The Biometric Paradox: What happens When Your Identity Changes?


Authors : Merlin Balamurugan; Kumar Shanmugasamy; Saranya Balaguru

Volume/Issue : Volume 10 - 2025, Issue 12 - December


Google Scholar : https://tinyurl.com/5n7mc3mc

Scribd : https://tinyurl.com/wmh2ydyw

DOI : https://doi.org/10.38124/ijisrt/25dec062

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : Have you ever wondered what happens when your body decides to rewrite its own security code? Our team cracked open this fascinating puzzle where your biological passwords keep changing without warning. Picture this: your face, fingerprints, and voice – those unique markers that make you "you" – are quietly shape-shifting through time. We've engineered three brilliant solutions that turn this identity crisis into a technological triumph. First up, our smart Adaptive Algorithm (boasting a jaw-dropping 94.25% accuracy) learns your changing features like a best friend who notices your new haircut. Then there's our Multi-Factor Authentication superhero, nailing it with 97.10% accuracy by combining what you are with what you do. Our third ace, the Re-Enrollment Trigger, acts like a vigilant bouncer who knows exactly when to update your VIP pass. We put these systems through their paces using a massive collection of real-world faces – think 13,233 photos of 5,749 different people going about their lives. Our breakthrough approach doesn't just solve the problem; it turns your evolving identity into your strongest security asset. Whether you're aging gracefully or transforming dramatically, our system grows with you like a digital chameleon. The results? A security framework that's as dynamic as life itself, ready for everything from hospital check-ins to high-stakes government operations. We're not just changing the game; we're rewriting the rules of how technology understands human identity. And the best part? This isn't science fiction – it's your new reality in the making. Finally, we've mapped out a clear path for the future, showing how biometric security can keep up with your life's plot twists and turns.

Keywords : Biometric Security, Biometric Drift, Adaptive Algorithms, Multi-Factor Authentication, Identity Verification.

References :

  1. Anderson, R., & Smith, J. (2023). "Adaptive Biometric Systems: A Comprehensive Review." IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(3), 1123-1142.
  2. Bhattacharya, S., et al. (2023). "Deep Learning Approaches in Dynamic Biometric Authentication." Neural Computing and Applications, 35(2), 789-806.
  3. Chen, X., & Wang, Y. (2022). "The Evolution of Facial Recognition: Challenges and Solutions." Security and Privacy, 5(4), 442-461.
  4. Das, A. K. (2023). "Multi-Factor Authentication in the Age of Biometric Drift." Journal of Information Security, 14(2), 178-195.
  5. Garcia, M., et al. (2023). "Temporal Dynamics in Biometric Security Systems." ACM Computing Surveys, 55(4), 1-34.
  6. Hassan, N., & Kumar, R. (2022). "Privacy-Preserving Biometric Authentication: Current Trends." International Journal of Information Security, 21(5), 623-642.
  7. Johnson, K. L. (2023). "The Impact of Aging on Biometric Systems." Biometric Technology Today, 12(3), 9-18.
  8. Kim, S., & Lee, J. (2023). "Adaptive Algorithm Models for Biometric Recognition." Pattern Recognition, 136, 109124.
  9. Li, W., et al. (2022). "CNN-LSTM Architectures in Biometric Authentication." IEEE Access, 10, 45678-45692.
  10. Martinez, C. (2023). "Re-enrollment Strategies in Biometric Systems." Journal of Cybersecurity, 9(2), 156-173.
  11. Patel, V. M. (2023). "Liveness Detection in Modern Biometric Systems." IEEE Security & Privacy, 21(1), 44-53.
  12. Rodriguez, A., & Thompson, B. (2022). "Medical Conditions and Biometric Authentication." Healthcare Informatics Research, 28(4), 312-327.
  13. Sato, H. (2023). "Behavioral Biometrics: A Secondary Authentication Layer." International Journal of Biometrics, 15(3), 267-284.
  14. Singh, R., et al. (2023). "The Future of Adaptive Biometric Systems." Nature Machine Intelligence, 5(6), 489-502.
  15. Smith, A. B. (2022). "Siamese Networks in Biometric Recognition." Computer Vision and Image Understanding, 217, 103341.
  16. Taylor, M. (2023). "Ethics and Privacy in Biometric Systems." AI and Ethics, 3(2), 145-162.
  17. Thompson, R. (2023). "Cross-Platform Biometric Authentication." Digital Security, 4(3), 278-295.
  18. https://www.spiceworks.com/it-security/identity-access-management/articles/biometrics-practical-applications/
  19. Wang, L., & Zhang, Y. (2022). "Federated Learning in Biometric Systems." Distributed Computing, 35(4), 567-584.
  20. Wilson, E. (2023). "Biometric Data Storage and Security." Journal of Data Protection, 6(2), 89-106.
  21. Xu, Y., et al. (2023). "Transfer Learning in Dynamic Biometric Systems." Machine Learning and Applications, 12(4), 423-440.
  22. Yang, Z. (2022). "IoT Integration with Biometric Authentication." Internet of Things Journal, 9(5), 678-695.
  23. Zhang, H., & Liu, Q. (2023). "Homomorphic Encryption in Biometric Systems." Cryptography and Security, 8(3), 234-251.
  24. Zhou, W. (2023). "Virtual Reality and Biometric Authentication." Virtual Reality, 27(2), 156-173.

Have you ever wondered what happens when your body decides to rewrite its own security code? Our team cracked open this fascinating puzzle where your biological passwords keep changing without warning. Picture this: your face, fingerprints, and voice – those unique markers that make you "you" – are quietly shape-shifting through time. We've engineered three brilliant solutions that turn this identity crisis into a technological triumph. First up, our smart Adaptive Algorithm (boasting a jaw-dropping 94.25% accuracy) learns your changing features like a best friend who notices your new haircut. Then there's our Multi-Factor Authentication superhero, nailing it with 97.10% accuracy by combining what you are with what you do. Our third ace, the Re-Enrollment Trigger, acts like a vigilant bouncer who knows exactly when to update your VIP pass. We put these systems through their paces using a massive collection of real-world faces – think 13,233 photos of 5,749 different people going about their lives. Our breakthrough approach doesn't just solve the problem; it turns your evolving identity into your strongest security asset. Whether you're aging gracefully or transforming dramatically, our system grows with you like a digital chameleon. The results? A security framework that's as dynamic as life itself, ready for everything from hospital check-ins to high-stakes government operations. We're not just changing the game; we're rewriting the rules of how technology understands human identity. And the best part? This isn't science fiction – it's your new reality in the making. Finally, we've mapped out a clear path for the future, showing how biometric security can keep up with your life's plot twists and turns.

Keywords : Biometric Security, Biometric Drift, Adaptive Algorithms, Multi-Factor Authentication, Identity Verification.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe