The idea of biometric authentication is associated with an array of technologies that are either applicable or have already been applied in biometric authentication. One such technology is the finger print authentication technology, which involves either vision based pattern matching or detection of minutiae. Critical to the discussion is the fact that Gaur, Shah, and Thakker (2012) reveal that the technology relies on concepts such as the ultrasonic method, the thermal technique, capacitive sensors, and optical techniques. Another biometric technology is the facial recognition system, which recognizes of a person’s face from a digital image or recording. Like the fingerprint technology, the facial recognition technology relies on other concepts. Specifically, the technology relies on either the 2D or the 3D facial recognition concept in addition to the mapping of specific features such as the length of the jaw, nose width, and the distance between eyes.
Iris recognition relies on the uniqueness of every person’s iris for authentication. The technology may involve image segmentation, matching, acquisition, and localization. Another technology is the hand geometry and palm print, which utilizes features such as the length, width, and hand patterns for authentication (Deka, and Bakshi, 2015). Analogously, the hand vein-pattern recognition falls in the category of biometric systems and relies on image collected from the veins of an individual’s hand for recognition and authentication. Another technology is retina recognition, which relies on the patterns of blood vessels that are visible and unique in every person’s eye. It is notable that the technology in question relies on an infrared light, the acquisition, matching, and presenting the outcome in form of a template. The last technology is the palm print and hand geometry recognition technology that relies on features such as the width and finger length, perimeter, and diameter of the palm for recognition (In Information Resources Management Association, 2016).
For instance, the government is known to record the details of every individual within her authority in order to provide services to those individuals. As a result, citizens and tourists are always forced to carry identification documents because it is almost impossible to access certain services without the mentioned documents. This is a disadvantage because identification documents are always misplaced or forgotten unexpectedly. Regardless, the emergence of biometric systems of authentication could provide a solution to the problem in question. This owes to the reality that biometric systems of identification could identify an individual based on the natural traits. For instance, the fingerprint biometric system requires and individual’s fingerprints to authenticate whether a person is who he/she claims to be. It follows that the government could benefit from implementing biometric authentication because the system will eliminate the use of identification documents.
Commercial organizations could also benefit from biometric authentication if the technology is applied appropriately. For instance, mobile phone manufacturers could implement biometric authentication in place of the traditional passwords used for mobile phone encryption. As evidenced, Trewin, Swart, Koved, Martino, Singh, and Ben-David (2012) reveal that biometric systems of authentication are memorable and fast to use than traditional passwords. The same authors also reveal that the technology ensures that only the user can use the mobile phone for improved security. In a different study, Jaina, Nandakumar, and Ross (2016) reveal that forensic experts could use biometric technology. Specifically, the authors argue that the technology could be used to collect evidence for analysis and provide the analyzed evidence before a court of law. In short, biometric authentication could be applied in forensics, commercial areas, and government agencies.
Apparently, biometric authentication promises improvements in technology because it improves on the current mode of authentication. The technology is vague in certain aspects, which hampers its rapid development. Specifically, the technology is vague in some legal aspects such as the difference between personal data and sensitive data. This owes to the reality that use of biometric templates results in storage of data that is not required in the authentication system. It follows that some practitioners scare from implementing the technology citing that the technology is legally vague. Further, the accuracy of biometric authentication is in question because studies reveal that biometric authentication is insecure (Naveed, and Batool, 2015). Moreover, the security concerns associated with biometric issues raise eyebrows on whether the technology is safe for human consumption. It follows that studies should be conducted to clear such issues before the technology can be fully embraced.
Evidently, biometric authentication offers some promising prospects in technology, but implementation of the technology is currently hampered by vagueness in the technology and calls for research on the following questions.
Doshi, A., and Nirgude, M. (2015). Biometric Recognition Techniques. International Journal of Advanced Research in Computer Networking, Wireless and Mobile Communications, 2(1): 143-152
Deka, G. C., and Bakshi, S. (2015). Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. Hershey, PA: Information Science Reference
In Information Resources Management Association. (2016). Biometrics: Concepts, methodologies, tools, and applications. Hershey: Information Science Reference
Jaina, K. A., Nandakumar, K., and Ross A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79: 80–105. Retrieved from https://biometrics.cse.msu.edu/Publications/GeneralBiometrics/JainNandakumarRoss_50Years_PRL2016.pdf
Naveed, G., and Batool, R. (2015). Biometric Authentication in Cloud Computing. Journal of Biometrics and Biostatistics, 6(5): 1-3. Retrieved from https://www.omicsonline.org/open-access/biometric-authentication-in-cloud-computing-2155-6180-1000258.pdf
Trewin, S., Swart, C. Koved, L., Martino, J., Singh, K., and Ben-David, S. (2012). Biometric Authentication on a Mobile Device: A Study of User Effort, Error, and Task Disruption. Retrieved from https://researcher.ibm.com/researcher/files/us-kapil/ACSAC12.pdf
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Information Security: Biometric Authentication. Retrieved from https://myassignmenthelp.com/free-samples/information-security-biometric-authentication.
"Information Security: Biometric Authentication." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/information-security-biometric-authentication.
My Assignment Help (2018) Information Security: Biometric Authentication [Online]. Available from: https://myassignmenthelp.com/free-samples/information-security-biometric-authentication
[Accessed 24 January 2021].
My Assignment Help. 'Information Security: Biometric Authentication' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/information-security-biometric-authentication> accessed 24 January 2021.
My Assignment Help. Information Security: Biometric Authentication [Internet]. My Assignment Help. 2018 [cited 24 January 2021]. Available from: https://myassignmenthelp.com/free-samples/information-security-biometric-authentication.
Curating the most effective thesis paper is a tedious task. It requires dedicated effort and time. You need to have knowledge on the subject matter, accurate formatting style and citation of resources. Moreover, you need to know the trick of acquiring the validations without wasting much time. Experts at MyAssignmenthelp.com will not only show you how to write a thesis statement but will hand you the most compelling content. If you have no idea how to write a research paper, checking out thesis examples won’t help you much. In such cases, PhD experts’ assistance will provide you with the much-needed marks.
Answer Annotated Bibliography Article 1 Citation Lu, T. H., Lin, H. C., Chen, R. R., & Chen, Y. L. (2013). Motion-Sensing Based Management System for Smart Context-Awareness Rehabilitation Healthcare. Advances in Internet of Things, 3(02), 1. Summary This paper is completely based on the motion sensing based management process and in which the author explained different balance exercis...
Read MoreAnswer Reflective journal The paper will evaluate different facts regarding why the communication skills is consideredas being one of the difficult processes especially for people from different cultures. As I belong to a different country which means a different culture, language, and a different living style therefore,I have facedcommunication problems during the first year of my college in Dublin. Due to this problem, I was unable to make ...
Read MoreAnswer: Importance of the project Business management is a set of doable that must be performed before initiating the project for achieving better results. This report will discuss about issues and problems that Coca Cola faces while performing business management. This report will also discuss about the opportunities Coca Cola will enjoy during their expansion. SMART objectives of Coca Cola is also discussed in this report. SMA...
Read MoreAnswer: Introduction 3D printing refers to the process of creating 3D solid objects from digital files. The development of a 3D printed object is usually obtained by use of the additive process. In this process an object is developed by laying down successive layers of material until the object is created. All this layers can be seen as individual thinly sliced horizontal cross-section of the eventual object. How 3D printer works The proces...
Read MoreAnswer: This Assessment Booklet provides you with information and your assessment tasks for this unit. A requirement of your qualification, from which the unit of competence is taken, is the application of the concepts you have been learning.The assessment activities are an important part of your course as they provide an opportunity to apply what you have been learning and they give both you and your trainer feedback on your progress. ...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I was very satisfied with the expert\'s work. I would recommend this site for anyone having trouble with an assignment or trouble meeting a deadline.
Australia
Will use again, sometimes I have issues getting the creative part of writing going and love being able to reach out to help with drafts
Australia
The best way to paraphrase is to change every few words in the sentence or paragraph I want to use in my assignment.
Australia
good and excellent I am satisfied with your work. All the work done on time. Experts are good.
Australia