Hello Friends, The topic which I selected for research is ‘Biometrics for authentication: security and privacy implications’. I found this topic very interesting. Biometric technologies such as fingerprint, face and iris identification have been used from many years. Government started to promote this new technology in many sectors. People are inspired to sell such products. Moreover, it has been used for access control to ecommerce in addition with an entertainment. Introduction Biometric originates from two different words i.e ‘Bio’ which means life and ‘metrikos’which means measuring. Biometric innovations point fundamentally at analyzing people appearance which may be physiological or behavioral (Andronikau, Demitis, & Varvarigou, 2007). Biometrics are essentially relevant to identification, authorization, security and privacy issues. However, poor administration of biometric data can threaten the personal identity. Main uses of biometrics are identification and verification. There are various biometric methods such as fingerprint, facial recognition, iris recognition, speaker recognition , signature recognition and a hand geometry (Harinda, & Ntagwirumugara, 2015). Application of Biometric systems There are mainly three groups of application for biometric systems which are commercial application , governmental application and forensic applications. Security in biometric implementation There is too much security risk involved where the biometric is installed. Some supplementary fundamentals such as responsibility , trust , integrity and ethics should be present while talking about biometric security. Andronikau et al. (2007) stated that The typical delusion which associated with biometric security notice mostly with biometric reader device itself or a diagram created for the biometric security. In addition, the security issues are very serious with the biometric reader and template. There are different 8 point which may get attacked. As client framework connection happens by means of the biometric sensor, harming the gadget that catches the biometric turns into the principal evident purpose of harm. people can easily find how to create prosthetic fingers.” The success of attacks using prosthetic fingers is crucial from a security standpoint; researchers from Japan have demonstrated a success rate in attacks on such biometric devices in the range of 67-100%” (Matsumoto, Matsumoto et al. 2002). There are other attack than direct attack and device attack or biometric systems. Biometric gets the data from submitted fingerprints. Moreover , system can generate the different data than the actual data submitted.so, people may get illegal connection by restoring the system given values to the known ones. The fundamental concern is that biometric is especially adequate verification system, yet when utilized as a part of a unacceptable way the innovation can model for undesirable protection concern (Harinda, & Ntagwirumugara, 2015). Privacy Concerns Biometric can cause three privacy concerns such as unintended functional scope , unintended application scope and covert recognition (Prabhakar, Pankanti, & Jain, 2003). They stated that in unintended functional scope, authorities may gather extra (perhaps measurable) individual data from examined biometric analysis because biometric identifiers are organic in begging. They added that Concern of deducing additional data from biological estimations and copied medical data could turned into a reason for efficient inequality across sections of the community seen as "hazardous." Prabhakar, Pankanti, & Jain(2003) researched that In unintended application scope,Solid biometric identifiers, for example, fingerprints permit the likelihood of undesirable recognition.For example, people lawfully managing assumed names (say, for security reasons) could be recognized for their fingerprints. What's more, biometric identifiers could connect some behavioral data about people enlisted in generally distinctive applications; spoilers frequently understand this potential as a methods for associations—administrative or, on the other hand corporate—to aggregate control over people furthermore, their independences. In covert recognition , biometric perception is not covert. It is frequently conceivable to get a biometric test, for example, a man's face, without that individual's awareness. This grants secretive acknowledgment of already selected individuals. Subsequently, the individuals who need to stay unknown in a specific circumstance could be denied their security by biometric acknowledgment. Recommendations Security should be enhanced for biometric technologies in a various system sectors (Walters 2001). Taking into account that biometrics go for opposing the security vulnerabilities of the traditional recognition and confirmation techniques, biometrics are viewed as privacy guards (Andronikau, Demitis, & Varvarigou, 2007). They admitted that traditional recognition and verification depends for the most part on uncommon identifiers, for example, PINs, passwords and smart cards that can be deceitfully stolen however effortlessly recovered; the real contrast with biometrics is that they are absolutely different. Biometric encryption is an innovation arising from the joining of biometrics with cryptography.” It is used to complement existing cipher systems in key management with the biometric data being part of the process of establishing the private encryption key or the electronic signature (Andronikau, Demitis, & Varvarigou, 2007).” conclusion There are serious security threats associated with biometric implementation. There should be pure technical domain for biometric data. The system must be monitored by trained staff to avoid security issues. Refrences Andronikou, V., Demetis, D., & Varvarigou, T. (2007). Biometric Implementations and the Implications for Security and Privacy. Department Of Electrical And Computer Engineering, (1), 1-20. Retrieved from http://www.fidis.net/fileadmin/journal/issues/1-2007/Biometric_Implementations_and_the_Implications_for_Security_and_Privacy.pdf Harinda, E., & Ntagwirumugara, E. (2015). Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities. . http://www.scirp.org/journal/jis http://dx.doi.org/10.4236/jis.2015.62010. Retrieved 1 May 2017, from http://file.scirp.org/pdf/JIS_2015033113425798.pdf Prabhakar, S., Pankanti, S., & Jain, A. (2003). Biometric recognition: security and privacy concerns. IEEE Security & Privacy Magazine, 1(2), 33-42. http://dx.doi.org/10.1109/msecp.2003.1193209