Information Security


Biometric devices and Security

Article Number: BKW140768 Volume 01 | Issue 01 | January - 2019 ISSN: UA
07th Sep, 2018
03rd Oct, 2018
04th Dec, 2018
17th Jan, 2019

Authors

Dr. Ranjeet Kumar Singh, Mahesh Sharma

Abstract

The major problem in our daily life is security. To deal with the information security major role is played by authentication. Biometric security is one of the widely used technology in identification and security. Biometrics is the automatic identification system of a person. The identification system of biometrics depends upon the physiological as well as behavioral characteristics of a person. In the recent system of security, biometric has depicted his work. In the prevention of unauthorized admittance of ATMs, smart cards, PCs, computer networks, etc. biometrics can be used. Many industries and companies uses biometric security for the recognition of employees. Because of liability and efficiency of biometrics, it is quite popular. This paper discusses about biometric techniques with some comparison of biometric system with other authentication method can also be discussed for the achievement of a security system with maximum advantages. Keywords: Biometrics, Security, Authentication, Information.

Introduction

The surety of an individual’s privacy, honor and availability of information in all forms is concerned under Information Security. The administration of information security is supported by many tools and techniques. But some features of information security are based on biometric.

Biometrics is derived from a Greek word ‘bios’ which means life and ‘metrikos’ which means to measure. It is a scientific technology where statistical analysis of biological characteristics takes place. In information security biometric authentication includes identification, authentication and non-repudiation. For personal identification biometric authentication is popular. The identification of person is significant in many application. The major issue concern in today’s society is increasing of large number of credit card frauds and in identification of theft biometrics plays major role. A capable method for security application with many advantages over classical method is offered by biometric system.

Biometric recognition offers an auspicious approach for security, with many advantages over the classical methods, which depends upon something you have like key, id proofs, etc. or something you know password, pattern, etc. the simple stuff of biometric traits is that it is based on the data or information which you have or which you do, so there is no need to remember in anything in biometric security or neither to hold any token.

References

Bhattacharyya, Debnath, et al. “Biometric Authentication: A Review.” International Journal of u- and e- Service, Science and Technology, vol. 2, no. 3, Sept. 2009, pp. 13–27.

Gomathi, P M, and G M Nsira. “A Survey on Biometrics Based Key Authentication Using Neural Network.” Global Journal of Computer Science, vol. 1, no. 11, July 2011.

Kodituwakku, S R. “Biometric Authentication: A Review.” International Journal of Trend in Research and Development, vol. 2, no. 4, Aug. 2015, pp. 113–123.

Shradha Tiwari, et al. “A Review of Advancements in Biometric Systems.” International Journal of Innovative Research in Advanced Engineering, vol. 2, no. 1, Jan. 2015, pp. 187–204.

Srivastava, Himanshu. “A Comparison Based Study on Biometrics for Human Recognition.” IOSR Journal of Computer Engineering, vol. 15, no. 1, 2013, pp. 22–29.

Subban, Ravi, and Dattatreya P. Mankame. “A Study of Biometric Approach Using Fingerprint Recognition.” Lecture Notes on Software Engineering, 2013, pp. 209–213.

Uddin, Mohammed Nasir, et al. “A Survey of Biometrics Security System.” IJCSNS International Journal of Computer Science and Network Security, vol. 11, no. 10, Oct. 2011, pp. 17–23.

Zanuy, Marcos Faundez. “Biometric Security Technology.” IEEE Aerospace and Electronic Systems Magazine, vol. 21, no. 6, June 2006, pp. 15–26.

How to cite this article?

APA StyleSingh, R. and Sharma, M. (2019). Biometric devices and Security. Academic Journal of Information Security, 1(1), 1-5.
Chicago Style
MLA Style
DOI
URL

Create Your Password

We've sent a link to create password on your registered email, Click the link in email to start using Xournal.

Sign In

Forgot Password?
Don't have an account? Create Account

Create Account

Already have an account? Sign In

Forgot Password

Do you want to try again? Sign In

Publication Tracking