BIOMETRICS : Selecting the best solution
Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 11)Publication Date: 2016-02-01
Authors : Shirish Joshi;
Page : 206-208
Keywords : Biometric; Biometric Identification; Biometric Authentication; Fingerprint recognition; Face recognition; Voice Recognition; IRIS recognition; Hardware recognition;
Abstract
The past few decades have witnessed the rapid progress of technology, engulfing all the aspects of human existence. The assistance of technology in man�s mundane as well as specialized activities has rendered it a part & parcel of his life. With the advancement of technology the professional and personal information is now stored digitally in the memory of IC chips. Such vital information cannot be guarded against frauds through lock & key. In order to ensure denial of access to classified data by unauthorized persons, passwords & secret codes were implemented. But the security tools like smart cards, magnetic stripe cards & physical keys can be lost, stolen or duplicated. Passwords can be forgotten, shared or unintentionally observed by a third party. Instead of guaranteeing a foolproof security system these tools become a nuisance for the users. The most rapidly emerging technology for security system is the BIOMETRIC TECHNOLOGY. Biometric user authentication techniques can be used to protect PCs & Networks from unauthorized access by authenticating users based on a physical feature such as fingerprints, retina, iris, hand or face. Biometrics is a means of using parts of human body as a kind of permanent password. Biometrics turns your face, hand or eye into your badge of identity. We attempt to find the best solution in different situations & compare the pros & cons.
Other Latest Articles
- Performance Evaluation and Optimization of Tie rod in Suspension System of Car for a Buckling study using Theoretical and Experimental approach
- Performance Evolution of Tie Rod in Suspension System of Car Using Finite Element Approach
- Techniques and Tools for Password Attack
- Effects Ceramic Waste and Brick Aggregates in Cement Concrete
- Identity Based Localization Technique in Microcontroller Using GSM
Last modified: 2016-01-12 19:10:25