Analyzing key attributes of AI and technologies for biometric authentication in smart hospitals
Abstract
This systematic review examines the use of artificial intelligence (AI) in biometric authentication for smart hospitals, with a particular focus on identifying the most efficient and widely used technological approaches in the world to improve the security and protection of medical data from unauthorized access. The integration of artificial intelligence (AI) through neural networks and machine learning algorithms with biometric security has been demonstrated to enhance the precision of individual identification and the detection of irregular behavior that may indicate unauthorized access. The PRISMA methodology entailed a comprehensive search of scientific studies employing key terms in conjunction with Boolean operators, followed by the selection of pertinent articles in accordance with pre-established inclusion and exclusion criteria. The results demonstrate that the incorporation of AI into biometric authentication systems enhances security in terms of controlled access, protection, and data security. The analyzed studies indicate that the deployment of multimodal biometrics and advanced algorithms not only improves the reliability of the process, but also reduces false positives, which is crucial in the management of sensitive data. The combination of various biometric features, such as facial recognition and physiological signal analysis, has proven to be effective even in medical settings
Downloads
References
A. Budžys, O. Kurasova y V. Medvedev, “Deep learning-based authentication for insider threat detection in critical infrastructure”, Artif. Intell. Rev., vol. 57, n.º 10, agosto de 2024, doi: https://doi.org/10.1007/s10462-024-10893-1
C. Annadurai et al., “Biometric Authentication-Based Intrusion Detection Using Artificial Intelligence Internet of Things in Smart City”, Energies, vol. 15, n.º 19, p. 7430, octubre de 2022, doi: https://doi.org/10.3390/en15197430
W. Kim, J. M. Song y K. R. Park, “Multimodal Biometric Recognition Based on Convolutional Neural Network by the Fusion of Finger-Vein and Finger Shape Using Near-Infrared (NIR) Camera Sensor”, Sensors, vol. 18, n.º 7, p. 2296, julio de 2018, doi: https://doi.org/10.3390/s18072296
S. Aanjanadevi, S. Aanjankumar, K. R. Ramela y V. Palanisamy, “Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics”, Comput. Syst. Sci. Eng., pp. 1–12, 2023, doi: https://doi.org/10.32604/csse.2023.031893
M. J. Page et al., “Declaración PRISMA 2020: una guía actualizada para la publicación de revisiones sistemáticas,” Rev. Esp. Cardiol., vol. 74, no. 9, pp. 790–799, 2021, doi: https://doi.org/10.1016/j.recesp.2021.06.016
W. G. Barquero Morales, “ANALISIS DE PRISMA COMO METODOLOGÍA PARA REVISIÓN SISTEMÁTICA: UNA APROXIMACIÓN GENERAL,” Saúde em Redes, vol. 8, no. sup1, pp. 339–360, 2022, doi: https://doi.org/10.18310/2446-4813.2022v8nsup1p339-360
S. Sánchez-Serrano, I. Pedraza-Navarro, and M. Donoso-González, “¿Cómo hacer una revisión sistemática siguiendo el protocolo PRISMA?: Usos y estrategias fundamentales para su aplicación en el ámbito educativo a través de un caso práctico,” Bordón Rev. Pedagog., vol. 74, no. 3, pp. 51–66, 2022, doi: https://10.13042/Bordon.2022.95090
M. J. Page et al., “PRISMA 2020 explanation and elaboration: updated guidance and exemplars for reporting systematic reviews,” BMJ, vol. 372, p. n160, 2021, doi: http://dx.doi.org/10.1136/bmj.n160
C. Yáñez-Baeza, R. A. Aguilera-Eguía, H. Fuentes-Barría, and Á. Roco-Videla, “Importance of the PRISMA guideline,” Nutr. Hosp., vol. 40, no. 3, pp. 670–675, 2023, doi: http://dx.doi.org/10.20960/nh.04616
M. L. Rethlefsen et al., “PRISMA-S: An extension to the PRISMA Statement for reporting literature searches in systematic reviews,” Syst. Rev., vol. 10, no. 1, p. 39, 2021, doi: https://doi.org/10.1186/s13643-020-01542-z
H. U. Khan, M. Z. Malik, S. Nazir y F. Khan, “Utilizing Bio Metric system for enhancing Cyber security in banking sector: A Systematic Analysis”, IEEE Access, p. 1, 2023, doi: https://doi.org/10.1109/access.2023.3298824
L. Mainetti, P. Panarese y R. Vergallo, “WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City”, Sensors, vol. 22, n.º 18, p. 6980, septiembre de 2022, doi: https://doi.org/10.3390/s22186980
B. Bordel, R. Alcarria y T. Robles, “Lightweight encryption for short-range wireless biometric authentication systems in Industry 4.0”, Integr. Computer-Aided Eng., vol. 29, n.º 2, pp. 153–173, marzo de 2022, doi: https://doi.org/10.3233/ica-210673
A. Saad AL-Malaise AL-Ghamdi y M. Ragab, “Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions”, Comput., Mater. & Continua, vol. 72, n.º 2, pp. 3131–3144, 2022. doi: https://doi.org/10.32604/cmc.2022.026457
P. Maharjan et al., “Keystroke Dynamics based Hybrid Nanogenerators for Biometric Authentication and Identification using Artificial Intelligence”, Adv. Sci., vol. 8, n.º 15, p. 2100711, junio de 2021, doi: https://doi.org/10.1002/advs.202100711
P. Shivanna y S. S. Venkatesiah, “Biometric Identification for a Secured Environment Using AI-Based Facial Recognition”, Int. J. Saf. Secur. Eng., vol. 14, n.º 1, pp. 185–190, febrero de 2024. doi: https://doi.org/10.18280/ijsse.140118
G. Quintanilla Mendoza, “Legislación, riesgos y retos de los sistemas biométricos”, Rev. Chil. Derecho Tecnol., vol. 9, n.º 1, p. 63, junio de 2020, doi: https://doi.org/10.5354/0719-2584.2020.53965
M. Elkhodr, S. Khan y E. Gide, “A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness”, Future Internet, vol. 16, n.º 1, p. 22, enero de 2024, doi: https://doi.org/10.3390/fi16010022
R. O. Andrade, W. Fuertes, M. Cazares, I. Ortiz-Garcés y G. Navas, “An Exploratory Study of Cognitive Sciences Applied to Cybersecurity”, Electronics, vol. 11, n.º 11, p. 1692, mayo de 2022
S. Kumar et al., “Face Spoofing, Age, Gender and Facial Expression Recognition Using Advance Neural Network Architecture-Based Biometric System”, Sensors, vol. 22, n.º 14, p. 5160, julio de 2022, doi: https://doi.org/10.3390/s22145160
J. Herbst, M. Rüb, S. P. Sanon, C. Lipps y H. D. Schotten, “Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach”, Network, vol. 4, n.º 2, pp. 133–149, abril de 2024, doi: https://doi.org/10.3390/network4020007
V.-D. Păvăloaia y G. Husac, “Tracking Unauthorized Access Using Machine Learning and PCA for Face Recognition Developments”, Information, vol. 14, n.º 1, p. 25, diciembre de 2022, doi: https://doi.org/10.3390/info14010025
F. Ahamed, F. Farid, B. Suleiman, Z. Jan, L. A. Wahsheh y S. Shahrestani, “An Intelligent Multimodal Biometric Authentication Model for Personalised Healthcare Services”, Future Internet, vol. 14, n.º 8, p. 222, julio de 2022, doi: https://doi.org/10.3390/fi14080222
K. Y. Najmi, M. A. AlZain, M. Masud, N. Z. Jhanjhi, J. Al-Amri, and M. Baz, “A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability,” Mater. Today, vol. 81, pp. 377–382, 2023, doi: https://doi.org/10.1016/j.matpr.2021.03.417
A. Seyfizadeh, R. L. Peach, P. Tovote, I. U. Isaias, J. Volkmann, and M. Muthuraman, “Enhancing security in brain–computer interface applications with deep learning: Electroencephalogram-based user identification,” Expert Syst. Appl., vol. 253, no. 124218, p. 124218, 2024, doi: https://doi.org/10.1016/j.eswa.2024.124218
F. Wang, Y. Gai, and H. Zhang, “Blockchain user digital identity big data and information security process protection based on network trust,” J. King Saud Univ. - Comput. Inf. Sci., vol. 36, no. 4, p. 102031, 2024., doi: https://doi.org/10.1016/j.jksuci.2024.102031
A. Levina, I. Ilin, D. Gugutishvili, K. Kochetkova, and A. Tick, “Towards a smart hospital: Smart infrastructure integration,” J. Open Innov., vol. 10, no. 3, p. 100339, 2024, doi: https://doi.org/10.1016/j.joitmc.2024.100339
O. Alruwaili, M. Tanveer, F. M. Alotaibi, W. Abdelfattah, A. Armghan, and F. M. Alserhani, “Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism,” Heliyon, vol. 10, no. 18, p. e37577, 2024, doi: https://doi.org/10.1016/j.heliyon.2024.e37577
G. Lazrek, K. Chetioui, Y. Balboul, S. Mazer, and M. El bekkali, “An RFE/Ridge-ML/DL based anomaly intrusion detection approach for securing IoMT system,” Results Eng., vol. 23, no. 102659, p. 102659, 2024, doi: https://doi.org/10.1016/j.rineng.2024.102659
A. Jain and K. Tripathi, "Biometric Signature Authentication Scheme with RNN (BIOSIG_RNN) Machine Learning Approach," 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, India, 2018, pp. 298-305, doi: 10.1109/IC3I44769.2018.9007284
T.-V. Le, C.-F. Lu, C.-L. Hsu, T. K. Do, Y.-F. Chou, and W.-C. Wei, “A novel three-factor authentication protocol for multiple service providers in 6G-aided intelligent healthcare systems,” IEEE Access, vol. 10, pp. 28975–28990, 2022, doi: 10.1109/ACCESS.2022.3158756
D. Mao, H. Liu, and W. Zhang, “An enhanced three-factor authentication scheme with dynamic verification for medical multimedia information systems,” IEEE Access, vol. 7, pp. 167683–167695, 2019, doi: 10.1109/ACCESS.2019.2953532
A. Natarajan and N. Shanthi, "A Survey on Multimodal Biometrics Authentication and Template Protection," 2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW), Erode, India, 2018, pp. 64-71, doi: 10.1109/I2C2SW45816.2018.8997125.
T. Fu, A. Pradhan, J. He, C. He, and N. Jiang, “Comparison of wrist and forearm EMG for multi-day biometric authentication,” Annu. Int. Conf. IEEE Eng. Med. Biol. Soc., vol. 2023, pp. 1–4, 2023, doi: 10.1109/EMBC40787.2023.10340339
V. O. Nyangaresi, “Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks,” Ad Hoc Netw., no. 103117, p. 103117, 2023, doi: https://doi.org/10.1016/j.adhoc.2023.103117
N. Wan et al., “Implantable QR code subcutaneous microchip using photoacoustic and ultrasound microscopy for secure and convenient individual identification and authentication,” Photoacoustics, vol. 31, no. 100504, p. 100504, 2023, doi: https://doi.org/10.1016/j.pacs.2023.100504
G. Guízar-Sahagún, I. Grijalva-Otero, and I. Madrazo-Navarro, “Fingerprints: origin, uses and challenges in the face of its verification failure,” Rev. Med. Inst. Mex. Seguro Soc., vol. 59, no. 6, pp. 568–573, 2021. PMID: 34913636.
M. Sawa, T. Inoue, and S. Manabe, “Biometric palm vein authentication of psychiatric patients for reducing in-hospital medication errors: a pre-post observational study,” BMJ Open, vol. 12, no. 4, p. e055107, 2022, doi: 10.1136/bmjopen-2021-055107
T. Singh, S. Zaka-Ur-Rab, and S. Arrin, “Effect of pupil dilation on biometric iris recognition systems for personal authentication,” Indian J. Ophthalmol., vol. 71, no. 1, pp. 57–61, 2023, doi: 10.4103/ijo.IJO_1417_22
J. O. Healthcare Engineering, “Retracted: Biometric authentication for intelligent and privacy-preserving healthcare systems,” J. Healthc. Eng., vol. 2023, p. 9821301, 2023, doi: https://doi.org/10.1155/2023/9821301
- Conceptualization
- Data curation
- Formal Analysis
- Investigation
- Methodology
- Validation
- Visualization
- Writing - original draft
- Writing - review & editing
- Conceptualization
- Data curation
- Formal Analysis
- Investigation
- Methodology
- Validation
- Visualization
- Writing - original draft
- Writing - review & editing
Copyright (c) 2026 Innovation and Software

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors exclusively grant the right to publish their article to the Innovation and Software Journal, which may formally edit or modify the approved text to comply with their own editorial standards and with universal grammatical standards, prior to publication; Likewise, our journal may translate the approved manuscripts into as many languages as it deems necessary and disseminates them in several countries, always giving public recognition to the author or authors of the research.











