0% found this document useful (0 votes)
15 views55 pages

FULLTEXT01

Uploaded by

BISMAYA PARIDA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views55 pages

FULLTEXT01

Uploaded by

BISMAYA PARIDA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Bachelor Degree Project

Acceptance of Biometric Systems


for User Authentication and
Identification

Author: Mymoon Dobaibi


Supervisor: Arianit Kurti
Examiner: Fredrik Ahlgren
Semester: VT 2023
Subject: Computer Science
Abstract

Biometric systems have become increasingly popular for user authentication and
identification across various domains, including smartphones, laptops, financial ser-
vices, healthcare, and security. These systems offer enhanced security and quick
access to data, aiming to address the challenges associated with passwords and pins.
However, achieving a method that provides a 100% guarantee in all fields and for all
devices remains a challenge. To explore user perceptions on the acceptance of bio-
metric systems, an online survey was conducted with 99 participants from diverse
backgrounds, education levels, ages, and countries. The survey focused on under-
standing users’ acceptance of biometric systems based on their experiences and per-
spectives. Additionally, it aimed to investigate whether demographic factors, such
as age, education, and background, influence user acceptance. The study also com-
pared the preferred authentication technique among users with findings from previ-
ous studies. The survey results supported previous research, showing that fingerprint
technology is the most recommended and preferred method for user authentication,
followed by facial recognition. This study sheds light on the growing adoption of
biometric systems to overcome password-related issues and provides valuable in-
sights into user preferences for authentication and identification methods.
Keywords: Biometrics Acceptance, Authentication Techniques, User Prefer-
ences, Preferred Techniques, User Experiences, User Perception.
Preface

Undertaking this degree project has been a remarkable journey that has allowed us to
delve into the integration testing domain for complex software systems. We are grateful
to Volvo CE for the opportunity to undertake this thesis project.

I extend my heartfelt gratitude to my supervisor for his unwavering guidance and invalu-
able feedback throughout this project. His expertise and support have been instrumental
in navigating through this endeavor, and I am truly grateful for his responsiveness to my
queries and continuous assurance that we were moving in the right direction.

My sincere thanks also go to the survey participants, whose generous contribution of time
and insights enriched the content of my thesis. Last but not least, I am deeply appreciative
of my family, friends, and all those who have stood by me, offering unwavering support
and encouragement throughout this journey.

Finally, I would like to thank my family, friends, and all who supported me encouraged
me, and always been there for me.
Contents
1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Problem formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.5 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.6 Scope/Limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.7 Target group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.8 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2 Method 10
2.1 Research Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2 Reliability and Validity . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3 Ethical Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

3 Research project 15
3.1 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.2 Biometric Authentication Methods (Existing literature reviews) . . . . . . 15
3.2.1 Recognition Types . . . . . . . . . . . . . . . . . . . . . . . . . 16

4 Results 25
4.1 Research Question 1: Are biometric systems for authentication accepted
differently based on demographic characteristics? . . . . . . . . . . . . . 25
4.1.1 Age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.1.2 Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.2 Research Question 2: Do users consider/perceive biometric systems as
secure for authentication? . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.3 Research Question 3: Based on the survey, which type of authentication
provides the best user experience and perspective? . . . . . . . . . . . . . 28
4.4 Evaluation of Common Biometrics Based on Users’ Experiments . . . . . 32
4.5 Acceptance and Most Used Biometric Systems Based on Users’ Perceptions 32

5 Analysis 34

6 Discussion 36

7 Conclusions and Future Work 37

References 41
A Appendix: Survey Questions and Results 44

B Appendix: Informed Consent Form 50


1 Introduction
Biometric systems have seen increased adoption in recent years due to rising concerns
over theft, fraud, and weaknesses in traditional passwords and PINs [1]. These security
systems aim to address previous identification and authentication issues faced by users.
Despite significant advancements in authentication technology, most systems still ex-
hibit some flaws, and no method can provide a 100% guarantee across all areas and ap-
plications [1]. The usage of authentication systems may vary from one system or device
to another and from one location to another.
Security management remains a critical concern in various fields and applications to
safeguard data, especially with the increasing prevalence of biometric-related issues, such
as fraudulent transactions, fake cards, identity theft, and false authentication, in today’s
internet-dominated world.
Various biometric systems exist, such as fingerprint recognition, facial recognition,
ear, iris, retina, palmprint, vein, voice, signature, gait, etc. Each method may demonstrate
efficiency in specific fields or applications [2]. For instance, fingerprint recognition, noted
for its efficiency and widespread application, finds utility in diverse fields such as mobile
phone security, criminal justice, and border control. Facial recognition systems excel in
security and surveillance, making them instrumental in identifying individuals in public
spaces and organizational contexts, while the retail sector benefits from their capacity to
streamline customer identification and access control at airports.
In the realm of high-security access control, iris recognition reigns supreme, safe-
guarding sensitive locations like data centers and nuclear facilities. Voice recognition
technology, on the other hand, bolsters the realms of banking, finance, and call centers,
and has become an integral component of voice assistants such as Bixby, Siri, and Alexa.
Palm vein recognition offers its efficacy in diverse applications, from securing ATM
transactions to ensuring the authenticity of healthcare personnel and providing secure
building access. Retina recognition’s unparalleled precision is a vital asset in the domains
of national security and biometric passports, fortifying identity verification and access
control.
Hand geometry recognition, while less commonly known, is pivotal in the domains of
prisons and workforce management, simplifying tasks like employee clock-ins and access
control.
This paper aims to differentiate between literature reviews (previous studies) and my
survey, which gathered responses from 99 users about their acceptance of biometric sys-
tems, preferred methods, reasons behind their choices, and more.

1
1.1 Background
"Biometric recognition systems should provide a reliable personal recognition scheme
to either confirm or determine the identity of an individual. The system can include
computer systems security, secure electronic banking, mobiles, credit cards, ATMs, and
secure access to buildings, health, and services.
Numerous biometric authentication methods are now employed to ensure secure ac-
cess to private data. These applications find use in diverse fields, including mobile phones,
ATMs, computers, hospitals, banks, and building access. Commercially available biomet-
ric methods like face recognition, iris recognition, fingerprint scanning, hand geometry,
and voice recognition are already used [1].
Among these methods, fingerprint authentication stands out as one of the most widely
used and secure options, implemented in smartphones, passports, airports, computers,
and ATMs. In today’s technologically advanced era, biometric authentication has be-
come an essential tool for protecting users’ sensitive data. While traditional single-factor
authentication, like username and password, is common, it is considered weak. To en-
hance security, two-factor, or multi-factor authentication options, such as fingerprint or
face recognition along with SMS verification, are gaining popularity [3].
To explore the most preferred biometric authentication methods in various fields, in-
cluding mobile phones, computers, etc, a study will be conducted. This study will involve
surveying users to understand their preferences, reasons for feeling secure with certain
biometric systems, and the potential impacts of these techniques. The findings of the sur-
vey will be compared with previous studies to gain a comprehensive understanding of the
topic [4] [2] [5] [6].

Research Questions:

1. Are biometric systems for authentication accepted differently based on demographic


characteristics?
This aims to investigate whether the acceptance of biometric systems for authen-
tication differs based on demographic characteristics such as age, education level,
background, and experience.

2. Do users consider/perceive biometric systems as secure for authentication?


In general, biometric authentication is a secure method, but according to the per-
ceptions and experiences of the user, it may differ due to experience or knowledge.

3. Based on the survey, which type of authentication provides the best user experience
and perspective?
By examining the survey responses, we can identify the authentication method that
received the highest preference or satisfaction ratings among the participants.

2
1.2 Related Work
Here you briefly describe what others have done in the field of study or how My research
aims to identify the most commonly used, high-performing, and reliable authentication
methods from the user’s perspective, considering their demographic characteristics and
acceptance of these systems.
The related work section of this paper provides a summary of relevant studies, includ-
ing "Acceptance of Biometrics System for User Authentication and Identification," which
will be compared with my research based on a survey of public beliefs.
A survey conducted by Waheeda Almayyan in December 2019; it was found that the
younger generation in Kuwait showed relatively high acceptance of biometrics. However,
some participants expressed concerns about the potential misuse of biometric data, health
risks, and unauthorized access to information. The survey also highlighted fingerprints as
the most widely accepted and favored biometric method [7].

In July 2022 A.K. Jain, D. Deb, and J. J. Engelsma


conducted a study on biometric trust, demonstrating
that fingerprints exhibited the highest verification ac-
curacy at 40 %, followed by face recognition at 15 %
and iris at 13 %. These three methods garnered sig-
nificant attention in the current market [5].

Figure 1: biometric accuracy [5]

Another survey conducted by Fletcher, James, and others in May 2017, revealed that
around 74 % of participants accepted or adopted biometric systems for identification and
authentication [8]. The survey consisted of 414 participants, of which 86 % had com-
pleted 2-4 years of university education, and many of the participants accepting biometric
systems fell within the age range of 18-40 years. There was no significant difference be-
tween males and females in terms of accepting biometric systems for authentication. The
preference for fingerprint identification was attributed to its widespread availability and
familiarity on smartphones and computers [8].
In May 2019 O. Buckley & Jason R. published a survey analyzing public perceptions
of acceptance of biometric systems. This indicated that participants had a strong level
of awareness and acceptance of specific biometric methods like fingerprint technology
and face recognition, due to their wide usage in various devices and applications. The
survey also showed that participants under the age of 45 exhibited higher acceptance and
awareness of biometric methods, while education level correlated positively with accep-
tance [9]. The majority of the participants (83 %) were under the age of 45. This age

3
group tends to be more tech-savvy and familiar with emerging technologies, which could
explain their higher acceptance and awareness of biometric methods. Furthermore, the
survey indicated that 67 % of the participants had a bachelor’s degree, suggesting a cor-
relation between education level and acceptance of biometric systems. Higher education
might contribute to a better understanding of the underlying technology and its benefits,
leading to increased acceptance [9].
In November 2022, Kitsiou and others conducted a study in Greece to understand how
demographic and social factors affect individuals’ acceptance of biometric systems. The
study revealed that participants of the 18–22 age group had a higher level of familiarity
and adoption with fingerprint (52 %) and face recognition (50 %) techniques compared to
other age groups and that most participants were willing to replace passwords with finger-
printing, indicating the significance of age in the acceptance of biometric systems [10].
The education level influences the adoption and acceptance of biometric systems. Ap-
proximately (85 %) of participants indicated that biometric systems, in general, have made
their daily lives much easier. This positive perception reflects the convenience and effi-
ciency that biometric systems bring to daily tasks. However, 15 % of participants ex-
pressed opposition, indicating that some individuals may have reservations or concerns
about biometric systems [10]. In terms of gender, women rely on biometric systems more
than men based primarily on the uniqueness of their biometric information, and women
have difficulties remembering passwords more than men.
A study conducted by A. S. Tolba, A.H. El-Baz, and A.A. El-Harby In 2006 high-
lighted the challenges faced by face recognition in specific domains, such as pose and
illumination changes, while acknowledging its widespread usage in smartphones, com-
puters, and other fields. Although face recognition has an accuracy of 95 %, it still
lags behind fingerprint and iris-matching performance in current automatic face recog-
nition systems [11]. Through my survey, I have discovered unique insights that were not
present in other literature reviews. The survey was conducted in both English and Ara-
bic languages, which allowed for participation from individuals with diverse cultural and
technological backgrounds. Furthermore, I have determined the preferred technology for
authentication based on the users’ experiences and perspectives.
However, while this work has been completed, it lacks a demographic aspect based
on gender, specifically examining the perspectives of men and women separately, and the
use of two or more factor authentication.

4
1.3 Problem formulation
The challenges outlined in the "Problems / Challenges & Gaps" section align well with
the findings and insights derived from the "Related work" section provided earlier. Let’s
delve into how these challenges reflect from the related work:

1. Weak or reused passwords: It is normal for most users to forget passwords, espe-
cially if the person has many accounts. According to the results of my study, the
majority of the participants agree and strongly agree that using weak or repeated
passwords for more than one account makes the data easy to hack.
In addition, the observation of participants in the related work section expressing
concerns about weak or reused passwords corresponds directly to the challenge
presented. The study by Fletcher et al. (2017), revealed that participants resorted to
fingerprint identification due to its availability and familiarity on smartphones and
computers, potentially indicating their inclination to avoid the challenge of weak
passwords [8].

2. Complex passwords: According to participants’ perspectives (Appendix A, ques-


tion 17), one common challenge with traditional passwords is the difficulty of re-
membering complex passwords, which makes passwords easy to forget and con-
sumes time remembering or changing passwords include a combination of upper-
case and lowercase letters, numbers, and special characters.
The participants’ difficulties in remembering complex passwords, as mentioned
in the related work, validate the challenge of complex passwords. The prefer-
ence for biometric methods like fingerprints, as highlighted by Almayyan’s survey,
could signify users’ desire for more straightforward and user-friendly authentica-
tion methods [7].
Biometric System problem:

3. Privacy Concerns: The privacy concerns expressed by participants in various stud-


ies, such as Almayyan’s and Buckley’s, directly mirror the challenge of privacy
concerns in biometric authentication. This alignment reinforces the need for en-
hanced security features and user education to address these worries [7] [9].
These concerns often stem from fears of potential theft or misuse of their biometric
data. Additionally, community education plays a significant role in raising aware-
ness about the importance of protecting biometric data to prevent unauthorized
access and identity theft. The findings from various sources indicate that these
privacy concerns have a substantial impact on the adoption of biometric authentica-
tion [2] [3] [12] [13].

5
4. Accuracy Issues: The acknowledgment of accuracy issues in biometric systems, as
described in challenges and gaps, finds resonance in the related work Jain, Deb, and
Engelsma’s (2022) study highlighted the variations in verification accuracy among
different biometric methods, supporting the idea of potential accuracy issues [5].
Biometric systems can sometimes lead to a False Acceptance Rate (FAR) or False
Rejection Rate (FRR) which means accepting an unauthorized user as a genuine
user or rejecting the genuine user. That can happen by mistake due to several
factors such as an injured fingerprint, face, or changing the environment or age,
etc. [14] [2].

5. Single-Factor Risks: The recommendation in the related work by Allen and Ko-
mandur (2019) to use biometrics with two-factor authentication resonates with the
challenge of deploying biometrics in single-factor mode [15]. This suggestion re-
flects the industry’s awareness of the potential risks associated with single-factor
biometric authentication.

6. Lack of Awareness: The participant’s preference for traditional passwords due to


familiarity and lack of awareness, as indicated in the related work, corresponds
directly to the challenge of lack of awareness. This alignment suggests that some
users might choose familiar methods over biometric authentication due to a lack of
understanding of its benefits.

Based on the insights from literature reviews and my conducted survey, it is evident that
biometric systems are continuously evolving and improving. However, it is essential to
know there are no authentication systems that can provide a guarantee of 100 % secu-
rity [2].
The gaps in biometric authentication and traditional passwords pertain to weaknesses
and limitations in their usage for user identification. Numerous gaps have been identified
from users’ perspectives and literature review studies and biometric systems may not be
suitable for all users, especially those with disabilities or injuries. Additionally, environ-
mental factors, such as noisy surroundings, injured or wet fingerprints, wearing glasses
or lenses, and poor-quality images, can affect the accuracy and performance of biometric
systems, leading to authentication errors or rejections.
It’s essential to recognize that there are still gaps in biometric authentication technol-
ogy that need to be addressed. Ongoing research and development efforts are essential
in the field of biometric authentication to enhance security, privacy, and usability for all
users. By continuing to push the boundaries of biometric authentication, we can create a
more secure and efficient future for everyone.

6
1.4 Motivation
My study aims to investigate users’ acceptance of biometric systems for authentication
based on their perceptions and experiments while also considering demographic factors.
Additionally, I aim to identify the most preferred biometric systems for authentication
based on users’ feedback from survey questions. This will allow me to compare users’
preferences with existing literature reviews and determine which authentication technol-
ogy is the most secure and preferred.
This study is driven to understand user acceptance of biometric systems for authen-
tication by examining users’ perceptions and conducting experiments. The research will
provide insights into how different demographic groups perceive and accept biometric
authentication, which can help to identify the acceptance of biometric systems based on
factors such as age, education, and cultural background. On the other hand, it will lead
software providers and decision-makers to develop biometric systems to adapt and meet
the needs of different users.
Additionally, the study will enhance user experience by considering users’ percep-
tions and preferences. The study will identify the best and preferred biometric systems
for user authentication. Users’ expectations and preferences can lead to improving user
experiences by aligning the authentication process.

1.5 Results
The findings of my study highlight the preference for and acceptance of fingerprints as a
widely used and secure biometric authentication method. The high percentage of partic-
ipants with educational degrees and young demonstrates the correlation between educa-
tional background and interest in biometric systems.
My findings indicate that participants consider fingerprint technology to be the best
and preferred method for user authentication, aligning with previous studies. The accu-
racy and performance of the fingerprint feature contribute to increasing its acceptance
among users. Following fingerprint technology, facial recognition features are considered
the second-best method for accuracy and performance.

1.6 Scope/Limitation
In this thesis, I conducted a study to compare users’ perceptions and opinions about the
acceptance of biometric systems for user authentication with facts based on previous stud-
ies. I used a survey to collect data from 99 participants and asked them 18 questions about
their preferred and secure authentication techniques. My survey does not cover how to
develop authentication systems, which could lead to further research to evaluate users’
opinions and experiments and develop the system based on this survey result.

7
Limitation:

1. Participants classification: A limitation of the study is that participants were not


classified based on gender and technical background. This means that some par-
ticipants with technical or experience backgrounds may not have been properly
accounted for. At the same time, the study didn’t mention which group (men or
women) prefer or rely on biometric systems more than traditional passwords. Ad-
ditionally, the study did not mention the percentage of men and women who partic-
ipated, which could have provided valuable insights into how demographic factors
may have influenced perceptions and acceptance of biometric systems. Including
this information would have been beneficial.

2. Publication period & number of participants: The survey was only published for
a short period of 10 days due to time constraints, and the number of participants
was relatively small (99 participants). This limited timeframe and participant pool
may affect the generalizability of the findings. A more extended survey period
would allow for more diverse participants, which can provide a representation of
user experiences and preferences. This can help ensure more accurate and reliable
results.

3. Two-factor authentication: Another limitation is that the study did not specifically
focus on two-factor authentication systems, which provide an additional layer of
security. Instead, the study’s primary focus was on user acceptance of biometric
systems compared to traditional passwords and preferred authentication methods.

1.7 Target group


The target group for this study includes users of mobile devices, computers, tablets, and
other devices where authentication systems are utilized in daily life. Furthermore, com-
panies that implement biometric systems in their devices could benefit from the study’s
insights regarding user experiences and perceptions. Understanding user preferences and
concerns can help these companies enhance their biometric systems for more effective
user identification.
Overall, this study seeks to provide valuable insights into the perceptions and prefer-
ences of users regarding biometric authentication systems in various devices.

8
1.8 Outline
This study is structured into 7 chapters for a comprehensive exploration of the topic:

• Chapter 1: Introduction

– Background of biometric systems and the challenges/problems they face.


– Identification of research gaps and formulation of research questions.
– Review of related work, including previous studies and the survey’s target
group and motivation, limitation/scope, and finding results.

• Chapter 2: Methodology

– Discussion of the research methodology, research methods, reliability and va-


lidity, and ethical considerations.

• Chapter 3: Research Project (Biometric Authentication Methods)

– Examination of various biometric methods based on experimental data from


literature views.
– Challenges of existing literature views (Biometric Authentication Methods).

• Chapter 4: Results

– Detailed presentation of the obtained results from the survey (Research ques-
tions and answers)

• Chapter 5: Analysis of Results

– Thorough analysis and interpretation of the survey results.

• Chapter 6: Discussion

– Discusses and describes the method and users’ experiments opinions and re-
sults and defines the problem and challenges.

• Chapter 7: Conclusion and Future Work

– Conclusion and potential avenues for future research and further exploration.

9
2 Method
The proposed methodology is designed to thoroughly assess users’ acceptance of biomet-
ric systems for authentication compared to traditional methods. As well as the effects of
demographic characteristics on acceptance. To ensure transparency, the following details
regarding the methods employed in the research are provided:
Survey Distribution:
The survey was widely distributed across multiple platforms to ensure a diverse and
extensive participant pool. Specifically, the survey was made accessible through social
media platforms such as LinkedIn, Facebook, and WhatsApp. In addition, the survey
was made available in both English and Arabic languages to cater to a broader demo-
graphic. The distribution strategy aimed to reach a wide range of users, including those
with varying levels of familiarity with biometric authentication.
Publication Channels:
To ensure a broad and diverse participant pool, the survey was posted on various
channels. These channels included:

1. LinkedIn: The survey was shared on professional networks without targeting spe-
cific users. It was open to the public, and anyone could contribute their experiences
and perspectives.

2. Facebook: The survey was posted in relevant groups and communities, particularly
those related to computer science, technology, privacy, and security.

3. WhatsApp: The survey link was circulated among my contacts on WhatsApp in


both English and Arabic. Participants were encouraged to share the survey link
within their WhatsApp groups in both languages, extending the reach to their own
contacts.

Data Collection and Privacy:


Data collection was conducted through Google Docs Forms, a widely recognized and
user-friendly platform for survey data collection. The survey was designed with a pri-
mary focus on ensuring participant privacy and anonymity. This approach encouraged
participants to provide honest responses without any fear of compromising their personal
information. It was made clear to all participants that the collected data would be used
solely for academic research purposes, and their personal details would remain anony-
mous.
Participant Selection:
The study involved 99 participants from various demographics and backgrounds, con-
sidering factors such as educational level and age. This diverse sample allows for insights
into the varying perceptions of biometric authentication. Each participant was provided

10
with a consent form, ensuring that their responses would remain confidential, and their
identities protected.
Survey Design:
The survey itself was designed as an online questionnaire and was made accessible to
users on various social media platforms, including LinkedIn, Facebook, and WhatsApp. It
sought to gauge user perceptions of biometric authentication through a series of questions
presented in a Likert scale format. This format allowed participants to express their level
of agreement or disagreement with statements regarding biometric authentication clearly.
The questions were mentioned in Chapter Appendix A page (44) This approach enabled
participants to express their level of agreement or disagreement clearly and contributed to
determining the overall acceptance rate of biometric authentication systems.
Data Analysis:
Once the data collection phase was completed, a rigorous data analysis process was
initiated. The objective was to identify the most preferred biometric authentication sys-
tems among users and assess the extent to which users rely on biometric methods com-
pared to traditional passwords. The data analysis involved comparative studies to relate
the findings to existing research, facilitating the derivation of meaningful conclusions.
Results Reporting:
The study’s results were presented, highlighting key findings, and offering recom-
mendations for potential future research endeavors. These findings were contextualized
within the existing literature on biometric authentication systems and were substantiated
by comparisons with previous studies.
Alignment with previous studies:
The survey results were aligned with the findings from previous studies. For instance,
a study conducted in 2014 [16] emphasized the efficiency and safety of specific biometric
methods, such as Finger Vein and Iris recognition. It also underscored the widespread use
and cost-effectiveness of fingerprint authentication across various devices.
Another study conducted in 2022 supported the survey results, affirming strong agree-
ment among participants regarding the dominance of fingerprint authentication [5]. This
study identified similar trends in the survey results conducted in both Arabic and English
languages. Specifically, the survey conducted in Arabic indicated that approximately 56.3
% of respondents strongly agreed, and 40.6 % agreed that fingerprints were the most well-
established and widely used method. The survey conducted in English revealed that 32.8
% strongly agreed, 34.3 % agreed, and 23.9 % were neutral regarding the dominance of
fingerprint authentication.
This methodology provides a robust framework for assessing biometric system accep-
tance and ensures the comprehensive exploration of users’ perceptions. It aims to con-
tribute valuable insights to the field of biometric technology adoption and its alignment
with user preferences and demographics.

11
2.1 Research Method
The research method employed for this study involved the distribution of a survey in
two different languages, English and Arabic, to assess the general public’s acceptance
of biometric systems for authentication. The survey design encompassed questions re-
lated to participants’ experiences and preferences regarding biometric systems and tradi-
tional passwords. The survey was made accessible on various online platforms, including
Google Forms, LinkedIn, Facebook, and WhatsApp.

1. Survey Design: The survey was designed to encompass questions related to par-
ticipants’ experiences and preferences regarding biometric systems and traditional
passwords. The survey was made accessible on various online platforms, includ-
ing Google Forms, LinkedIn, Facebook, and WhatsApp. The survey consists of 18
questions, and it should take about [2-4] minutes to complete.

2. Survey Publication Platforms The survey was published on three main platforms:
LinkedIn, Facebook, and WhatsApp. These platforms were selected due to their
wide user base and accessibility. Only the English version of the survey was shared
on LinkedIn. Both English and Arabic versions were published on Facebook, with
dissemination in technology-related groups and the researcher’s general page. On
WhatsApp, the survey link was directly shared with personal contacts and What-
sApp groups.

3. Survey Language: The survey was conducted in two languages English and Arabic,
which could give participants the freedom to choose the language they prefer or
speak with. That could reach more participants from different countries and differ-
ent languages.

4. Target participants: The survey was open to anyone willing to participate and share
their perspectives and experiences on the topic. It was made accessible to indi-
viduals who came across the survey announcement on the selected social media
platforms.

5. Survey Duration and Participant Numbers: The survey remained open for 10 days,
during which 99 participants responded. Among these, approximately 67 partici-
pants completed the English version, while 32 participants completed the Arabic
version.

6. Ethical Consent Statement: An ethical agreement was provided at the beginning of


the survey on Google Forms. Participants were assured that their responses would
be kept confidential and anonymous, and the data would only be used for academic
purposes. No personally identifiable information such as names, email addresses,
or IP addresses was collected.

12
7. Data Analysis: Once the survey period ended, the responses provided by the partic-
ipants were compiled and analyzed to gain insights into the general public’s accep-
tance of biometric systems for authentication.

2.2 Reliability and Validity


To ensure the survey’s reliability and validity, a diverse group of users from various de-
mographics, including different education levels, age groups, countries, and languages,
were included. This diverse sample helps to increase the survey’s validation and produce
clear and robust results. The survey focused on main factors such as:

1. Content validity: All relevant aspects of acceptance of biometric systems for user
authentication and identification were covered in the survey, ensuring that the ques-
tions encompassed all aspects of the topic.

2. Construct validity: The survey was designed to measure users’ attitudes toward bio-
metric systems for authentication and identification. The questions targeted a large
group of users with varying characteristics, including age, education, and familiar-
ity with traditional passwords compared to biometric systems, to understand users’
different attitudes.

3. Answer reliability: The survey aimed to produce consistent answers if participants


were to retake it. This ensures that the responses are dependable and trustworthy.

4. Internal reliability: The survey questions were interconnected, enabling a coherent


relationship between the provided answers. The survey results were also compared
with findings from previous literature reviews on the same topic, validating the
survey’s accuracy and consistency with existing research.

By meticulously conducting these steps, I gained more confidence in the survey’s results.
To further validate the survey, I collected and analyzed various papers from previous lit-
erature reviews, comparing them with users’ opinions and experimental data from my
survey. The results showed remarkable consistency, further reinforcing the survey’s va-
lidity.
By meticulously conducting these steps, I gained more confidence in the survey’s
results. To further validate the survey, I collected and analyzed various papers from previ-
ous literature reviews, comparing them with users’ opinions and experimental data from
my survey. The results showed remarkable consistency, further reinforcing the survey’s
validity.
Reliability and validation may have some issues depending on the participants’ an-
swers/opinions and could be not correct even using only one single authentication tech-
nology. By incorporating these measures and comparing the survey results with existing

13
literature, the survey provides valuable insights into biometric authentication systems and
their acceptance among users.

2.3 Ethical Considerations


Before commencing the survey to gather participants’ opinions and experiences, informed
consent was obtained, detailing the study’s purpose and procedures. Participants were
informed of their right to withdraw from the study at any point. Strict measures were taken
to protect their privacy, ensuring that their identities and personal information remained
confidential.
The objective of the study was to assess the acceptance of biometric systems for user
authentication and identification. The study aimed to determine the most preferred and
effective method among many users and compared my result with previous studies.

14
3 Research project

3.1 Literature Review


Through a comprehensive exploration of academic sources, I gathered and analyzed rel-
evant research papers published in reputable journals and databases, including IEEE,
Google Scholar, ScienceDirect, ACM Digital Library, (OneSearch) library, Semantic-
scholar.org, SpringerLink, Emerald, ResearchGate, and Academia.edu. To streamline
the research process and yield the best outcomes, I utilized indexing terms to identify
pertinent publications. The focus of my investigation encompassed aspects such as the
acceptance of biometric systems, authentication techniques, single-factor authentication,
passwords, smartphones, and other devices. Furthermore, I considered the number of
citations as an indicator of paper quality, evaluated through Google Scholar.
Additionally, considering the number of citations was a measure of paper quality as-
sessed by Google Scholar. By aligning the collection of relevant research papers with my
research questions and survey questions, I can ensure that my survey is well-designed to
provide meaningful results.

3.2 Biometric Authentication Methods (Existing literature reviews)


This research project consisted of understanding what biometrics authentication methods
are, so for that reason, I conducted the literature survey. After conducting a survey with
users to better understand their perceptions, I have come up with “Fig. 2” which provides
a taxonomy of the biometric methods used for authentication.

Figure 2: A taxonomy of biometric authentication methods based on literature reviews.

I will conduct literature review studies and a survey for 99 users to determine the ac-
ceptance level of biometric systems for user authentication. The survey will help identify
the preferred authentication method among users based on their perceptions and experi-
ences. Through this survey, I aim to compare and verify whether the results align with the
previous literature review studies.

15
3.2.1 Recognition Types

Biometric System Techniques: Previous Studies / Literature Reviews

A. Physiological Biometric Authentication:

1. Fingerprint Recognition:

The fingerprint feature has been successfully used in


many applications and fields. It is one of the old-
est authentication methods. The fingerprint is con-
sidered a unique method to each human and is non-
changeable with time, which makes it more secure
than traditional passwords, pin codes, or other bio-
metric systems [17].

Figure 3: Fingerprint Recognition


(Picture of my phone)

The fingerprint technique has been used for user authentication in many applications
and sections:
• Smartphones, tablets & computers.
• Passports and ID cards. • Security measures at airports and borders to combat illegal
immigration.
• ATMs and banking transfers.
• Secure access to buildings, healthcare, and services, among others. Since the 1980s,
fingerprint technology has been in routine use, and its popularity has grown significantly
in recent times due to its accuracy in user identification. Fingerprint authentication of-
fers high performance, security, permanence, and wide acceptance, making it a preferred
choice for many users across different devices.
2. Face Recognition:
Face recognition is used as a biometric for secure authentication since the face is
unique almost like a fingerprint. Nowadays Cameras use high-resolution capacity to cap-
ture face images and save them to a database to identify user access. These days, a lot of
work has been done throw face recognition, especially on smartphones [18].

16
The facial recognition feature has become more se-
cure and used than before, especially after the im-
provement of smartphone Cameras, and the use of
3D technology to recognize the face and provide users
with secure access to their data.
Figure 4: Face recognition [18]

The adoption of face recognition enhances device security, moving away from con-
ventional methods like PINs and passwords, which may be susceptible to unauthorized
access if written down or easily guessed [19]. Face recognition technology has been suc-
cessfully applied in various sectors, including smartphones, passports, computers, border
control, criminal identification, and access control.
3. Iris Recognition:
Each person has a unique characteristic iris that can be made iris feature distinguishes
features and is used in a wide range of applications. Since iris recognition technology is
new compared to fingerprint and face, it may cost and face some challenges, but it did a
great job.

This feature is used for user authentication methods


because it is unique, remains unchanged throughout
an individual’s lifetime, and is complex and cannot be
copied [17]. It provides users with very accurate tech-
nology with a low false acceptance and a safe method
Figure 5: Iris recognition [16] for identification and authentication [16].

4. Finger Vein Recognition:


Finger Vein Recognition is one the best and most secure methods nowadays because
it’s unique for each person and fast, and it takes about 0.8 seconds to verify one input
Finger Vein as I showed in the experiment in mobile devices [18].

The tech provides high Permanence and


Uniqueness, which achieved an equal error
rate (EER) of 0.07 % on a database of 100
subjects, but unfortunately, this technology
is not widely accepted, and it’s a high cost.
Figure 6: Finger Vein recognition [18]

17
5. DNA Recognition:

DNA features (Deoxyribonucleic acid) are unique for


each person, but it is not used and is acceptable in
smartphones and many other devices. DNA features
are complex and could be stolen from a person, and
since it takes time to identify the user, all this limits
the use of DNA matching in smartphones, computers,
and much more [20].
DNA could be limited in many fields and has some
drawbacks, but it’s useful also in different fields such
Figure 7: DNA recognition [2] as health, crime, etc.

6. Retina Recognition:
Retina recognition is regarded as one of the most secure biometric systems due to its
unique nature for each individual, remaining unchanged over time and being resistant to
replication or duplication [20].

This technology captures the user’s retinal vasculature


image, requiring the user to focus on a specific spot
in their visual field. However, this process may take
some time and can potentially impact the user’s vision
with prolonged usage, which could affect the user’s
acceptance of using retina recognition as the primary
authentication method [22].
Figure 8: Retina recognition [21]

7. Hand and Palm Recognition:


Hand and palm recognition systems have not yet gained widespread adoption, partic-
ularly in smartphones, computers, buildings, and passports.

Figure 9: Palm Recognition [21] Figure 10: Hand Recognition [21]

18
While hand recognition may require further development to enhance its accuracy,
palm recognition proves more accurate as it is unique to each individual [18]. Soon,
these biometric systems are expected to be available in smartphones and various devices,
especially in countries like the UK and Japan, where these features are already being
utilized and developed.

B. Behavioral Biometric Authentication:

1. Voice Recognition:
Voice recognition is a biometric system that offers
a unique identity for each individual based on their
voice or speech characteristics. This technology can
be implemented through the microphone of a phone
or computer [17].
The voice biometric system provides efficient secu-
rity for authentication and identification purposes. It
utilizes an automated conversion method to transform
Figure 11: voice Recognition [2] speech or recorded voice into text or numerical data,
depending on the type of password used [23].

The process of voice recognition involves two main steps: training and testing to iden-
tify the person. However, compared to fingerprint biometrics, voice recognition may take
longer. One of the drawbacks of the voice biometric system is its vulnerability to voice
recordings by unauthorized individuals, which compromises its security and makes it less
reliable compared to other biometric systems currently available.

2. Signature Recognition:

Signature recognition systems find applica-


tions in various fields, such as postal ser-
vices and workplaces. This technique re-
lies on capturing finger movement, direction,
shape, and speed during the act of signing.
The recorded signature data is stored in a
database, enabling the system to authenti-
cate users based on their signature when re-
quired. [24] [25].
Figure 12: Signature Recognition [21]

However, it is important to note that signature recognition systems may have limita-
tions in terms of accuracy and security. Signatures can be forged or mimicked, which
raises concerns about their reliability as a standalone biometric authentication method.

19
3. Keystroke Recognition:

Keystroke Dynamics refers to behavioral


characteristics such as the time taken by
a user to input a PIN code or password,
the speed of typing, and the pressure ap-
plied [24].
Figure 13: Keystroke Recognition [25]

This feature was introduced as early as 1975 and has been widely used in computers.
However, the process may require some time for training, as it involves analyzing the
finger pressing and position. Users are typically prompted to input their password mul-
tiple times to enable the technology to analyze and save the keystroke patterns for future
recognition.
Today users can utilize touch-screen keyboards instead of physical keyboards, which
allows the system to identify the size of the touching finger, the applied pressure, and the
location on the screen [25].

4. Gait Recognition:
Gait recognition is categorized as a behavioral bio-
metric authentication method, as it requires the anal-
ysis of the user’s walking pattern. Unlike other meth-
ods, gait recognition does not require active involve-
ment from the user. It can automatically verify the
identity of the user without any intervention.
However, gait recognition has shown some limitations
in terms of performance and user acceptance. The
Equal Error Rate (EER) for gait recognition is rela-
tively high, at 20.1 % which is significantly different
from the EER for finger vein recognition, which is
only 0.07 % [25]. This indicates that gait recogni-
tion is not yet secure enough and is still under de-
Figure 14: Gait Recognition [2] velopment. Nevertheless, it has been implemented in
some devices, such as smartphones equipped with ac-
celerometers.

There are three main types of gait recognition methods:


1- Machine vision: This method captures the user’s walking behavior using a camera
(video).
2- Floor sensor: The user’s gait is analyzed through a sensor placed on the floor.
3- Wearable sensor: Users wear a device that measures their walking pattern [18].

20
The following table shows the advantages and disadvantages of Biometrics System
techniques used by different authors in their papers described in the literature.

Literature Reviews/previous studies

Techniques Advantages Disadvantages


Fingerprint • Most preferred Biometric system. • The fingerprint impressions of the
• Easy to use and install [16]. user can be obtained from any ob-
• Not expensive compared to finger ject that is held by users in their
vein or face recognition, etc. hands[27].
• Provides higher accuracy, secu- • Marks and cuts could make finger-
rity, and speed than a password and prints fail.
PIN. • Sometimes, it takes time to set up
• Common and widely used in sev- compared to face recognition.
eral applications such as Border • Wet fingers harm the performance
Control (BC), Smartphones (SP), of fingerprints.
Computers, Forensics (F), Crimi- • Since fingerprints can be on any
nal Identification (CI), Access Con- subject, they can be made a fake
trol (AC), E-Commerce (EC), Wel- copy.
fare Disbursements (WD), Missing
Children Identification (MCI), Id-
Cards (IC), Passports (P), etc.[1].
• 99 % of the applicants could be
enrolled with fingerprints[26].

Face • Good accuracy. • Could require extra hardware like


• Accepted by many users and is Camera[28].
easy to use. • Does not work well under poor
• Provide High accuracy. conditions such as poor lighting or
a mask.

Iris • Unique structure Technology. • High cost.


• Unchanged throughout an individ-
ual’s lifetime.
• Provide high accuracy and low
false acceptance [16].
• Stability and easy-to-use and se-
cure method.
• Could work with glasses and
lenses [16].

21
Finger vein • Fast to verify one input finger vein • High cost.
about 0.8 seconds [18]. • Low Acceptability.
• Provide high performance.
• Provide Uniqueness and more se-
curity.

DNA • Could be the most reliable biomet- • Sensitivity makes it easy to steal
rics. from an individual.
• Unique for each person. • Complex and not used in real-time
• High performance. applications [20].
• Low Acceptability.
Retina • High accuracy [18]. • Retinal scanning would dam-
• Not easy to change or replicate. age vision with extended use over
• High performance. time [29].
• High cost [18].

Hand and Palm • A hand is easy to use and inexpen- • Palm is a high cost [20].
sive. • The hand provides low perfor-
• Palm is unique. mance.
• Palm is more reliable than • People’s hands change over time
hand[20]. with growth, or when someone gets
• A highly accurate combination of injured[1].
hand and palm features.
• Palm provides high performance.

Voice • Provide more protection. • People’s voices change over time


• Widely accepted. with growth or when someone gets
• Easy to use. sick or cold [17].
• Remote authentication [18]. • Not widely used for identification.
• High Acceptability. • Sensitive and may be affected by
background noise.
• Easy to get an attack using a
recorded voice.

22
Signature • Widely used. • Low accuracy.
• High Acceptability. • Low performance.

Keystroke • No need for additional hardware • Low Permanence.


[30]. • Low Acceptability.
• Unique • Low performance.
• High cost [30].

Gait • Can work without user interven- • Low performance.


tion [18]. • Low Acceptability.
• Low Permanence, can be affected
by injury, etc.
• Not widely used.

Table 1:advantages & disadvantages of Biometrics System based on literature reviews.

Biometric Systems Challenges


Biometric authentication is a method that verifies users based on their physical char-
acteristics or behavioral habits. Although biometric authentication systems have been
utilized across various fields and devices for over 20 years, they still encounter challenges
that necessitate further development. There are different types of challenges for each au-
thentication system. I will mention below in the table, what are the challenges that each
authentication system faces separately.
The rise in attacks due to the widespread use of mobile phones and computers poses
a significant challenge in creating secure biometric authentication systems to safeguard
users. Overcoming these attacks and ensuring protection against potential threats remains
a top priority [18].
In contrast, behavioral authentication faces more challenges compared to physical au-
thentication. Behavioral traits can be altered or imitated more easily, and they may also
be affected by external factors such as illnesses or injuries. As a result, physical authenti-
cation is currently considered more secure and widely adopted in various applications.
Addressing these challenges presents exciting opportunities for future research and
development in biometric technologies, aiming to enhance their robustness and effec-
tiveness. By overcoming these obstacles, biometric authentication systems can further
strengthen security measures and provide reliable user verification. I have noted that
Physical authentication is more secure and more used nowadays.

23
Biometrics Systems Challenges

Biometric system Challenges


Fingerprint Performance is affected when the finger is wet, wrinkled, or
injured.

Face Performance can be affected by make-up users, hats, eye-


glasses, and poor lighting [13].de High accuracy.

Iris Can be impacted by wearing lenses and facial expressions [11].

Finger vein This technology lacks reliability as a biometric technology.


DNA This technology is not automatic and requires real-time access
for fast user authentication results.
Retina Needs development to be user-friendly on various devices like
mobile phones and computers, and to identify users when they
are wearing lenses or glasses.
Hand and Palm Performance is affected when the hand is wet, wrinkled, or
injured.
Voice User voice changes can affect recognition, such as misspoken
passwords or changes due to illness or emotions.
Signature Lack of accuracy and high cost.
Keystroke Still requires improvement to enhance the security level as it is
a relatively new authentication method.
Gait Technology needs improvement to increase accuracy as bio-
metric technology advances [11].

Table 2: Biometrics System Challenges based on literature reviews.

24
4 Results
The survey results showed the significance of user acceptance and satisfaction during
the development of biometric systems. A survey was conducted in both English and
Arabic languages, consisting of 18 questions (see Appendix A), which revealed that a
considerable percentage of users (up to 85 %) embraced biometric authentication systems.
The survey participants expressed contentment with biometric systems as authentication
methods, as illustrated in “Fig 19, 20”.
Furthermore, the survey results indicated that a majority of users perceive biometric
systems as more secure compared to traditional passwords. This perception likely con-
tributed to the high acceptance and adoption rates observed among the surveyed users.
Additionally, I observed that users with an educational degree and those between the
ages of 26–35 showed a greater interest in biometric systems compared to older users aged
55 years and above. This finding suggests that younger and more educated individuals
may be more receptive to adopting biometric authentication methods.
According to the survey, 47.9 % of participants strongly agreed with both English &
Arabic versions, while 37.7 % simply agreed. As a result, the total percentage of users
who agreed or strongly agreed was 85.6 % biometrics secure & convenient.

Figure 15: (Arabic) Figure 16: (English)

(Users’ perceptions that biometrics are more secure and convenient than traditional
passwords)

4.1 Research Question 1: Are biometric systems for authentica-


tion accepted differently based on demographic characteris-
tics?

4.1.1 Age

The first research question aimed to understand if there’s variation in the acceptance of
biometric systems based on age. The survey results revealed that age is indeed a factor
influencing the acceptance of biometric systems for user authentication. Participants were
divided into different age groups, and their preferences and usage patterns of biometric
systems were analyzed.

25
According to my survey result, it appears
that there is a variation in the acceptance of
biometric systems based on age.

Figure 17: Age of the participants in the


English survey

I conducted the survey in English with 67 participants out of 99 users and found that
age is a factor in the acceptance of biometric systems for user authentication.
The results revealed that the age group between 26-35 years had the highest percent-
age (32.8 %) of participants who prefer or use biometric systems. This age group demon-
strates a greater acceptance and reliance on biometric technologies.
The second highest percentage (26.9 %) was found in the age group between 36-45.
This suggests that individuals in their late 30s and early 40s also demonstrate significant
interest in and acceptance of biometric systems. The age group between 18-25 years
constitutes 22.4 % of participants who prefer or use biometric systems. This younger
age group demonstrates a considerable level of acceptance and adoption of biometric
technologies.
In contrast, participants above the age of 55 years comprised the smallest percentage
(7.5 %) in terms of preference or usage of biometric systems. This indicates a lower level
of acceptance among older individuals.
These findings align with previous literature reviews, which suggest that younger in-
dividuals tend to be more accepting and comfortable with new technologies, including
biometric systems. As individuals age, their level of familiarity and acceptance of new
technologies may decrease.
Based on the survey conducted in Arabic, 32 participants shared their perspectives and
experiences out of 99 users. Among the participants, the highest percentage (43.8 %) of
those who prefer or utilize biometric systems were in the age group of 26-35, as the same
result in the English survey. Then the 36-45 age group had the second-highest preference
for biometric systems, followed by the 18-25 age group.

The participants in the age range of 36-45


years demonstrated significant interest in and
usage of biometric systems, similar to the
findings in the English survey.
Figure 18: Age of the participants in the
Arabic survey

26
The survey had a total of 99 participants, with 36 taking part in both the English and
Arabic versions. These participants were between the ages of 26 and 35 and were the
most commonly used group for biometric systems. The overall number of participants
who are 55 years or above is relatively small in both surveys. Older users may be less
familiar with or accustomed to modern authentication systems, which is a common trend
observed in technology adoption.
The findings align with the general understanding that younger users tend to be more
inclined towards and comfortable with adopting new technologies compared to older in-
dividuals.

4.1.2 Education

The second aspect of Research Question 1 focused on the relationship between education
and acceptance of biometric systems. Educated users exhibited higher levels of interest
and reliance on biometric systems.
Based on the survey results, there is a positive correlation between higher levels of
education and the acceptance of biometric systems. Users with advanced education tend
to demonstrate a better understanding of biometric technology, including its advantages
and disadvantages. The survey results show that educated users are more likely to rely on
and adopt biometric systems for authentication, rather than traditional passwords.

• Approximately 60 % of participants with a bachelor’s degree exhibited a strong


interest in biometric systems, given their technical knowledge.

• The second majority of users (21 %) with a master’s degree or higher demonstrated
an understanding of biometric systems and the associated risks.

The findings indicate a positive correlation between higher levels of education and
acceptance of biometric systems.

4.2 Research Question 2: Do users consider/perceive biometric


systems as secure for authentication?
The second research question aimed to understand user perceptions of the security of bio-
metric systems and to determine whether users feel secure and satisfied using a biometric
system for authentication. Participants were asked to express their level of agreement or
disagreement regarding the security of biometric systems compared to traditional pass-
words.

27
• Approximately 84 % of users expressed satisfaction and considered biometric sys-
tems more secure than traditional passwords.

• Specifically, 47 % of respondents strongly agreed, and 37 % agreed that biometric


systems are secure for authentication.

The study finds that educated and young users, in particular, view biometric authen-
tication as the future. They believe that passwords will soon become obsolete, with bio-
metric systems replacing them in various applications such as hospitals, banks, airports,
companies, police departments, borders, websites, smartphones, and computers. Even
users who don’t have educational backgrounds consider biometric systems to be secure
and provide them with quick access to data and secure methods.

4.3 Research Question 3: Based on the survey, which type of au-


thentication provides the best user experience and perspec-
tive?
The third research question sought to identify the most used and preferred biometric
method for the majority of participants. After analyzing the survey responses, the au-
thentication method that received the highest preference and satisfaction ratings among
the participants is fingerprint-based, owing to its security and quick data access.

• Fingerprint authentication emerged as the most preferred method among partici-


pants, with high satisfaction and acceptance rates. The results from the Arabic lan-
guage survey that was conducted for 32 respondents, approximately respondents
56.3 % strongly agreed, and 40.6 % agreed that fingerprint authentication is the
most well-established and widely used method currently.

• The results from the English language survey of 67 respondents indicate that 32.8
% strongly agreed, 34.3 % agreed, and 23.9 % expressed a neutral stance toward
fingerprint authentication.

These findings confirm that fingerprint authentication is widely recognized as the most
preferred and accepted biometric method across different languages and cultural back-
grounds.

28
Survey questions and results in both version English and Arabic

Questions English Result Arabic Result


1- Biometric systems are • Strongly agree 37.3 % • Strongly agree 68.8 %
more secure and conve- • Agree 41.8 % • Agree 28.1 %
nient than traditional pass- • Neutral 11.9 % • Neutral 3.1 %
words. • Disagree 7.5 % • Disagree 0 %
• Strongly Disagree 1.5 % • Strongly Disagree 0 %

2- You use a biometric sys- • Strongly agree 35.8 % • Strongly agree 46.9 %
tem for authentication and • Agree 50.7 % • Agree 46.9 %
identification. • Neutral 9 % • Neutral 6.3 %
• Disagree 3 % • Disagree 0 %
• Strongly Disagree 1.5 % • Strongly Disagree 0 %

3- If your answer was • Fingerprint 54.5 % • Fingerprint 68.8 %


agree or strongly agree • Face recognition 33.3 % • Face recognition 12.5 %
with the second question • Iris recognition 1.5 % • Iris recognition 9.4 %
above, what biometric sys- • Password or Pin 10.6 % • Password or Pin 9.4 %
tem do you use? • Others 0 % • Others 0 %

4- Do you prefer to use • Strongly agree 34.3 % • Strongly agree 50 %


biometric systems over • Agree 31.3 % • Agree 25 %
traditional methods of • Neutral 26.9 % • Neutral 12.5 %
authentication? • Disagree 6 % • Disagree 9.4 %
• Strongly Disagree 1.5 % • Strongly Disagree 3.1 %

5- What kind of device do • Samsung /Android 50.8 • Samsung /Android 65.6


you use for a biometric % %
system? • iPhone (IOS) 43.1 % • iPhone (IOS) 25 %
• Windows 0 % • Windows 6.3 %
• MacBook 1.5 % • MacBook 0 %
• Others 4.6 % • Others 3.1 %

6- The process of setting • Strongly agree 46.2 % • Strongly agree 50 %


up the biometric system is • Agree 40 % • Agree 43.8 %
easy. • Neutral 13.8 % • Neutral 6.3 %
• Disagree 0 % • Disagree 0 %
• Strongly Disagree 0 % • Strongly Disagree 0 %

29
7- Biometrics systems are • Strongly agree 21.2 % • Strongly agree 28.1 %
100 % accurate. • Agree 42.4 % • Agree 59.4 %
• Neutral 21.2 % • Neutral 6.3 %
• Disagree 12.1 % • Disagree 3.1 %
• Strongly Disagree 3 % • Strongly Disagree 3.1 %

8- Fingerprint recognition • Strongly agree 38.8 % • Strongly agree 56.3 %


is a well-established bio- • Agree 34.3 % • Agree 40.6 %
metric technology and the • Neutral 23.9 % • Neutral 3.1 %
best biometric technology • Disagree 6 % • Disagree 0 %
nowadays. • Strongly Disagree 3 % • Strongly Disagree 0 %

9- Face recognition is a • Fingerprint 13.4 % • Fingerprint 19.4 %


well-established biometric • Face recognition 46.3 % • Face recognition 45.2 %
technology, and the best • Iris recognition 28.4 % • Iris recognition 29 %
biometric technology • Password or Pin 10.4 % • Password or Pin 6.5 %
nowadays. • Others 1.5 % • Others 0 %

10- My current education • High school 11.9 % • High school 21.9 %


degree is: • Bachelor’s degree 61.2 % • Bachelor’s degree 56.3 %
• Master’s degree 23.9 % • Master’s degree 15.6 %
• Doctoral degree 1.5 % • Doctoral degree 6.3 %
• Others 1.5 % • Others 0 %

11- I am: • 18-25 years old 22.4 % • 18-25 years old 12.5 %
• 26-35 years old 32.8 % • 26-35 years old 43.8 %
• 36-45 years old 26.9 % • 36-45 years old 28.1 %
• 46–55 years old 10.4 % • 46–55 years old 12.5 %
• 55+ years old 7.5 % • 55+ years old 3.1 %

12- You always rely on a • Strongly agree 32.3 % • Strongly agree 56.3 %
biometric system for au- • Agree 27.7 % • Agree 31.3 %
thentication and identifica- •Neutral 27.7 % • Neutral 9.4 %
tion. • Disagree 12.3 % • Disagree 3.1 %
• Strongly Disagree 0 % • Strongly Disagree 0 %

30
13- You always rely on • Strongly agree 14.9 % • Strongly agree 18.8 %
passwords or pin codes for • Agree 32.8 % • Agree 34.3 %
authentication and identifi- • Neutral 40.3 % • Neutral 28.1 %
cation. • Disagree 10.4 % • Disagree 18.8 %
• Strongly Disagree 1.5 % • Strongly Disagree 0 %

14- You always rely on • Strongly agree 17.9 % • Strongly agree 46.9 %
passwords or pin codes for • Agree 25.4 % • Agree 37.5 %
authentication and identifi- • Neutral 25.4 % • Neutral 9.4 %
cation. • Disagree 25.4 % • Disagree 6.3 %
• Strongly Disagree 6 % • Strongly Disagree 0 %

15- Passwords and PINs • Strongly agree 6 % • Strongly agree 18.8 %


are secure. • Agree 29.9 % • Agree 40.6 %
• Neutral 32.8 % • Neutral 25 %
• Disagree 25.4 % • Disagree 15.6 %
• Strongly Disagree 6 % • Strongly Disagree 0 %

16- Reusing the same • Strongly agree 43.3 % • Strongly agree 48.4 %
password or PIN for mul- • Agree 41.8 % • Agree 41.9 %
tiple accounts makes the • Neutral 6 % • Neutral 6.5 %
data easy to get hacked. • Disagree 6 % • Disagree 3.2 %
• Strongly Disagree 3 % • Strongly Disagree 0 %

17- It is easy to remember • Strongly agree 4.5 % • Strongly agree 18.8 %


complex passwords. • Agree 16.7 % • Agree 15.6 %
• Neutral 18.2 % • Neutral 12.5 %
• Disagree 37.9 % • Disagree 28.1 %
• Strongly Disagree 22.7 • Strongly Disagree 25 %
%

18- I feel comfortable and • Strongly agree 41.8 % • Strongly agree 65.6 %
secure when using biomet- • Agree 28.4 % • Agree 31.3 %
ric system methods such as •Neutral 20.9 % • Neutral 3.1 %
(Fingerprint, Face recog- • Disagree 7.5 % • Disagree 0 %
nition, etc.) in public com- • Strongly Disagree 1.5 % • Strongly Disagree 0 %
pared to traditional pass-
words.

Table 3: Survey questions and answers in both English and Arabic languages.

31
4.4 Evaluation of Common Biometrics Based on Users’ Experi-
ments
To further substantiate the findings, a comparative evaluation of common biometric meth-
ods was conducted based on users’ beliefs and experiences. This evaluation considered
factors such as uniqueness, satisfaction, acceptability, performance, and universality.

Biometrics Uniqueness Satisfaction Acceptability Performance Universality


Fingerprint High High High High High
Face High Medium/High High Medium/High High

Table 4: Evaluation of Common Biometrics Based on Users’ Belief/Experiments.

According to Table 4, fingerprint and face recognition were evaluated as the most
common and accepted biometric authentication methods based on users’ beliefs and ex-
periences.

4.5 Acceptance and Most Used Biometric Systems Based on Users’


Perceptions
Biometrics Strongly agree Agree Neutral Disagree Strongly disagree
Fingerprint 40.1 % 36.1% 17.1 % 4% none
Face 15.1 % 45.6 % 28.1 % 9% 1%

Table 5: Acceptance & most used Biometric Systems based on users’ perceptions.

Based on the data in Table 5, it appears that only two biometric systems were cited:
fingerprints and face recognition. These are the most commonly used methods. The find-
ings show that the highest percentage of participants (40.1 %) strongly agreed, and 36.1
% agreed that fingerprints are the most secure and widely used technique for biometric
authentication. Face recognition came in second place.

32
“Fig 19, 20” shows the percentage of people who feel comfortable and secure when
they use biometric systems such as fingerprint and face recognition.

Figure 19: (Arabic) users comfortable


Figure 20: (English)

Overall, the results of my survey make it clear that demographic factors, such as
age and education, play a significant role in determining the level of acceptance towards
biometric systems for user authentication. Educated and younger individuals show greater
interest and reliance on biometric systems compared to traditional passwords, while older
and less educated users exhibit less interest.
Furthermore, my findings indicate that participants consider fingerprint technology as
the best and preferred method for user authentication, aligning with previous studies. Fa-
cial recognition is the second most accurate and high-performing method after fingerprint
technology. These findings suggest a high level of acceptance and satisfaction among
users regarding biometric authentication systems, indicating their trust and preference for
such methods over traditional passwords.
This section provides a comprehensive overview of the survey results, including an-
swers to the research questions, the evaluation of common biometrics, and the acceptance
of various biometric systems.

33
5 Analysis
The study provides a comparative analysis of the survey data with a previously conducted
literature review on biometric systems’ user acceptance. The analysis of the survey data
reveals several notable findings that align with the literature reviews:

1. User Acceptance: The survey findings indicate a high level of user acceptance for
biometric systems, which is consistent with previous studies in the literature [7] [9].
Users perceive biometric authentication as a reliable and secure method compared
to traditional passwords.

2. Demographic Factors: Both the survey data and literature reviews emphasize the
influence of demographic factors, such as age and education, on user acceptance of
biometric systems [8] [9] [6]. Educated and younger individuals show a higher in-
terest and reliance on biometric systems, while older and less educated users exhibit
lower interest. The analysis also revealed that many users, especially those between
26-35 years, tend to use biometric authentication systems more frequently, followed
by 36-45 years and years. This finding aligns with existing literature reviews that
propose demographic factors may influence the level of acceptance towards bio-
metric authentication.

3. Preferred Biometric Systems: The survey data aligns with previous studies in iden-
tifying fingerprint technology as the preferred method for user authentication. Many
people prefer fingerprint recognition due to its high accuracy and performance
[5] [8] [9] [10].

Based on the data in Table 4 shows that fingerprint recognition outperforms other biomet-
ric systems in terms of its performance, acceptability, uniqueness, and user satisfaction.
Facial recognition features displayed high accuracy and performance. This aligns with
the findings of the literature review.
By comparing the survey data results and existing literature reviews, it becomes evi-
dent that the findings from the survey support and align with the existing body of knowl-
edge. This strengthens the overall validity and reliability of the research findings and
provides a comprehensive understanding of user acceptance and preferences in the con-
text of biometric authentication.
The analysis reveals a strong convergence between the survey data and the literature
review findings. The survey results validate and reinforce the existing knowledge regard-
ing user acceptance of biometric systems for authentication, demographic influences, and
preferred biometric systems.
Additionally, based on my analysis of the participants’ perceptions, there appears to be
a notable difference between the Arabic and English language surveys in terms of the per-
centage of respondents who believe and perceive biometric systems (such as fingerprint

34
and face recognition) as more secure and more convenient than traditional passwords. In
the Arabic language survey, a higher percentage of respondents (approximately 68.8 %)
strongly agree that biometric systems are more secure than traditional passwords, while
28.1 % agree. On the other hand, in the English-language survey, 37.3 % strongly agreed,
and 41.8 % agreed that biometric systems are more secure than traditional passwords.
The notable difference in responses between the Arabic and English versions of the
survey may be due to cultural factors. Here’s an analysis of some cultural differences that
could contribute to the more positive responses in the Arabic version:

• Trust in Technology: People’s level of trust and confidence in technology and its
security can vary based on cultural attitudes. Some cultures may have more trust in
technological advancements like biometric systems, leading to a stronger belief in
their security benefits.

• Familiarity with Biometrics: Cultures may differ in their familiarity with biometric
technologies. Those who frequently use biometric systems for identification or
security purposes may perceive them as more secure due to their extensive exposure
and familiarity.

• Privacy Concerns: Some cultures place a greater emphasis on data security, leading
to varying levels of privacy concerns. Individuals in these cultures may be more
skeptical about the safety of their biometric data, resulting in lower agreement with
certain statements.

• Perception of Vulnerabilities: Certain cultures view traditional password-based meth-


ods as more susceptible to hacking or theft, leading respondents to express higher
agreement with the security of biometric systems. It’s important to conduct in-depth
qualitative research or interviews to further understand the specific cultural factors
contributing to these differences.

35
6 Discussion
The authentication system may affect users either in terms of emotion or aesthetics (in
terms of the beauty of the design and shape of the system) or speed and performance
(efficiency, speed in accessing data, effectiveness, and protection). The user experience
or perceptions may also change over time and are not constant, depending on what the
authentication system offers regarding speed, protection, etc. Each person according to
his preference or choice.
A goal of my survey about the Acceptance of Biometric Systems for User Authenti-
cation and Identification is to find out and understand users’ experiences, and perceptions
and which Biometric System they prefer to use and consider secure and to understand this
by using open-ended study methods (such as surveys).
The data that I gathered from previous studies and users’ experiments are used to
understand the different users’ perceptions/experiments based on different users’ back-
grounds such as education, age, etc. There could be a problem with some lack of knowl-
edge for some non-education users and non-technical or older users to identify the ad-
vantages and disadvantages of the biometric system they use or lack of how they could
protect their data.
In the end, and after obtaining the results of the survey about the perceptions and
experiences of the participants, we see that most of the participants prefer to use the
fingerprint for authentication followed by the facial recognition feature, also previous
studies have shown that fingerprint has the highest accuracy percentage 99.9 % [4] [6] [8].
We also see that a large percentage of educated and young people prefer to use biometric
authentication systems more than the elderly or the uneducated. To solve problems for
those who still use traditional passwords to access data, they should use complex and
hard-to-guess passwords.
It is also preferable to use an appropriate and safe method to access data safely such as
fingerprints or facial recognition rather than voice recognition, gait recognition, traditional
passwords, or some less reliable and secure security systems. It is recommended to use
biometric systems methods because they provide us with faster access to data and more
security. The user will not have to repeat or write similar passwords for more than one
account if he/she is using a fingerprint or face recognition feature. The user will not be
afraid when he/she accesses his/her phone or laptop in public places or in front of other
people because biometric systems are more secure and most used these days.
Also, the use of devices that are compatible or supportive of biometric systems, such
as new smartphones, and laptops equipped with cameras, or a fingerprint feature, can
bring more security. One of the best methods of authentication is the use of two-factor
authentication, for example, the fingerprint and the password. In this case, we resort to
using the password when the fingerprint encounters a problem or fails to recognize it for
any reason, such as a wound on the finger or the finger is wet. Almost all smartphones

36
have a security feature that requires a password when restarting the phone.

7 Conclusions and Future Work


This paper aimed to achieve two main objectives: First, to understand the perceptions and
preferences of users regarding the acceptance of biometric systems for authentication and
identification. Second, to identify the most used and preferred authentication methods
among these users.
The survey was conducted to collect data directly from users. It focused on capturing
users’ perceptions, experiences, and preferences related to biometric systems for authen-
tication and identification. The survey participants were free to express their experiences
and participate in the survey. The survey was distributed through social media platforms,
such as LinkedIn, WhatsApp, and Facebook.
In addition to the survey, the study conducted a comprehensive literature review of
previous studies in the field. This review examined existing research on user acceptance
of biometric systems, authentication methods, and user preferences.
I realized that most users gave their perceptions experiences based on their age, edu-
cation, background, etc. To find out more details, let’s start with the first research question
about the users’ experiment beliefs based on age.

1. Are biometric systems for authentication accepted differently based on demographic


characteristics?
According to my survey result, yes there is different acceptance of biometric sys-
tems based on age. Based on the results of my survey conducted in English, I
noticed that age plays a role in accepting biometric systems for user authentication.
The distribution of participants across different age groups, as shown in “Fig. 15”,
highlights the preferences and usage patterns of biometric systems among different
age demographics.
The data indicates that the age group between 26-35 years comprises the highest
percentage (32.8 %) of participants who prefer or use biometric systems for authen-
tication. Following that, the age group between 36-45 years represents the second
highest percentage (26.9 %) of participants who prefer or use biometric systems.
This suggests that individuals in their late 30s and early 40s also show significant
interest in and acceptance of biometric authentication methods.
For participants who prefer or use biometric systems, 22.4 % fall in the age group
of 18-25 years. This age group shows a high level of acceptance and adoption
of biometric technologies. However, participants above the age of 55 account for
the smallest percentage (7.5 %) in preference or usage of biometric systems. This
suggests that older participants tend to have a lower level of acceptance toward
biometric systems.

37
The data from the Arabic version of the survey, shown in “Fig 16”, aligns with the
results of the English version. It reveals that the age group between 26-35 years
has the highest percentage (43.8 %) of participants who prefer or use biometric
systems for authentication. However, this percentage is higher than that of the
English version. The second most likely age groups to use biometric systems were
those between 36-45 and 18-25.
Therefore, the total number of participants in the survey, both in the English and
Arabic versions, is 36 participants of the total 99 participants, whose ages range
between 25-35 years, and it is the most participated group and the most used for
biometric systems.
Overall, it was observed that the number of participants aged 55 years or above was
comparatively less. The reason for this could be that older users may not be as fa-
miliar with modern authentication systems, which is a common trend in technology
adoption.
The findings show that many previous literature reviews have found that younger
people tend to be more comfortable and accepting of new technologies, including
biometric systems. As people get older, they may become less familiar with new
technologies [5] [6] [8] [9] [10] etc. A survey conducted revealed that most people
who accepted biometric systems were between the ages of 18-40 [8]. Additionally,
83 % of the participants were under the age of 45. This age group is typically
more familiar with emerging technologies, which may explain their higher level of
acceptance and awareness of biometric methods [9].
A study revealed that participants in the 18–22 age group had a higher level of famil-
iarity and adoption with biometric techniques compared to other age groups [10].
Many of the participants expressed their willingness to use fingerprints as a replace-
ment for passwords.
Next, we will discuss the acceptance of biometric systems for user authentication,
based on educated users’ experiments. Education undoubtedly plays a significant
role in the acceptance of these systems.
Through my research, I have discovered that education is strongly correlated with
the acceptance of biometric systems. The survey results indicate that individuals
with higher levels of education tend to possess a greater comprehension of biomet-
ric technology, including its benefits and drawbacks.
According to the survey, participants with higher levels of education tend to use bio-
metric systems more than traditional passwords and know the technology. Specifi-
cally, around 60 % of participants held a bachelor’s degree. Out of the participants,
the second largest group, comprising 21 %, possess a master’s degree or knowledge

38
about biometric systems and the potential risks they may encounter. This sets them
apart from untrained users.
Furthermore, in the literature review, it was found that 67 % of the participants
held a bachelor’s degree [9]. This suggests that there may be a connection be-
tween the level of education and willingness to accept biometric systems. Those
with higher education may have a greater understanding of the technology and its
advantages, which could lead to increased acceptance. In the study, there were 414
participants, with 86 % of them having completed 2-4 years of university education.
Additionally, 74 % of participants had accepted or adopted biometric systems for
identification and authentication [8].
The second research question just comes to determine if users feel secure and sat-
isfied by using a biometric system for authentication, the question is as follows:

2. Do users consider/perceive biometric systems as secure for authentication?


According to the survey results, a significant majority of participants (up to 84 %)
have accepted and expressed satisfaction with biometric systems as a more secure
method of authentication compared to passwords. Specifically, 47 % of participants
strongly agreed, and 37 % agreed that biometric systems are secure authentication
methods.
According to several literature reviews, including, most users consider biometric
systems to be a reliable means of authentication. In particular, educated, and young
users believe that biometric authentication will soon replace passwords and become
a common feature in many fields, such as hospitals, banks, airports, companies,
police departments, borders, websites, smartphones, computers, etc [7] [8] [9]
[10].
The third research question aims to determine the most commonly used and pre-
ferred biometric method by the majority of participants. The question is as follows:

3. Based on the survey, which type of authentication provides the best user experience
and perspective?
According to the survey, the majority of participants, regardless of language (Ara-
bic or English), believe that fingerprint authentication is the most effective authen-
tication method. In the Arabic language survey, about 56.3 % of the respondents
strongly agreed, while 40.6 % agreed that fingerprint authentication is currently the
most established and widely used method.
In the survey conducted in English, 32.8 % of the participants strongly agreed with
fingerprint authentication, while 34.3 % agreed with it. On the other hand, 23.9
% of the respondents remained neutral about this method. Although the level of

39
agreement is slightly lower than the Arabic survey, it still shows a considerable per-
centage of people who prefer fingerprint authentication. The research has revealed
that the participants favored and were most satisfied with the authentication method
based on fingerprints. This technology was also found to be widely used due to its
security and quick data access.
Furthermore, several literature reviews have shown that the most popular and fa-
vored biometric technique is fingerprint recognition. This preference can be at-
tributed to the widespread availability and familiarity of fingerprint technology on
smartphones and computers [4] [5] [6] [7] [8] [9] [10].
According to a study [10], participants in the 18-22 age group were found to be
more familiar with and accepting of fingerprint technology, with 52 % of partic-
ipants adopting it. Additionally, many participants expressed a willingness to re-
place passwords with fingerprint authentication. The second widely recommended
and used technique was face recognition which provided accuracy, efficiency, and
performance across a wide range of applications, including mobile phones and com-
puters.
I believe that future research should prioritize enhancing the security and privacy
of biometric authentication. It is highly recommended to implement two-factor au-
thentication and three-factor authentication in the future, as they provide a higher
level of security and accuracy in terms of information security in many different
devices. By incorporating multiple authentication factors, we can increase the level
of protection and reduce the risk of unauthorized access to devices and systems.
Additionally, future research should continue to explore user acceptance and prefer-
ences of biometric authentication systems for a large group of people from different
backgrounds to ensure obtaining more accurate results. For more information, the
survey questions and the results for each question will be provided in the Appendix
A chapter below (page 44).
Lastly, to gain a deeper understanding of the cultural factors that influence the adop-
tion of biometric systems over traditional passwords, it is crucial to conduct thor-
ough qualitative research or interviews. Considering these cultural nuances can also
enhance the survey design and data analysis, leading to more precise and relevant
insights.

40
References
[1] S. Shanmugapriya and B. S. Sathishkumar, “Review of biometric recognition meth-
ods,” International Journal of Advanced Research in Technology Engineering &
Science (IJARTET), vol. 2, no. 4, April 2015.

[2] F. Belhadj, “Biometric system for identification and authentication,” Ph.D. disserta-
tion, Ecole nationale Supérieure en Informatique Alger, 2017.

[3] B. Dike-Anyiam and Q. Rehmani, “Biometric vs. password authentication: A user’s


perspective,” Journal of Information Warfare, vol. 5, no. 1, pp. 33–45, 2006.

[4] Q. Xiao, “Technology review-biometrics-technology, application, challenge, and


computational intelligence solutions,” IEEE Computational Intelligence Magazine,
vol. 2, no. 2, pp. 5–25, 2007.

[5] A. K. Jain, D. Deb, and J. J. Engelsma, “Biometrics: Trust, but verify,” IEEE
Transactions on Biometrics, Behavior, and Identity Science, vol. 4, pp. 303–323,
2021. [Online]. Available: https://api.semanticscholar.org/CorpusID:234680292

[6] S. Li, X. Han, M. Zubair, and S. Ma, “Stereo image quality assessment based on
sparse binocular fusion convolution neural network,” in 2019 IEEE Visual Commu-
nications and Image Processing (VCIP). IEEE, 2019, pp. 1–4.

[7] W. Almayyan, “Social acceptance of biometrics technologies in kuwait: A sur-


vey,” International Journal of Computer Science and Information Security (IJCSIS),
vol. 17, no. 12, 2019.

[8] J. Fletcher, P. Howard, D. Mody, A. Vyas, and H. Eng, “A study of biometric security
technology acceptance and primary authentication,” Proceedings of student-faculty
research day, 2017.

[9] O. Buckley and J. R. Nurse, “The language of biometrics: Analysing public per-
ceptions,” Journal of Information Security and Applications, vol. 47, pp. 112–119,
2019.

[10] A. Kitsiou, C. Despotidi, C. Kalloniatis, and S. Gritzalis, “The role of users’ demo-
graphic and social attributes for accepting biometric systems: A greek case study,”
Future Internet, vol. 14, no. 11, p. 328, 2022.

[11] A. S. Tolba, A. El-Baz, and A. El-Harby, “Technology face recognition: A literature


review,” International Journal of Signal Processing, vol. 2, no. 2, January 2005.

[12] B. Abazi, B. Qehaja, and E. Hajrizi, “Application of biometric models of authen-


tication in mobile equipment,” IFAC-PapersOnLine, vol. 52, no. 25, pp. 543–546,
2019.

41
[13] M. El-Abed, R. Giot, B. Hemery, and C. Rosenberger, “Evaluation of biometric
systems: A study of users’ acceptance and satisfaction,” International Journal of
Biometrics, vol. 4, no. 3, pp. 265–290, 2012.

[14] A. Mahfouz, T. M. Mahmoud, and A. S. Eldin, “A survey on behavioral biometric


authentication on smartphones,” Journal of information security and applications,
vol. 37, pp. 28–37, 2017.

[15] C. G. Allen and S. Komandur, “The relationship between usability and biometric
authentication in mobile phones,” in HCI International 2019-Posters: 21st Interna-
tional Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings,
Part I 21. Springer, 2019, pp. 183–189.

[16] R. Saini and N. Rana, “Comparison of various biometric methods,” International


Journal of Advances in Science and Technology, vol. 2, no. 1, pp. 24–30, 2014.

[17] I. Bohm and F. Testor, “Biometric systems,” Department of Telecooperation Univer-


sity of Linz, vol. 4040, 2004.

[18] W. Meng, D. S. Wong, S. Furnell, and J. Zhou, “Surveying the development of


biometric user authentication on mobile phones,” IEEE Communications Surveys
Tutorials, vol. 17, no. 3, pp. 1268–1293, 2015.

[19] T. S. Enamamu, “Bioelectrical user authentication,” Ph.D. dissertation, University


of Plymouth, 2019.

[20] K. Delac and M. Grgic, “A survey of biometric recognition methods,” in Proceed-


ings. Elmar-2004. 46th International Symposium on Electronics in Marine. IEEE,
2004, pp. 184–193.

[21] J. Unar, W. C. Seng, and A. Abbasi, “A review of biometric technology along with
trends and prospects,” Pattern recognition, vol. 47, no. 8, pp. 2673–2688, 2014.

[22] A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,”


IEEE Transactions on circuits and systems for video technology, vol. 14, no. 1, pp.
4–20, 2004.

[23] A. H. K. MK and P. Aithal, “Voice biometric systems for user identification and
authentication–a literature review,” International Journal of Applied Engineering
and Management Letters (IJAEML), vol. 6, no. 1, pp. 198–209, 2022.

[24] K. Dharavath, F. A. Talukdar, and R. H. Laskar, “Study on biometric authentication


systems, challenges and future trends: A review,” in 2013 IEEE international con-
ference on computational intelligence and computing research. IEEE, 2013, pp.
1–7.

42
[25] M. Rogowski, K. Saeed, M. Rybnik, M. Tabedzki, and M. Adamski, “User authen-
tication for mobile devices,” in Computer Information Systems and Industrial Man-
agement: 12th IFIP TC8 International Conference, CISIM 2013, Krakow, Poland,
September 25-27, 2013. Proceedings. Springer, 2013, pp. 47–58.

[26] V. Matyáš and Z. Říha, “Security of biometric authentication systems,” in 2010 In-
ternational Conference on Computer Information Systems and Industrial Manage-
ment Applications (CISIM). IEEE, 2010, pp. 19–28.

[27] N. R. Darve and D. P. Theng, “Comparison of biometric and non-biometric security


techniques in mobile cloud computing,” in 2015 2nd International Conference on
Electronics and Communication Systems (ICECS). IEEE, 2015, pp. 213–216.

[28] W. Meng, D. S. Wong, S. Furnell, and J. Zhou, “Surveying the development of


biometric user authentication on mobile phones,” IEEE Communications Surveys &
Tutorials, vol. 17, no. 3, pp. 1268–1293, 2014.

[29] M. El-Abed, R. Giot, B. Hemery, and C. Rosenberger, “A study of users’ acceptance


and satisfaction of biometric systems,” in 44th Annual 2010 IEEE International Car-
nahan Conference on Security Technology. IEEE, 2010, pp. 170–178.

[30] K. M. Fouad, B. M. Hassan, and M. F. Hassan, “User authentication based on dy-


namic keystroke recognition,” International Journal of Ambient Computing and In-
telligence (IJACI), vol. 7, no. 2, pp. 1–32, 2016.

43
A Appendix: Survey Questions and Results

1. Biometric systems are more secure and convenient than traditional passwords.
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

2. You use a biometric system for authentication and identification.


Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

44
3. If your answer was agree or strongly agree with the second question above, what
biometric system do you use?
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

4. You prefer to use biometric systems over traditional methods of authentication?


Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

5. What kind of device do you use for a biometric system?


Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

45
6. The process of setting up the biometric system is easy.
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

7. Biometric systems are 100 % accurate.


Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

8. Fingerprint recognition is a well-established biometric technology, and the best bio-


metric technology nowadays.
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

46
9. Face recognition is a well-established biometric technology, and the best biometric
technology nowadays.
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

10. My current education degree is:


Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

11. I am:
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

47
12. You always rely on a biometric system for authentication and identification.
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

13. You always rely on passwords or pin codes for authentication and identification.
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

14. Biometric data can never be lost or stolen.


Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

48
15. Passwords and PINs are secure.
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

16. Reusing the same password or PIN for multiple accounts makes the data easy to get
hacked.
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

17. It is easy to remember complex passwords.


Strongly agree Agree Neutral Disagree Strongly disagree

(English version)
(Arabic version)

49
18. I feel comfortable and secure when using biometric system methods such as (Fin-
gerprint, Face recognition, etc.) in public compared to traditional passwords.
Strongly agree Agree Neutral Disagree Strongly disagree

(English version) (Arabic version)

article hyperref
Here is the link to the survey questions in the English version: English Survey Link
Here is the link to the survey questions in the Arabic version: Arabic Survey Link

B Appendix: Informed Consent Form


Procedure:
The survey consists of [18 Questions], and it should take about [2-4] minutes to com-
plete. Your responses will be kept confidential and anonymous, and the data will only
be used for academic purposes. I will not collect any personally identifiable information
such as your name, email address, or IP address.

50

You might also like