Brian Ricky | Concordia University (Canada) (original) (raw)

Brian Ricky

Address: United Kingdom

less

Uploads

Papers by Brian Ricky

Research paper thumbnail of Biometric Authorization and Authentication Overview

The field of Biometrics is an ever-expanding research area formed of different perceptions and th... more The field of Biometrics is an ever-expanding research area formed of different perceptions and theories from identity to verification. This can be fascinating with numerous aspects usually leading to authentication and security. Biometric identification involves capturing a physical element of an individual, which can be later used for verification by running multiple checks against stored data. It uses different methods to pattern match an individual and has always proven difficult to replicate. This is because each individual has a unique set of characteristics and no matching traits even in the case of identical twins. This research report presents an overview of various authorization and authentication techniques currently making use of biometrics technology. Moreover, a brief overview of biometric history is discussed to give an insight where it all began and how the use of technology has advanced its development. There is a variety of biometric authentication technologies used in today’s society, which are explored. One aspect to consider when deliberating about the use of biometric systems and how each application method has evolved is; at what point does the matter of security become an invasion of privacy?

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Biometric Authorization and Authentication Overview

The field of Biometrics is an ever-expanding research area formed of different perceptions and th... more The field of Biometrics is an ever-expanding research area formed of different perceptions and theories from identity to verification. This can be fascinating with numerous aspects usually leading to authentication and security. Biometric identification involves capturing a physical element of an individual, which can be later used for verification by running multiple checks against stored data. It uses different methods to pattern match an individual and has always proven difficult to replicate. This is because each individual has a unique set of characteristics and no matching traits even in the case of identical twins. This research report presents an overview of various authorization and authentication techniques currently making use of biometrics technology. Moreover, a brief overview of biometric history is discussed to give an insight where it all began and how the use of technology has advanced its development. There is a variety of biometric authentication technologies used in today’s society, which are explored. One aspect to consider when deliberating about the use of biometric systems and how each application method has evolved is; at what point does the matter of security become an invasion of privacy?

Bookmarks Related papers MentionsView impact

Log In