Authors
Dr. Ranjeet Kumar Singh, Mahesh Sharma
Abstract
The major problem in our daily life is security. To deal with the information security major role is played by authentication. Biometric security is one of the widely used technology in identification and security. Biometrics is the automatic identification system of a person. The identification system of biometrics depends upon the physiological as well as behavioral characteristics of a person. In the recent system of security, biometric has depicted his work. In the prevention of unauthorized admittance of ATMs, smart cards, PCs, computer networks, etc. biometrics can be used. Many industries and companies uses biometric security for the recognition of employees. Because of liability and efficiency of biometrics, it is quite popular. This paper discusses about biometric techniques with some comparison of biometric system with other authentication method can also be discussed for the achievement of a security system with maximum advantages. Keywords: Biometrics, Security, Authentication, Information.
Introduction
The surety of an individual’s privacy, honor and availability of information in all forms is concerned under Information Security. The administration of information security is supported by many tools and techniques. But some features of information security are based on biometric.
Biometrics is derived from a Greek word ‘bios’ which means life and ‘metrikos’ which means to measure. It is a scientific technology where statistical analysis of biological characteristics takes place. In information security biometric authentication includes identification, authentication and non-repudiation. For personal identification biometric authentication is popular. The identification of person is significant in many application. The major issue concern in today’s society is increasing of large number of credit card frauds and in identification of theft biometrics plays major role. A capable method for security application with many advantages over classical method is offered by biometric system.
Biometric recognition offers an auspicious approach for security, with many advantages over the classical methods, which depends upon something you have like key, id proofs, etc. or something you know password, pattern, etc. the simple stuff of biometric traits is that it is based on the data or information which you have or which you do, so there is no need to remember in anything in biometric security or neither to hold any token.
References
Bhattacharyya, Debnath, et al. “Biometric Authentication: A Review.” International Journal of u- and e- Service, Science and Technology, vol. 2, no. 3, Sept. 2009, pp. 13–27.
Gomathi, P M, and G M Nsira. “A Survey on Biometrics Based Key Authentication Using Neural Network.” Global Journal of Computer Science, vol. 1, no. 11, July 2011.
Kodituwakku, S R. “Biometric Authentication: A Review.” International Journal of Trend in Research and Development, vol. 2, no. 4, Aug. 2015, pp. 113–123.
Shradha Tiwari, et al. “A Review of Advancements in Biometric Systems.” International Journal of Innovative Research in Advanced Engineering, vol. 2, no. 1, Jan. 2015, pp. 187–204.
Srivastava, Himanshu. “A Comparison Based Study on Biometrics for Human Recognition.” IOSR Journal of Computer Engineering, vol. 15, no. 1, 2013, pp. 22–29.
Subban, Ravi, and Dattatreya P. Mankame. “A Study of Biometric Approach Using Fingerprint Recognition.” Lecture Notes on Software Engineering, 2013, pp. 209–213.
Uddin, Mohammed Nasir, et al. “A Survey of Biometrics Security System.” IJCSNS International Journal of Computer Science and Network Security, vol. 11, no. 10, Oct. 2011, pp. 17–23.
Zanuy, Marcos Faundez. “Biometric Security Technology.” IEEE Aerospace and Electronic Systems Magazine, vol. 21, no. 6, June 2006, pp. 15–26.
How to cite this article?
APA Style | Singh, R. and Sharma, M. (2019). Biometric devices and Security. Academic Journal of Information Security, 1(1), 1-5. |
Chicago Style | |
MLA Style | |
DOI | |
URL |