logo

Biometric for Authentication

   

Added on  2022-11-28

7 Pages3210 Words268 Views
BIOMETRIC FOR AUTHENTICATION
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au

Table of Contents
INTRODUCTION..............................................................................................................................................3
OVERVIEW OF BIOMETRIC TECHNOLOGY.............................................................................................3
TYPES OF BIOMETRICS................................................................................................................................4
BENEFITS OF BIOMETRIC AUTHENTICATION........................................................................................5
ISSUES IN BIOMETRIC AUTHENTICATION..............................................................................................6
CONCLUSION..................................................................................................................................................6
REFERENCES...................................................................................................................................................6

ABSTRACT Biometry has been playing an
important role in security systems. This
paper has focused on biometrics, passcodes
and security tokens used in security
systems. Biometrics based authentication
systems have been becoming popular in the
market. Various applications of biometric
technology in security systems have been
discussed in the paper. Challenges in the
biometric technology have been discussed in
the paper. The speed of authentications
have been high in the biometric
authentication systems. The database have
been using fast search algorithm in the
server that help in fast searching of query
claimed by user. In several cases, it
becomes difficult to attack a biometric
systems for getting authentication to the
system.
Keywords Biometric authentication,
Fingerprint recognition, Iris recognition and Face
recognition
INTRODUCTION
Humans have been recognizing each other with
the help of several distinct characteristics. They
used to recognize with the help of face when
meeting with each other and by vice when
speaking with each other. However, modern
technology has been based on computer based
recognition system including biometric. Biometric
technology has been one of the authentication
method. It consists of identifying people by
different physical characteristics. This report has
been based on understanding the concept of
biometric and its working in authentication
systems. The benefits of biometric security
systems have been discussed in the report. This
report critically analyses limitations and issues
faced in the biometric systems.
OVERVIEW OF BIOMETRIC TECHNOLOGY
Biometrics have been an automated methods
for identifying person or verifying identity of
person based on behavioral and physiological
characteristics. Biometric based authentication
has been authentic identity verification that have
been based in individual physiological
characteristics including fingerprint, eyes, voice
and face (Chatterjee et al., 2018). The biometrics
based authentication frameworks are winding up
such a great amount of prevalent as the
unwavering quality and the simplicity of utilization
is expanding for a long time. Biometric
authentication has been providing accurate and
convenient approach for security systems. It
include concept of cryptography in it. The basic
concept of cryptography has been based on
encrypting data and information during transfer.
Biometric data is personal private information that
has been unique and permanent linked with
person and is not replaced with keys and
passwords (Lu et al., 2015).
Figure 1: Basic components of biometric
systems
(Source: Created by author)
The above figure discuses about the basic
component of biometric system. Biometric
authentication used to compare registered and
enrolled biometric sample. During Enrollment,
sample of biometric sample has been captured
and processed by computer. It has been used as
identification mode in which biometric system
identifies person from total population by
searching database of biometric (Chaudhry, Naqvi
& Khan, 2018). Verification need to be done in
several computer access environment.
Figure 2: Enrollment of Biometric data
(Source Created by author)

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Biometrics for Authentication: Security and Privacy Implications
|3
|2227
|66

Security Assignment: Fingerprinting vs Face Recognition
|27
|7463
|220

BIOMETRIC VERIFICATION.
|3
|388
|88

Biometrics for Authentication: Assignment
|10
|2172
|41

Biometric Authentication: System Security & Privacy
|6
|3012
|32

Fingerprint Based Bank Locker System
|13
|3112
|26