Open Access Open Access  Restricted Access Subscription or Fee Access

Biometric Security: A Review

Rakhi Mutha, Heena Khandelwal

Abstract


Well-being today is a key priority for well-being for everybody. Securing our information with the help of encryption is crucial. BIOMETRICS takes on a big job of health  issues. This paper gives a report on the different techniques for biometric approval and the fate of Biometric in information security. Histories use the human activities for purposes of evidence only interesting highlights of the individuals will be used for confirmationpurposes, so the given administrations are only opened by the genuine client, not the other person. Biometrics is used to create singular identities. Biomaterials are taking on an enormous occupation in digital protection. As it is vital that our data is secured with the guide of express sources. Security joins a couple of things like protection, genuineness, and admittance to information. There are different apparatuses equipped for reinforcing board data security. In any case, just assembled a biometric-based framework to help different pieces of information assurance. Biometric confirmation as an instrument for giving individual authenticity has filled in predominance. Biometrics, characterized as the examination of accepting an individual considering its true course of divulgence. Individual obvious proof is fundamental for the utilization and misleading development  of charging card and late deception of data shows that this involvesastounding open concern. Singular keys, PIN recognizing evidence or tokens-based strategy all have obstacles in an exceptionally sharp program that block their capacity. Biometric is utilized to distinguish the personality of an information check contrasted with a format utilized with perceive a particular individual in cases. There are various biometric capacities that may be revealed to man; for example, fingers, finger, iris, voice, face, and lots of something different. Four modules, a sensor module, a power extraction incorporates, a data set and an obscure module create a favoured biometric withdrawal. The sensor module gets a biometric picture.The yield incorporates module removes a progression of neighbourhood features from an accessible biometric picture. Requested usefulness depictions are put away inside the model data set as model information. Interface modules are answerable for differentiating game arrangement request and information with restricting choices Biometrics are commonly used in terms of their efficiency and unquestionable consistency.


Keywords


Biometric, Pattern, IRIS, Authentication, Finger, Voice, Face, PIN, Security.

Full Text:

PDF

References


Jain, A.K., Ross, A. and Prabhakar, S., 2004. An introduction to biometric recognition. IEEE Transactions on circuits and systems for video technology, 14(1), pp.4-20.

Klokova, A., 2010. Comparison of various biometric methods. Interactive Multimedia Systems.University of Southampton.

Jafri, R. and Arabnia, H.R., 2009. A survey of face recognition techniques. Journal of information processing systems, 5(2), pp.41-68.

Pato, J.N. and Millett, L.I., 2010. Biometric recognition: Challenges and opportunities. Whither biometric board.

https://cmrindia.com/securing-smartphones-with-biometrics/

https://xconomy.com/san-francisco/2019/06/28/as-cities-ban-face-recognition-body-cam-firm-axon-also-nixes-it/

Saini, R. and Rana, N., 2014. Comparison of various biometric methods. International Journal of Advances in Science and Technology, 2(1), pp.24-30.

Frye, M.C. and Michelle, C., 2001. The body as a password: considerations, uses, and concerns of biometric technologies (Master's thesis, Georgetown University).

Borole, S. and Sapkal, S.D., 2013. Extraction of Dual Tree Complex Wavelet Feature for IRIS Recognition. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), pp.2540-2543.

https://www.bayometric.com/hand-geometry-recognition-biometrics/

Alliance, S.C., 2009. Smart Card Technology and Application Glossary. Princeton Junction, NJ:Smart Card Alliance.

Jain, A.K., Ross, A. and Pankanti, S., 2006. Biometrics: a tool for information security. IEEE transactions on information forensics and security, 1(2), pp.125-143.

Sanchez-Reillo, R., Sanchez-Avila, C. and Gonzalez-Marcos, A., 2000. Biometric identification through hand geometry measurements. IEEE Transactions on pattern analysis and machine intelligence, 22(10), pp.1168-1171.

https://www.information-age.com/think-you-speak-voice recognition-replacing-password- 123461752/

http://misbiometrics.wikidot.com/keystroke

Prabhakar, S., Pankanti, S. and Jain, A.K., 2003. Biometric recognition: Security and privacy concerns. IEEE security & privacy, 1(2), pp.33-42.

https://en.wikipedia.org/wiki/Signature_recognition

Maltoni, D., Maio, D., Jain, A.K. and Prabhakar, S., 2003. Fingerprint Matching. Handbook of Fingerprint Recognition, pp.131-171.

Jain, A., Bolle, R. and Pankanti, S. eds., 1999. Biometrics: personal identification in networked society (Vol. 479). Springer Science & Business Media.

O’Gorman, L., 2002, March. Seven issues with human authentication technologies. In Proc. Workshop Automatic Identification Advanced Technologies (AutoID) (pp. 185-186).

den Os, E., Jongebloed, H., Stijsiger, A. and Boves, L., 1999. Speaker verification as a user- friendly access for the visually impaired. In EUROSPEECH.

Eriksson, A. and Wretling, P., 1997. How flexible is the human voice?-a case study of mimicry.In Fifth European Conference on Speech Communication and Technology.

Harrison, W.R., 1958. Suspect documents. Their scientific examination.

Black, D.A., 1960. Forgery above a genuine signature. The Journal of Criminal Law,Criminology, and Police Science, 50(6), pp.585-590.

Matsumoto, T., Matsumoto, H., Yamada, K. and Hoshino, S., 2002, April. Impact of artificial"gummy" fingers on fingerprint systems. In Optical Security and Counterfeit Deterrence Techniques IV (Vol. 4677, pp. 275-289). International Society for Optics and Photonics.

Hong, L., Jain, A.K. and Pankanti, S., 1999, October. Can multibiometrics improve performance?In Proceedings AutoID (Vol. 99, pp. 59-64). Citeseer.

Hong, L. and Jain, A., 1998. Integrating faces and fingerprints for personal identification. IEEE transactions on pattern analysis and machine intelligence, 20(12), pp.1295-1307.

Kuncheva, L.I., Whitaker, C.J., Shipp, C.A. and Duin, R.P., 2000, September. Is independencegood for combining classifiers?. In Proceedings 15th International Conference on Pattern Recognition. ICPR-2000 (Vol. 2, pp. 168-171). IEEE.

Zuev, Y.A. and Ivanov, S.K., 1999. The voting as a way to increase the decision reliability. Journal of the Franklin Institute, 336(2), pp.361-378.


Refbacks

  • There are currently no refbacks.