ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

BIOMETRICS : Selecting the best solution

Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 11)

Publication Date:

Authors : ;

Page : 206-208

Keywords : Biometric; Biometric Identification; Biometric Authentication; Fingerprint recognition; Face recognition; Voice Recognition; IRIS recognition; Hardware recognition;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The past few decades have witnessed the rapid progress of technology, engulfing all the aspects of human existence. The assistance of technology in man�s mundane as well as specialized activities has rendered it a part & parcel of his life. With the advancement of technology the professional and personal information is now stored digitally in the memory of IC chips. Such vital information cannot be guarded against frauds through lock & key. In order to ensure denial of access to classified data by unauthorized persons, passwords & secret codes were implemented. But the security tools like smart cards, magnetic stripe cards & physical keys can be lost, stolen or duplicated. Passwords can be forgotten, shared or unintentionally observed by a third party. Instead of guaranteeing a foolproof security system these tools become a nuisance for the users. The most rapidly emerging technology for security system is the BIOMETRIC TECHNOLOGY. Biometric user authentication techniques can be used to protect PCs & Networks from unauthorized access by authenticating users based on a physical feature such as fingerprints, retina, iris, hand or face. Biometrics is a means of using parts of human body as a kind of permanent password. Biometrics turns your face, hand or eye into your badge of identity. We attempt to find the best solution in different situations & compare the pros & cons.

Last modified: 2016-01-12 19:10:25