Abstract

The field of biometrics, or the identification of people based on physiological or behavioral characteristics [6], has recently received a significant amount of attention in current research as a result of its applicability in the fields of information technology and security. With the increased usage of PIN numbers and passwords in everyday life, the vulnerabilities of these two technologies are becoming more apparent (e.g. password-cracking). Biometric authorization’s strengths are that it requires the user to be present and that it eliminates the hassles of passwords and PIN’s (or can be used in parallel with these for added security). Specifically, online identity verification, ATM machines, and building entrance authorization, are all areas where it is very useful to implement an automatic identification system.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.