, 6 (Dec. 2016), 1259–1266. DOI:https://doi.org/10.1109/jiot.2016.2582723

Salil Partha Banerjee and Damon Woodard. 2012. Biometric authentication and identification using keystroke dynamics: A survey. J. Pattern Recog. Res. 7, 1 (2012), 116–139. DOI:https://doi.org/10.13176/11.427

Downloads
Published
2024-12-13
Section
Articles
License

All articles published by The Parthenon Frontiers and its associated journals are distributed under the terms of the Creative Commons Attribution (CC BY 4.0) International License unless otherwise stated. 

Authors retain full copyright of their published work. By submitting their manuscript, authors agree to grant The Parthenon Frontiers a non-exclusive license to publish, archive, and distribute the article worldwide. Authors are free to:

  • Share their article on personal websites, institutional repositories, or social media platforms.

  • Reuse their content in future works, presentations, or educational materials, provided proper citation of the original publication.

How to Cite

Safeguarding Identity: A Comprehensive Survey of Anonymization Strategies for Behavioral Biometric Data. (2024). European Journals of Emerging Computer Vision and Natural Language Processing, 1(01), 34-59. https://parthenonfrontiers.com/index.php/ejecvnlp/article/view/76

Similar Articles

You may also start an advanced similarity search for this article.