Biometric Authorization and Authentication Overview (original) (raw)

Comparative Analysis of Various Biometric Techniques

PIJMT, 2015

In the ever-changing world of global data communications, and fast-paced software development, security is becoming more and more of an issue. No system can ever be completely secure, all one can do is make it increasingly difficult for someone to compromise the system. The more secure the system is, the more intrusive the security becomes. One needs to decide where in this balancing act the system will still be usable and secure for the purposes. Here we have discussed different Biometric tools and related security issues. Identity is to establish the identity of a person, or to ascertain the origin, nature or definitive characteristics of a particular person. To uniquely identify a person different types of information can be used with other sources. This concept is ancient, and has become much more important as information technology and the Internet have made it easier to collect identifiable documents. To identify a person, the recent trend is to use biometric. Different biometric features can distinctively identify a person unless there are identical twins. In case of identical twins many biometrics fail to distinguish them as separate person, but fingerprint still can distinguish. In recent technology more than one biometric feature is also being used in a combination to have more robust indentifying system. Several research projects have shown that multimodal biometrics (e.g. fingerprints and voiceprints combined) can improve the performance and reliability of biometric authentication.

Biometrics: a tool for information security

2006

Abstract Establishing identity is becoming critical in our vastly interconnected society. Questions such as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is he in the watchlist posted by the government?" are routinely being posed in a variety of scenarios ranging from issuing a driver's license to gaining entry into a country.

An Overview of Biometrics

2010

The term biometrics is derived from the Greek words bio meaning “life” and metrics meaning “ to measure” . Biometrics refers to the identification or verification of a person based on his/her physiological and/or behavioral characteristics. Several verification/identification based biometrics have evolved based on various unique aspects of human body, ease of acquiring the biometric, public acceptance and the degree of security required. This paper presents an overview of various biometrics in use/proposed and their applicability to different activities.

Biometrics: A New Approach for Identity Verification

Biometrics is automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is, becoming apparent. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies

“A Survey of Biometric Authentication Techniques”

2016

ABSTRACT: Security is not a single layer issue. Now a day’s only passwords, cards, or other keys are not sufficient to provide high level security. So we need to upgrade our security standards. We need something that cannot be stolen or copied. To resolve this problem another level of security comes into picture that is biometric security. Biometric security identifies an individual on the basis of distinctive biometric characteristics that may be a fingerprint, face, DNA, or any other unique character. Biometric identification becomes important part of today’s security systems. Many countries are accepting the biometry based personal identification of their employees in various departments like armed forces, national security departments etc to prevent important national information secure. This increases the importance of biometrics in the field of security. Now a day IT companies are also moving towards the biometric security to avoid unauthorized access to their data and much co...

Biometrics and privacy

2008

Abstract: By now, biometric systems find already home in a broad range of commercial and institutional applications. They are typically employed to authenticate users before allowing access to restricted areas or services. The interest in biometrics is mainly due to their potential advantages over traditional authentication procedures. Such advantages extend across: security, accuracy, reliability, usability, and friendliness. Unfortunately, with the benefits also possible risks arise.

Review of Biometric Technologies Used for

2013

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. In order to deal with security, Authentication plays an important role. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on "who she/he is" rather than "what she/he has" (card, token, key) or "what she/he knows" (password, PIN). We have also outlined opinions about the usability of biometric authentication systems, limitation, comparison between different techniques and their advantages and disadvantages in this paper. Present study deals with new innovative model ...