logo

Information Security: Biometric Authentication

   

Added on  2023-06-04

12 Pages3063 Words323 Views
Running head: BIOMETRIC AUTHENTICATION
Information Security: Biometric Authentication
Name of the Student
Name of the University
Author’s Note:

1
BIOMETRIC AUTHENTICATION
Abstract
The major objective of this research report is to learn about biometric authentication and
various technologies as well as applications of it. The various systems of biometric
authentication majorly compare the captured biometric data with the confirmed or stored data
within the database. When both of these samples match with each other, the person is termed
as authenticated. The person’s data are being compared to that person’s biometric template
for simply determining resemblance. The specific reference model is at first stored within the
database or within a secured portable element such as the smart card. This stored data is then
matched with the biometric data that is to be authenticated. Hence, the verification is accurate
and perfect. This report has properly explained the various technologies as well as
applications of biometric. Moreover, gaps are identified here and future research directions
are provided.

2
BIOMETRIC AUTHENTICATION
Table of Contents
1. Introduction............................................................................................................................3
2. Discussion..............................................................................................................................3
2.1 Relevant Technologies and Applications of Biometric Authentication...........................3
2.2 Challenges or Problems in Biometric Authentication......................................................6
2.3 Identification of Gaps.......................................................................................................7
2.4 Future Research Directions in Biometric Authentication................................................8
3. Conclusion..............................................................................................................................9
4. References............................................................................................................................10

3
BIOMETRIC AUTHENTICATION
1. Introduction
Biometric authentication is the security procedure, which mainly relies on unique
biological features of any specific person for the purpose of verification or unique
identification (De Luca et al., 2015). The biometric authentication is utilized for the
management of accessing the digital and physical resources like rooms, buildings as well as
computing devices. There are various significant technologies of this biometric authentication
and all of them are extremely popular for the users (Bhagavatula et al., 2015). The following
research report outlines a brief description on the biometric authentication and its
technologies. The various challenges or problems with these technologies will be identified in
the report and relevant gaps will be identified. Moreover, the future research directions in
biometric authentication will also be provided here.
2. Discussion
2.1 Relevant Technologies and Applications of Biometric Authentication
Biometric authentication is considered as one of the safest and the most secured
technology for verifying or identifying any specific person (Awasthi & Srivastava, 2013).
There are various important and significant technologies of the biometric authentication
system. These are given below:
i) Fingerprint Recognition System: The first and the foremost technology of
biometric authentication is the fingerprint recognition system (Sayed et al., 2013). It is the
automated methodology to identify or confirm the respective identity of the individual based
on the basic comparison of any two fingerprints. This is the most utilized biometric solution
for the authentication purpose.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
BIOMETRIC VERIFICATION.
|3
|388
|88

Biometrics for Authentication: Security and Privacy Implications
|3
|2227
|66

ISY10212 Contemporary Issues in MM & IT
|9
|2974
|129

Fingerprinting Authentication: Methods, Matching Techniques, and Performance Evaluation
|13
|967
|462

Biometrics for authentication: security and privacy implications
|10
|2310
|472

Security Assignment: Fingerprinting vs Face Recognition
|27
|7463
|220