Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
19 pages
1 file
The focal point of security is preventing unauthorized access or loss of customer or company data. Texas Instruments proposes these solution components for activating biometric security of a technological infrastructure. Methods and documented standards are being developed, as biometrics is a newcomer to the cyber security scene. The National Institute of Science and Technology (NIST) declared that interoperability is the cornerstone of success for biometrics and deployment requires both national and international standards. Standards have been developed but, rapid innovations coupled with the unconditional data interchange formats and technical interference, result in products that don’t meet established standards.
Computers & Security, 2000
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
Biometrics is a cutting-edge technology that offers several advantages for access privileges and authorization. This security system has become an integral part of a variety of public and commercial sectors. The importance of growing private data for authentication solutions that increase mobile security is rising. Information security is required to prevent organisations' assets from falling into the hands of rivals, hackers, or cyberterrorists. This study explains how to avoid the biometric methods' concealed dangers. Compared to traditional systems, biometric applications are capable of providing much more identity management and recognition. In truth, the widespread use of biometrics services has substantial consequences for our understanding of the relationship between the person and the state. As with any technology, however, application-specific concerns and limitations must be taken into account. Research in a number of connected fields will lead to continuing progress. In this study, technical and engineering challenges as well as the advantages of contemporary biometric technology are examined.
IJCTT, 2020
To improve the security of real identity management systems, many application now uses biometrics-based personal authentication systems. Biometric physiological traits such as fingerprint, face and iris or behavioral traits such as speech and handwriting are often engaged. As a result of widespread deployment of biometric systems in many applications, there are growing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system developers to convince the users that these systems are robust with low error rates, and are tamper proof. This research focuses on likely areas on which biometric system can be hacked because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. In this study we present categorization of various weaknesses points of a biometric system and countermeasure approaches that has been propounded.
2008
This report is the output of a consultation process of various major stakeholders in the biometric community to identify the future biometrical research issues, an activity which employed not only researchers but representatives from the entire biometrical community, consisting of governments, industry, citizens and academia. It is one of the main efforts of the BioSecure Network of Excellence to define the agenda for future biometrical research, including systems and applications scenarios.
Biometrics can provide a key element of identity management, both in terms of biometric user authentication and identity assurance systems. In the area of cyber-security, it is important to know both who is attempting to access a system and that biometric identity data is itself protected. Biometrics has emerged as an important tool in supporting effective identity management by strongly binding a physical person to their identity. ISO has developed several standards that support the use of biometrics in a cyber-security environment. Signcryption is a relatively new cryptographic primitive, standardized in 2012 as ISO/IEC 29150 .Signcryption uses "an asymmetric encryption scheme and a digital signature scheme combined in a specific way", along with "a specially developed algorithm" to perform both encryption and digital signature functions simultaneously. This efficient cryptographic technique provides data integrity, origin authentication, and data confidentiality in a single operation.
International Journal of Advanced Trends in Computer Science and Engineering, 2023
Biometric advancements have the potential to provide more robust security and authentication approaches compared to conventional password-based security measures. When compared to knowledge-based security, biometrics relies on what makes you unique rather than what you know. Biometrics offers promising opportunities to enhance security but also comes with its own set of challenges. Successful implementation requires attention to these possible flaws and a rise in user approval. This article explores the potential benefits of biometric security in an effort to ascertain how broadly adopted it is. It analyses the correlation between user approval and their opinion of the feature's usefulness and accessibility. It also examines crucial acceptability elements like social, organizational, and cost considerations. Biometric systems are a type of pattern recognition technology that may identify a person by vetting their claimed physiological and/or behavioural traits. The following concept of a biometric system can be very broad, which is problematic when thinking about the specifics of contemporary biometric applications. The use of biometrics has the potential to greatly improve upon the security of current methods of authentication and identification. The broad use of biometrics solutions, in fact, has significant ramifications for the way we think about the individual's place in society. However, certain factors and limits are taken into account in the context of the application area, as is the case with any technology. Further progress will be made as scientists investigate multiple, interconnected topics. This paper addresses technical and engineering concerns while highlighting potential applications of contemporary biometric technologies.
Information Security Technical Report, 1999
The biometric device and subsystem represent only a part of a complete security solution. Sys tern designers who are considering the use of this novel approach to au then tication need to consider how its use will impact the other components. In addition, new threats and vulnerabilities may be introducedespecially if such devices are viewed as simple replacements of existing methods. Each domain of application will present its own challenges, but there are a number of common concerns which the prudent designer should address.
The article is about the role of biometric technology in information security. The increased terrorist threat in the world has urged the biometric identification systems to be established in order to improve the safety systems. The advantages of biometric technology are shown to address the issues facing the authorities of law enforcement system, the state security system and the defense guarantee of the country on a national basis. The recommendations are given in this area.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Proceedings of the ICITA International Conference, 2002
IAEME PUBLICATION, 2020
Information Sciences, 2013
Journal of Electronic Imaging, 2008
The International Federation for Information Processing
IEEE MultiMedia
International Journal of Innovation in the Digital Economy, 2012