Open Access
ARTICLE
Safeguarding Identity: A Comprehensive Survey of Anonymization Strategies for Behavioral Biometric Data
Issue Vol. 1 No. 01 (2024): Volume 01 Issue 01 --- Section Articles
Abstract
Behavioral biometrics, encompassing unique patterns in human actions like gait, keystroke dynamics, voice, and eye movements, offer powerful tools for authentication and interaction. However, the rich, often sensitive information embedded in this data poses significant privacy risks, as it can inadvertently reveal personal attributes such as gender, age, health conditions, or emotional states. This article presents a comprehensive survey of anonymization techniques specifically designed for behavioral biometric data. It categorizes existing approaches based on modality (voice, gait, keystroke dynamics, ECG, EEG, eye movements, and gesture recognition) and strategy (data transformation, perturbation, and generative models). The discussion highlights the inherent trade-off between achieving strong privacy guarantees and maintaining sufficient data utility for intended applications. By reviewing the state-of-the-art and identifying persistent challenges, this survey aims to inform future research and foster the development of truly privacy-enhanced behavioral biometric systems.
Keywords
References
Alberto Abad, Alfonso Ortega, António Teixeira, Carmen García Mateo, Carlos D. Martínez Hinarejos, Fernando Perdigão, Fernando Batista, and Nuno Mamede (Eds.). 2016. Advances in Speech and Language Technologies for Iberian Languages (Lecture Notes in Computer Science, Vol. 10077). Springer International Publishing. DOI:https://doi.org/10.1007/978-3-319-49169-1
Mohammed Abo-Zahhad, Sabah Mohammed Ahmed, and Sherif Nagib Abbas. 2015. State-of-the-art methods and future perspectives for personal recognition based on electroencephalogram signals. Biometrics 4, 3 (Sept. 2015), 179–190. DOI:https://doi.org/10.1049/iet-bmt.2014.0040
Mohamed Abou-Zleikha, Zheng-Hua Tan, Mads Graesboll Christensen, and Soren Holdt Jensen. 2015. A discriminative approach for speaker selection in speaker de-identification systems. In European Signal Processing Conference (EUSIPCO). IEEE, 2102–2106. DOI:https://doi.org/10.1109/eusipco.2015.7362755
Richard A. Abrams, David E. Meyer, and Sylvan Kornblum. 1989. Speed and accuracy of saccadic eye movements: Characteristics of impulse variability in the oculomotor system. J. Exp. Psychol. Hum. Percept. Perform. 15, 3 (1989), 529. DOI:https://doi.org/10.1037/0096-1523.15.3.529
Christopher Ackad, Andrew Clayphan, Roberto Martinez Maldonado, and Judy Kay. 2012. Seamless and continuous user identification for interactive tabletops using personal device handshaking and body tracking. In Extended Abstracts on Human Factors in Computing Systems. ACM, 1775–1780. DOI:https://doi.org/10.1145/2212776.2223708
Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa M. Redmiles. 2018. Ethics emerging: The story of privacy and security perceptions in virtual reality. In Symposium on Usable Privacy and Security. USENIX, 427–442.
Ayush Agarwal, Amitabh Swain, and S. R. Mahadeva Prasanna. 2022. Speaker anonymization for machines using sinusoidal model. In IEEE International Conference on Signal Processing and Communications (SPCOM). 1–5. DOI:https://doi.org/10.1109/SPCOM55316.2022.9840792
Prachi Agrawal and P. J. Narayanan. 2011. Person de-identification in videos. Trans. Circ. Syst. Video Technol. 21, 3 (Mar. 2011), 299–310. DOI:https://doi.org/10.1109/tcsvt.2011.2105551
Hafiz Shehbaz Ali, Fakhar ul Hassan, Siddique Latif, Habib Ullah Manzoor, and Junaid Qadir. 2021. Privacy enhanced speech emotion communication using deep learning aided edge computing. In International Conference on Communications Workshops. IEEE, 1–5. DOI:https://doi.org/10.1109/ICCWorkshops50388.2021.9473669
Abdulaziz Almehmadi and Khalil El-Khatib. 2013. The state of the art in electroencephalogram and access control. In Conference on Communications and Information Technology (ICCIT). IEEE, 49–54. DOI:https://doi.org/10.1109/iccitechnology.2013.6579521
Ranya Aloufi, Hamed Haddadi, and David Boyle. 2020. Privacy-preserving voice analysis via disentangled representations. In Conference on Cloud Computing Security Workshop. ACM, 1–14. DOI:https://doi.org/10.1145/3411495.3421355
Arwa Alsultan and Kevin Warwick. 2013. Keystroke dynamics authentication: A survey of free-text methods. Int. J. Comput. Sci. Issues 10, 4 (2013), 1.
Abdulaziz Alzubaidi and Jugal Kalita. 2016. Authentication of smartphone users using behavioral biometrics. Commun. Surv. Tutor. 18, 3 (2016), 1998–2026. DOI:https://doi.org/10.1109/comst.2016.2537748
Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2013. Geoindistinguishability: Differential privacy for location-based systems. In ACM Conference on Computer and Communications Security (CCS). 901–914.
Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, and Thorsten Strufe. 2021. Inexpensive brainwave authentication: New techniques and insights on user acceptance. In 30th USENIX Security Symposium (USENIX Security). 55–72.
A. Terry Bahill, Michael R. Clark, and Lawrence Stark. 1975. The main sequence, a tool for studying human eye movements. Math. Biosci. 24, 3-4 (Jan. 1975), 191–204. DOI:https://doi.org/10.1016/0025-5564(75)90075-9
Fahimeh Bahmaninezhad, Chunlei Zhang, and John Hansen. 2018. Convolutional neural network based speaker deidentification. In Speaker and Language Recognition Workshop. ISCA, 255–260. DOI:https://doi.org/10.21437/odyssey.2018-36
Dustin Bales, Pablo A. Tarazaga, Mary Kasarda, Dhruv Batra, A. G. Woolard, J. D. Poston, and V. V. N. S Malladi. 2016. Gender classification of walkers via underfloor accelerometer measurements. Internet Things J. 3, 6 (Dec. 2016), 1259–1266. DOI:https://doi.org/10.1109/jiot.2016.2582723
Salil Partha Banerjee and Damon Woodard. 2012. Biometric authentication and identification using keystroke dynamics: A survey. J. Pattern Recog. Res. 7, 1 (2012), 116–139. DOI:https://doi.org/10.13176/11.427
Open Access Journal
Submit a Paper
Propose a Special lssue
pdf