country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Information Security: Biometric Authentication

tag 0 Download4 Pages 994 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Information Security for Biometric Authentication.

 

Answer:

Relevant Technologies in Biometric Authentication

The idea of biometric authentication is associated with an array of technologies that are either applicable or have already been applied in biometric authentication. One such technology is the finger print authentication technology, which involves either vision based pattern matching or detection of minutiae. Critical to the discussion is the fact that Gaur, Shah, and Thakker (2012) reveal that the technology relies on concepts such as the ultrasonic method, the thermal technique, capacitive sensors, and optical techniques. Another biometric technology is the facial recognition system, which recognizes of a person’s face from a digital image or recording. Like the fingerprint technology, the facial recognition technology relies on other concepts. Specifically, the technology relies on either the 2D or the 3D facial recognition concept in addition to the mapping of specific features such as the length of the jaw, nose width, and the distance between eyes.

Iris recognition relies on the uniqueness of every person’s iris for authentication. The technology may involve image segmentation, matching, acquisition, and localization. Another technology is the hand geometry and palm print, which utilizes features such as the length, width, and hand patterns for authentication (Deka, and Bakshi, 2015). Analogously, the hand vein-pattern recognition falls in the category of biometric systems and relies on image collected from the veins of an individual’s hand for recognition and authentication.  Another technology is retina recognition, which relies on the patterns of blood vessels that are visible and unique in every person’s eye. It is notable that the technology in question relies on an infrared light, the acquisition, matching, and presenting the outcome in form of a template. The last technology is the palm print and hand geometry recognition technology that relies on features such as the width and finger length, perimeter, and diameter of the palm for recognition (In Information Resources Management Association, 2016).  

Applications of the Technologies

For instance, the government is known to record the details of every individual within her authority in order to provide services to those individuals. As a result, citizens and tourists are always forced to carry identification documents because it is almost impossible to access certain services without the mentioned documents.  This is a disadvantage because identification documents are always misplaced or forgotten unexpectedly. Regardless, the emergence of biometric systems of authentication could provide a solution to the problem in question. This owes to the reality that biometric systems of identification could identify an individual based on the natural traits. For instance, the fingerprint biometric system requires and individual’s fingerprints to authenticate whether a person is who he/she claims to be. It follows that the government could benefit from implementing biometric authentication because the system will eliminate the use of identification documents.

Commercial organizations could also benefit from biometric authentication if the technology is applied appropriately. For instance, mobile phone manufacturers could implement biometric authentication in place of the traditional passwords used for mobile phone encryption. As evidenced, Trewin, Swart, Koved, Martino, Singh, and Ben-David (2012) reveal that biometric systems of authentication are memorable and fast to use than traditional passwords. The same authors also reveal that the technology ensures that only the user can use the mobile phone for improved security. In a different study, Jaina, Nandakumar, and Ross (2016) reveal that forensic experts could use biometric technology. Specifically, the   authors argue that the technology could be used to collect evidence for analysis and provide the analyzed evidence before a court of law. In short, biometric authentication could be applied in forensics, commercial areas, and government agencies.

 

Vague Areas of Biometric Authentication

Apparently, biometric authentication promises improvements in technology because it improves on the current mode of authentication. The technology is vague in certain aspects, which hampers its rapid development. Specifically, the technology is vague in some legal aspects such as the difference between personal data and sensitive data. This owes to the reality that use of biometric templates results in storage of data that is not required in the authentication system. It follows that some practitioners scare from implementing the technology citing that the technology is legally vague. Further, the accuracy of biometric authentication is in question because studies reveal that biometric authentication is insecure (Naveed, and Batool, 2015). Moreover, the security concerns associated with biometric issues raise eyebrows on whether the technology is safe for human consumption. It follows that studies should be conducted to clear such issues before the technology can be fully embraced.

Research Questions

Evidently, biometric authentication offers some promising prospects in technology, but implementation of the technology is currently hampered by vagueness in the technology and calls for research on the following questions.

  1. Can biometric system of authentication be restricted to the collection of data that is required for authentication?
  2. Can the accuracy of biometric systems of technology be improved?
  3. Can the security of biometric systems be improved?  
 

References

Doshi, A., and Nirgude, M. (2015). Biometric Recognition Techniques. International Journal of Advanced Research in Computer Networking, Wireless and Mobile Communications, 2(1): 143-152

Deka, G. C., and Bakshi, S. (2015). Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. Hershey, PA: Information Science Reference

In Information Resources Management Association. (2016). Biometrics: Concepts, methodologies, tools, and applications. Hershey: Information Science Reference

Jaina, K. A., Nandakumar, K., and Ross A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79: 80–105. Retrieved from https://biometrics.cse.msu.edu/Publications/GeneralBiometrics/JainNandakumarRoss_50Years_PRL2016.pdf

Naveed, G., and Batool, R. (2015). Biometric Authentication in Cloud Computing. Journal of  Biometrics and Biostatistics, 6(5): 1-3. Retrieved from https://www.omicsonline.org/open-access/biometric-authentication-in-cloud-computing-2155-6180-1000258.pdf

Trewin, S., Swart, C. Koved, L., Martino, J., Singh, K., and Ben-David, S. (2012). Biometric Authentication on a Mobile Device: A Study of User Effort, Error, and Task Disruption. Retrieved from https://researcher.ibm.com/researcher/files/us-kapil/ACSAC12.pdf

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Information Security: Biometric Authentication. Retrieved from https://myassignmenthelp.com/free-samples/information-security-biometric-authentication.

"Information Security: Biometric Authentication." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/information-security-biometric-authentication.

My Assignment Help (2018) Information Security: Biometric Authentication [Online]. Available from: https://myassignmenthelp.com/free-samples/information-security-biometric-authentication
[Accessed 02 April 2020].

My Assignment Help. 'Information Security: Biometric Authentication' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/information-security-biometric-authentication> accessed 02 April 2020.

My Assignment Help. Information Security: Biometric Authentication [Internet]. My Assignment Help. 2018 [cited 02 April 2020]. Available from: https://myassignmenthelp.com/free-samples/information-security-biometric-authentication.


Curating the most effective thesis paper is a tedious task. It requires dedicated effort and time. You need to have knowledge on the subject matter, accurate formatting style and citation of resources. Moreover, you need to know the trick of acquiring the validations without wasting much time. Experts at MyAssignmenthelp.com will not only show you how to write a thesis statement but will hand you the most compelling content. If you have no idea how to write a research paper, checking out thesis examples won’t help you much. In such cases, PhD experts’ assistance will provide you with the much-needed marks.

Latest Management Samples

BSBMKG609 Development Of Marketing Strategies For Vision Statement

Download : 0 | Pages : 7
  • Course Code: BSBMKG609
  • University: APEX Institute Of Education
  • Country: Australia

Answer: Introduction  The paper is a combination of two tasks. First part includes a strategic report on Houzit and the second part includes a marketing plan of Houzit. Systematic structuring is followed in both tasks. Organizational Overview Strategic Directions And Organizational Objectives Vision Statement The vision statement of Houzit is- To be one of the national retail homeware brands, emphasizing on the various home makers&rsqu...

Read More arrow

COMM1410 Management For Informal Lunch And Learn Sessions

Download : 0 | Pages : 2

Answer: To Claire Smithfield Subject: Lunch and Learn Session Dear Ma’am, It is in regard to the very recent decision of yours to have informal “Lunch and Learn” sessions. This idea is undoubtedly interesting and I would not decline it in any way. It would be very helpful in creating a critical awareness for the issues right at hand and would also reinforce the overall culture of our company. I believe that these sessions...

Read More arrow

NIT2222 Wide Area Network Technologies For Address Planning

Download : 0 | Pages : 3
  • Course Code: NIT2222
  • University: Victoria University
  • Country: Australia

Answer: Address Planning Workout of IPv6 subnet for company HQ and each branch from the address block AB12:1640::/51 AB12:1640:0:2000::/51 AB12:1640:0:4000::/51 AB12:1640:0:6000::/51 AB12:1640:0:8000::/51 AB12:1640:0:A000::/51 AB12:1640:0:C000::/51    Address assignment table for the company network HQ Router Subnet ::/51 Network AB12:1640::/51 Default- Gateway AB12:1640::1 ...

Read More arrow Tags: Australia Bexley Management education University of New South Wales 

BUS353e Project Management For Cash Flow And NPV Calculation

Download : 0 | Pages : 6

Answer: Section 1 Question 1 The project classification and consideration for classification are shown in the following table. Project Classification Consideration Project A Strategic The new service will significantly enhance the strategic direction of the polyclinic Project B Operational This project will enhance the operations of the polyclinic Project C Compliance ...

Read More arrow

B01SYAD310 Systems Analysis And Design

Download : 0 | Pages : 10

Answer: System requirements for Smith Antiques System requirement level includes functional and non-functional requirement type. It is important for every system to ensure proper working. The Smith antique needs to have proper management information system that will ensure managing the details. Details regarding every customer needs to be managed properly. The newly developed management information system will also help in understanding the c...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,240,264

Orders

4.9/5

Overall Rating

5,067

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

230 Order Completed

97% Response Time

Liya Han

Master Of Science in Geotechnical Engineering (MSc Geotec)

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

93 Order Completed

100% Response Time

Jackson Mitchell

MiM (Masters in Management) in Supply Chain Management

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

154 Order Completed

97% Response Time

Harold Alderete

PhD in Economics

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

expert working good with ratio analysis i got full marks for ratio but overall good presentation.

flag

User Id: 207116 - 02 Apr 2020

Australia

student rating student rating student rating student rating student rating

excellent work by tutor and quality of good work excellent work by tutor and quality of good work excellent work by tutor and quality of good work excellent work by tutor and quality of good work excellent work by tutor and quality of good work

flag

User Id: 264013 - 02 Apr 2020

Australia

student rating student rating student rating student rating student rating

Brilliant work, paid attention to every details, And submitted on time for review.

flag

User Id: 338016 - 02 Apr 2020

Australia

student rating student rating student rating student rating student rating

The report was exceptional. Thank you for helping me with this assignment, and I am very satisfied with the result. The content was exceptional and my grade was exactly what I needed, the writer was very on point and finished my report in a timely ma...

flag

User Id: 262907 - 02 Apr 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?