ejecvnlp Open Access Journal

European Journals of Emerging Computer Vision and Natural Language Processing

eISSN: Applied
Publication Frequency : 2 Issues per year.

  • Peer Reviewed & International Journal
Table of Content
Issues (Year-wise)
Loading…
✓ Article Published

Open Access iconOpen Access

ARTICLE

Safeguarding Identity: A Comprehensive Survey of Anonymization Strategies for Behavioral Biometric Data

1 Department of Computer Engineering, Politecnico di Milano, Italy
2 School of Computer Science and Applied Mathematics, University of the Witwatersrand, South Africa

Citations: Loading…
ABSTRACT VIEWS: 102   |   FILE VIEWS: 26   |   PDF: 26   HTML: 0   OTHER: 0   |   TOTAL: 128
Views + Downloads (Last 90 days)
Cumulative % included

Abstract

Behavioral biometrics, encompassing unique patterns in human actions like gait, keystroke dynamics, voice, and eye movements, offer powerful tools for authentication and interaction. However, the rich, often sensitive information embedded in this data poses significant privacy risks, as it can inadvertently reveal personal attributes such as gender, age, health conditions, or emotional states. This article presents a comprehensive survey of anonymization techniques specifically designed for behavioral biometric data. It categorizes existing approaches based on modality (voice, gait, keystroke dynamics, ECG, EEG, eye movements, and gesture recognition) and strategy (data transformation, perturbation, and generative models). The discussion highlights the inherent trade-off between achieving strong privacy guarantees and maintaining sufficient data utility for intended applications. By reviewing the state-of-the-art and identifying persistent challenges, this survey aims to inform future research and foster the development of truly privacy-enhanced behavioral biometric systems.


Keywords

Behavioral Biometrics, Anonymization, Privacy Preservation, Data Utility

References

Alberto Abad, Alfonso Ortega, António Teixeira, Carmen García Mateo, Carlos D. Martínez Hinarejos, Fernando Perdigão, Fernando Batista, and Nuno Mamede (Eds.). 2016. Advances in Speech and Language Technologies for Iberian Languages (Lecture Notes in Computer Science, Vol. 10077). Springer International Publishing. DOI:https://doi.org/10.1007/978-3-319-49169-1

Mohammed Abo-Zahhad, Sabah Mohammed Ahmed, and Sherif Nagib Abbas. 2015. State-of-the-art methods and future perspectives for personal recognition based on electroencephalogram signals. Biometrics 4, 3 (Sept. 2015), 179–190. DOI:https://doi.org/10.1049/iet-bmt.2014.0040

Mohamed Abou-Zleikha, Zheng-Hua Tan, Mads Graesboll Christensen, and Soren Holdt Jensen. 2015. A discriminative approach for speaker selection in speaker de-identification systems. In European Signal Processing Conference (EUSIPCO). IEEE, 2102–2106. DOI:https://doi.org/10.1109/eusipco.2015.7362755

Richard A. Abrams, David E. Meyer, and Sylvan Kornblum. 1989. Speed and accuracy of saccadic eye movements: Characteristics of impulse variability in the oculomotor system. J. Exp. Psychol. Hum. Percept. Perform. 15, 3 (1989), 529. DOI:https://doi.org/10.1037/0096-1523.15.3.529

Christopher Ackad, Andrew Clayphan, Roberto Martinez Maldonado, and Judy Kay. 2012. Seamless and continuous user identification for interactive tabletops using personal device handshaking and body tracking. In Extended Abstracts on Human Factors in Computing Systems. ACM, 1775–1780. DOI:https://doi.org/10.1145/2212776.2223708

Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa M. Redmiles. 2018. Ethics emerging: The story of privacy and security perceptions in virtual reality. In Symposium on Usable Privacy and Security. USENIX, 427–442.

Ayush Agarwal, Amitabh Swain, and S. R. Mahadeva Prasanna. 2022. Speaker anonymization for machines using sinusoidal model. In IEEE International Conference on Signal Processing and Communications (SPCOM). 1–5. DOI:https://doi.org/10.1109/SPCOM55316.2022.9840792

Prachi Agrawal and P. J. Narayanan. 2011. Person de-identification in videos. Trans. Circ. Syst. Video Technol. 21, 3 (Mar. 2011), 299–310. DOI:https://doi.org/10.1109/tcsvt.2011.2105551

Hafiz Shehbaz Ali, Fakhar ul Hassan, Siddique Latif, Habib Ullah Manzoor, and Junaid Qadir. 2021. Privacy enhanced speech emotion communication using deep learning aided edge computing. In International Conference on Communications Workshops. IEEE, 1–5. DOI:https://doi.org/10.1109/ICCWorkshops50388.2021.9473669

Abdulaziz Almehmadi and Khalil El-Khatib. 2013. The state of the art in electroencephalogram and access control. In Conference on Communications and Information Technology (ICCIT). IEEE, 49–54. DOI:https://doi.org/10.1109/iccitechnology.2013.6579521

Ranya Aloufi, Hamed Haddadi, and David Boyle. 2020. Privacy-preserving voice analysis via disentangled representations. In Conference on Cloud Computing Security Workshop. ACM, 1–14. DOI:https://doi.org/10.1145/3411495.3421355

Arwa Alsultan and Kevin Warwick. 2013. Keystroke dynamics authentication: A survey of free-text methods. Int. J. Comput. Sci. Issues 10, 4 (2013), 1.

Abdulaziz Alzubaidi and Jugal Kalita. 2016. Authentication of smartphone users using behavioral biometrics. Commun. Surv. Tutor. 18, 3 (2016), 1998–2026. DOI:https://doi.org/10.1109/comst.2016.2537748

Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2013. Geoindistinguishability: Differential privacy for location-based systems. In ACM Conference on Computer and Communications Security (CCS). 901–914.

Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, and Thorsten Strufe. 2021. Inexpensive brainwave authentication: New techniques and insights on user acceptance. In 30th USENIX Security Symposium (USENIX Security). 55–72.

A. Terry Bahill, Michael R. Clark, and Lawrence Stark. 1975. The main sequence, a tool for studying human eye movements. Math. Biosci. 24, 3-4 (Jan. 1975), 191–204. DOI:https://doi.org/10.1016/0025-5564(75)90075-9

Fahimeh Bahmaninezhad, Chunlei Zhang, and John Hansen. 2018. Convolutional neural network based speaker deidentification. In Speaker and Language Recognition Workshop. ISCA, 255–260. DOI:https://doi.org/10.21437/odyssey.2018-36

Dustin Bales, Pablo A. Tarazaga, Mary Kasarda, Dhruv Batra, A. G. Woolard, J. D. Poston, and V. V. N. S Malladi. 2016. Gender classification of walkers via underfloor accelerometer measurements. Internet Things J. 3, 6 (Dec. 2016), 1259–1266. DOI:https://doi.org/10.1109/jiot.2016.2582723

Salil Partha Banerjee and Damon Woodard. 2012. Biometric authentication and identification using keystroke dynamics: A survey. J. Pattern Recog. Res. 7, 1 (2012), 116–139. DOI:https://doi.org/10.13176/11.427


How to Cite

Safeguarding Identity: A Comprehensive Survey of Anonymization Strategies for Behavioral Biometric Data. (2024). European Journals of Emerging Computer Vision and Natural Language Processing, 1(01), 34-59. https://www.parthenonfrontiers.com/index.php/ejecvnlp/article/view/76

Related articles

Share Link