Abstract

In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of making biometric security systems, the important area of concern is that how do one can implement the biometric security for increasing of data security. First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use fingerprint recognition for authentication process it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast. In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.

Highlights

  • Biometrics is defined as the system of automated recognition of individuals based on biological or behavioural characteristics

  • Authenticating users based on what they are instead of what they know or what fingerprint recognition have provides an interface that users can access with a more effective, convenient, and secure way to access their account and messages

  • There are many applications and solutions of biometrics technology used in security systems

Read more

Summary

INTRODUCTION

Biometrics is defined as the system of automated recognition of individuals based on biological or behavioural characteristics. Common forms of biometrics used for physical and logical access control includes fingerprints, facial, iris, retina, voice, hand geometry, keystrokes, and handwriting recognitions. Unique human characteristics are used to identify an individual or to verify an identity. Biometric authentication generally involves the latter—verifying or authenticating a user‘s claim to identity is based on a one-o-one evaluation and comparison of the used biometric credentials to the registered enrolled biometric

BACKGROUND
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call