scholarly journals Future of Cybersecurity: A Study on Biometric Scans

Author(s):  
Amogh Joshi

Abstract: Biometrics is a statistical analysis of people's unique behavioral characteristics. The technology is used for CYBERSECURITY. The basics of biometric authentication is that to stop security breaches by analyzing a person’s unique behavioral characteristics. The term biometrics is derived from the Greek word’s “bios” meaning life and “metricos” meaning to measure. It refers to measurements of physical and biological characteristics of the human body. In this paper, we have studied some biometric methods such as facial recognition, iris recognition, Retinal Recognition, voice recognition. Keywords: Biometrics, Cybersecurity, Biometric Scan, Retinal Scan, Iris Scan, Gait, Voice Recognition.

2019 ◽  
Vol 29 (3) ◽  
pp. 139
Author(s):  
Amjed A. Ahmed

Identification and access have been a concept that has evolved over time as the need to constantly identify people and grant them access to sensitive and classified data and information became very important. The effect is felt in most organizations, especially multinational companies that deal in highly classified research that has to do with pharmaceuticals, technology, power as well as the human biology coupled with security. The most common form of implementation of biometrics is facial recognition, fingerprints, iris recognition, a retina scanner, and voice recognition into so many applications and scenarios. The integration of this biometrics has had a rising effect and impact of everyday life and has practically changed some daily routines. This paper will examine future integrations of biometrics and it will in time affect everyday life and routine.


2019 ◽  
Vol 8 (4) ◽  
pp. 4787-4790

Biometrics authentication is the automated recognition of physiological or behavioral characteristics of a person without any previous knowledge. It adds a unique identifier and it is extremely difficult to duplicate. One of the most unique biometric authentication structures is iris pattern. It is the most solid and exact distinguishing proof structure existing around. The exhibition of this acknowledgment framework can be estimated with quality and acknowledgment rate. In the proposed work, iris code were generated by the processing the iris image by applying preprocessing, gaber filter, normalization, feature encoding by Fast Fourier Transform and then Hamming distance was used for pattern matching. The overall success rate shows that iris recognition is a reliable and accurate biometric authentication


2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


2020 ◽  
Vol 15 (3) ◽  
pp. 34-43
Author(s):  
A. Okandeji ◽  
M.B. Olajide ◽  
A.A. Okubanjo ◽  
F. Onaifo

The election process adopted in Nigeria is mostly paper based or manual. This manually handled process can be time-consuming, and prone to security breaches and electoral fraud. Consequently, this work proposes a biometrically authenticated voting system to provide inexpensive solution to the electoral process in Nigeria. In particular, the biometric database is constructed by filling it with the audio fingerprints and the associated metadata of many audio clips, and then the fingerprint of an unknown clip (or the distorted version of the clip brought by compression or standard audio processing) is extracted and compared to that of the clip in the database. If the fingerprint of the unknown clip is in the database, it will be correctly identified by the matching procedures. The project is implemented with biometric system i.e. fingerprint scanning and facial recognition. Accordingly, this is used to ensure enhanced security, and to avoid fake, repeated voting. Results obtained showed that the proposed system is fast, accurate, reliable, and cost effective, thus a viable option to replace the manual voting process. Keywords: Biometrics, electoral process, facial recognition, finger print scanning


Sign in / Sign up

Export Citation Format

Share Document