Safeguarding Identity: A Comprehensive Survey of Anonymization Strategies for Behavioral Biometric Data
- Authors
-
-
Shane T. Aldrich
Department of Computer Engineering, Politecnico di Milano, ItalyAuthor -
Kathy R. Smith
School of Computer Science and Applied Mathematics, University of the Witwatersrand, South AfricaAuthor
-
- Keywords:
- Behavioral Biometrics, Anonymization, Privacy Preservation, Data Utility
- Abstract
-
Behavioral biometrics, encompassing unique patterns in human actions like gait, keystroke dynamics, voice, and eye movements, offer powerful tools for authentication and interaction. However, the rich, often sensitive information embedded in this data poses significant privacy risks, as it can inadvertently reveal personal attributes such as gender, age, health conditions, or emotional states. This article presents a comprehensive survey of anonymization techniques specifically designed for behavioral biometric data. It categorizes existing approaches based on modality (voice, gait, keystroke dynamics, ECG, EEG, eye movements, and gesture recognition) and strategy (data transformation, perturbation, and generative models). The discussion highlights the inherent trade-off between achieving strong privacy guarantees and maintaining sufficient data utility for intended applications. By reviewing the state-of-the-art and identifying persistent challenges, this survey aims to inform future research and foster the development of truly privacy-enhanced behavioral biometric systems.
- Downloads
-
Download data is not yet available.
- References
-
Alberto Abad, Alfonso Ortega, António Teixeira, Carmen García Mateo, Carlos D. Martínez Hinarejos, Fernando Perdigão, Fernando Batista, and Nuno Mamede (Eds.). 2016. Advances in Speech and Language Technologies for Iberian Languages (Lecture Notes in Computer Science, Vol. 10077). Springer International Publishing. DOI:https://doi.org/10.1007/978-3-319-49169-1
Mohammed Abo-Zahhad, Sabah Mohammed Ahmed, and Sherif Nagib Abbas. 2015. State-of-the-art methods and future perspectives for personal recognition based on electroencephalogram signals. Biometrics 4, 3 (Sept. 2015), 179–190. DOI:https://doi.org/10.1049/iet-bmt.2014.0040
Mohamed Abou-Zleikha, Zheng-Hua Tan, Mads Graesboll Christensen, and Soren Holdt Jensen. 2015. A discriminative approach for speaker selection in speaker de-identification systems. In European Signal Processing Conference (EUSIPCO). IEEE, 2102–2106. DOI:https://doi.org/10.1109/eusipco.2015.7362755
Richard A. Abrams, David E. Meyer, and Sylvan Kornblum. 1989. Speed and accuracy of saccadic eye movements: Characteristics of impulse variability in the oculomotor system. J. Exp. Psychol. Hum. Percept. Perform. 15, 3 (1989), 529. DOI:https://doi.org/10.1037/0096-1523.15.3.529
Christopher Ackad, Andrew Clayphan, Roberto Martinez Maldonado, and Judy Kay. 2012. Seamless and continuous user identification for interactive tabletops using personal device handshaking and body tracking. In Extended Abstracts on Human Factors in Computing Systems. ACM, 1775–1780. DOI:https://doi.org/10.1145/2212776.2223708
Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa M. Redmiles. 2018. Ethics emerging: The story of privacy and security perceptions in virtual reality. In Symposium on Usable Privacy and Security. USENIX, 427–442.
Ayush Agarwal, Amitabh Swain, and S. R. Mahadeva Prasanna. 2022. Speaker anonymization for machines using sinusoidal model. In IEEE International Conference on Signal Processing and Communications (SPCOM). 1–5. DOI:https://doi.org/10.1109/SPCOM55316.2022.9840792
Prachi Agrawal and P. J. Narayanan. 2011. Person de-identification in videos. Trans. Circ. Syst. Video Technol. 21, 3 (Mar. 2011), 299–310. DOI:https://doi.org/10.1109/tcsvt.2011.2105551
Hafiz Shehbaz Ali, Fakhar ul Hassan, Siddique Latif, Habib Ullah Manzoor, and Junaid Qadir. 2021. Privacy enhanced speech emotion communication using deep learning aided edge computing. In International Conference on Communications Workshops. IEEE, 1–5. DOI:https://doi.org/10.1109/ICCWorkshops50388.2021.9473669
Abdulaziz Almehmadi and Khalil El-Khatib. 2013. The state of the art in electroencephalogram and access control. In Conference on Communications and Information Technology (ICCIT). IEEE, 49–54. DOI:https://doi.org/10.1109/iccitechnology.2013.6579521
Ranya Aloufi, Hamed Haddadi, and David Boyle. 2020. Privacy-preserving voice analysis via disentangled representations. In Conference on Cloud Computing Security Workshop. ACM, 1–14. DOI:https://doi.org/10.1145/3411495.3421355
Arwa Alsultan and Kevin Warwick. 2013. Keystroke dynamics authentication: A survey of free-text methods. Int. J. Comput. Sci. Issues 10, 4 (2013), 1.
Abdulaziz Alzubaidi and Jugal Kalita. 2016. Authentication of smartphone users using behavioral biometrics. Commun. Surv. Tutor. 18, 3 (2016), 1998–2026. DOI:https://doi.org/10.1109/comst.2016.2537748
Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2013. Geoindistinguishability: Differential privacy for location-based systems. In ACM Conference on Computer and Communications Security (CCS). 901–914.
Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, and Thorsten Strufe. 2021. Inexpensive brainwave authentication: New techniques and insights on user acceptance. In 30th USENIX Security Symposium (USENIX Security). 55–72.
A. Terry Bahill, Michael R. Clark, and Lawrence Stark. 1975. The main sequence, a tool for studying human eye movements. Math. Biosci. 24, 3-4 (Jan. 1975), 191–204. DOI:https://doi.org/10.1016/0025-5564(75)90075-9
Fahimeh Bahmaninezhad, Chunlei Zhang, and John Hansen. 2018. Convolutional neural network based speaker deidentification. In Speaker and Language Recognition Workshop. ISCA, 255–260. DOI:https://doi.org/10.21437/odyssey.2018-36
Dustin Bales, Pablo A. Tarazaga, Mary Kasarda, Dhruv Batra, A. G. Woolard, J. D. Poston, and V. V. N. S Malladi. 2016. Gender classification of walkers via underfloor accelerometer measurements. Internet Things J. 3, 6 (Dec. 2016), 1259–1266. DOI:https://doi.org/10.1109/jiot.2016.2582723
Salil Partha Banerjee and Damon Woodard. 2012. Biometric authentication and identification using keystroke dynamics: A survey. J. Pattern Recog. Res. 7, 1 (2012), 116–139. DOI:https://doi.org/10.13176/11.427
- Downloads
- Published
- 2024-12-13
- Section
- Articles
- License
-
All articles published by The Parthenon Frontiers and its associated journals are distributed under the terms of the Creative Commons Attribution (CC BY 4.0) International License unless otherwise stated.
Authors retain full copyright of their published work. By submitting their manuscript, authors agree to grant The Parthenon Frontiers a non-exclusive license to publish, archive, and distribute the article worldwide. Authors are free to:
-
Share their article on personal websites, institutional repositories, or social media platforms.
-
Reuse their content in future works, presentations, or educational materials, provided proper citation of the original publication.
-
How to Cite
Similar Articles
- Dr. Lauren K. Mitchell, Dr. Isaac J. Moore, Predictive Water Quality Management for Arowana Aquaculture Using Hybrid Iot And Fuzzy Time Series Models , European Journals of Emerging Computer Vision and Natural Language Processing: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Eryndor V. Mallin, Dr. Taisia L. Khoren, REAL-TIME AUDITORY GUIDANCE FOR THE VISUALLY IMPAIRED: AN F-RCNN APPROACH IN ASSISTIVE ROBOTICS , European Journals of Emerging Computer Vision and Natural Language Processing: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- John M. Pando, Gianna Trentini, Service Placement Strategies Across the Cloud-Fog-Edge Continuum: A Comprehensive Survey , European Journals of Emerging Computer Vision and Natural Language Processing: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Paige L. Bennett, Dr. Aaron J. Myers, OPTIMIZING RANDOM FOREST REGRESSOR PERFORMANCE IN BEEF QUALITY PREDICTION THROUGH HYPERPARAMETER TUNING , European Journals of Emerging Computer Vision and Natural Language Processing: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Leona V. Merake, Dr. Arvind S. Tomura, SYNERGIES OF SIGHT AND LANGUAGE: A JOURNEY INTO HOW MACHINES LEARN TO SEE AND SPEAK , European Journals of Emerging Computer Vision and Natural Language Processing: Vol. 1 No. 01 (2024): Volume 01 Issue 01
You may also start an advanced similarity search for this article.