Algorithms for efficient biometric systems to mitigate the integrity of a distributed database

3Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The problems of information security are persistent in the business environment and public and private institutions for this reason, in this research biometric algorithms are considered as an alternative to mitigate the security of information; through biometric authentication used for the identification and verification of users based on the physical characteristics of the individual such as fingerprint, face, iris and voice. The objective is to perform the analysis of efficient biometric algorithms to mitigate the integrity of a distributed database. The deductive method was used to analyze the information of the articles related to this investigation. It resulted from this research an alternative of modified algorithm that can be applied in different types of authentication by biometrics, but not in all functions efficiently. It was concluded that, depending on the type of authentication that will be implemented; fingerprint, facial recognition, iris, voice, an efficient algorithm of the analyzed was used; with the objective of mitigating the integrity of the information in a distributed database without relying on the technological infrastructure.

Cite

CITATION STYLE

APA

Toapanta, S. M. T., Cruz, A. A. C., Gallegos, L. E. M., & Trejo, J. A. O. (2018). Algorithms for efficient biometric systems to mitigate the integrity of a distributed database. In CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/CITS.2018.8440190

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free