Biometrics authentication techniques: A comparative study

1Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Literature confirms that the biometric system lacks security and has numerous limitations and weaknesses. The disadvantages of this system come from the distinctness of biometric signals and the way it collects data and represents individuals, which is dependent on the method adopted to gather data, surroundings, the way users interact with the device, as well as the pathophysiological phenomena that arise due to variations in traits. In addition, this system has many problems in regard to forgery since, for instance, people’s voices can be captured when they are expressing their passwords, the camera is able to take the photo of an iris from across the room, and fingerprints on surfaces can be removed. As a result, a key feature with a high strength against any attacks is needed to be utilized in a way to maximize the biometric system security. To this end, numerous techniques for biometric authentication have been proposed. The present study attempts to introduce different biometric authentication techniques like biometric cryptosystem and palm vein cryptosystem.

Cite

CITATION STYLE

APA

Alyanis, N., Razak, S., & Al-Dhaqm, A. (2020). Biometrics authentication techniques: A comparative study. International Journal of Advanced and Applied Sciences, 7(9), 97–103. https://doi.org/10.21833/ijaas.2020.09.015

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free