The idea of biometric authentication is associated with an array of technologies that are either applicable or have already been applied in biometric authentication. One such technology is the finger print authentication technology, which involves either vision based pattern matching or detection of minutiae. Critical to the discussion is the fact that Gaur, Shah, and Thakker (2012) reveal that the technology relies on concepts such as the ultrasonic method, the thermal technique, capacitive sensors, and optical techniques. Another biometric technology is the facial recognition system, which recognizes of a person’s face from a digital image or recording. Like the fingerprint technology, the facial recognition technology relies on other concepts. Specifically, the technology relies on either the 2D or the 3D facial recognition concept in addition to the mapping of specific features such as the length of the jaw, nose width, and the distance between eyes.
Iris recognition relies on the uniqueness of every person’s iris for authentication. The technology may involve image segmentation, matching, acquisition, and localization. Another technology is the hand geometry and palm print, which utilizes features such as the length, width, and hand patterns for authentication (Deka, and Bakshi, 2015). Analogously, the hand vein-pattern recognition falls in the category of biometric systems and relies on image collected from the veins of an individual’s hand for recognition and authentication. Another technology is retina recognition, which relies on the patterns of blood vessels that are visible and unique in every person’s eye. It is notable that the technology in question relies on an infrared light, the acquisition, matching, and presenting the outcome in form of a template. The last technology is the palm print and hand geometry recognition technology that relies on features such as the width and finger length, perimeter, and diameter of the palm for recognition (In Information Resources Management Association, 2016).
For instance, the government is known to record the details of every individual within her authority in order to provide services to those individuals. As a result, citizens and tourists are always forced to carry identification documents because it is almost impossible to access certain services without the mentioned documents. This is a disadvantage because identification documents are always misplaced or forgotten unexpectedly. Regardless, the emergence of biometric systems of authentication could provide a solution to the problem in question. This owes to the reality that biometric systems of identification could identify an individual based on the natural traits. For instance, the fingerprint biometric system requires and individual’s fingerprints to authenticate whether a person is who he/she claims to be. It follows that the government could benefit from implementing biometric authentication because the system will eliminate the use of identification documents.
Commercial organizations could also benefit from biometric authentication if the technology is applied appropriately. For instance, mobile phone manufacturers could implement biometric authentication in place of the traditional passwords used for mobile phone encryption. As evidenced, Trewin, Swart, Koved, Martino, Singh, and Ben-David (2012) reveal that biometric systems of authentication are memorable and fast to use than traditional passwords. The same authors also reveal that the technology ensures that only the user can use the mobile phone for improved security. In a different study, Jaina, Nandakumar, and Ross (2016) reveal that forensic experts could use biometric technology. Specifically, the authors argue that the technology could be used to collect evidence for analysis and provide the analyzed evidence before a court of law. In short, biometric authentication could be applied in forensics, commercial areas, and government agencies.
Apparently, biometric authentication promises improvements in technology because it improves on the current mode of authentication. The technology is vague in certain aspects, which hampers its rapid development. Specifically, the technology is vague in some legal aspects such as the difference between personal data and sensitive data. This owes to the reality that use of biometric templates results in storage of data that is not required in the authentication system. It follows that some practitioners scare from implementing the technology citing that the technology is legally vague. Further, the accuracy of biometric authentication is in question because studies reveal that biometric authentication is insecure (Naveed, and Batool, 2015). Moreover, the security concerns associated with biometric issues raise eyebrows on whether the technology is safe for human consumption. It follows that studies should be conducted to clear such issues before the technology can be fully embraced.
Evidently, biometric authentication offers some promising prospects in technology, but implementation of the technology is currently hampered by vagueness in the technology and calls for research on the following questions.
Doshi, A., and Nirgude, M. (2015). Biometric Recognition Techniques. International Journal of Advanced Research in Computer Networking, Wireless and Mobile Communications, 2(1): 143-152
Deka, G. C., and Bakshi, S. (2015). Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. Hershey, PA: Information Science Reference
In Information Resources Management Association. (2016). Biometrics: Concepts, methodologies, tools, and applications. Hershey: Information Science Reference
Jaina, K. A., Nandakumar, K., and Ross A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79: 80–105. Retrieved from https://biometrics.cse.msu.edu/Publications/GeneralBiometrics/JainNandakumarRoss_50Years_PRL2016.pdf
Naveed, G., and Batool, R. (2015). Biometric Authentication in Cloud Computing. Journal of Biometrics and Biostatistics, 6(5): 1-3. Retrieved from https://www.omicsonline.org/open-access/biometric-authentication-in-cloud-computing-2155-6180-1000258.pdf
Trewin, S., Swart, C. Koved, L., Martino, J., Singh, K., and Ben-David, S. (2012). Biometric Authentication on a Mobile Device: A Study of User Effort, Error, and Task Disruption. Retrieved from https://researcher.ibm.com/researcher/files/us-kapil/ACSAC12.pdf
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Information Security: Biometric Authentication. Retrieved from https://myassignmenthelp.com/free-samples/information-security-biometric-authentication.
"Information Security: Biometric Authentication." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/information-security-biometric-authentication.
My Assignment Help (2018) Information Security: Biometric Authentication [Online]. Available from: https://myassignmenthelp.com/free-samples/information-security-biometric-authentication
[Accessed 02 April 2020].
My Assignment Help. 'Information Security: Biometric Authentication' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/information-security-biometric-authentication> accessed 02 April 2020.
My Assignment Help. Information Security: Biometric Authentication [Internet]. My Assignment Help. 2018 [cited 02 April 2020]. Available from: https://myassignmenthelp.com/free-samples/information-security-biometric-authentication.
Curating the most effective thesis paper is a tedious task. It requires dedicated effort and time. You need to have knowledge on the subject matter, accurate formatting style and citation of resources. Moreover, you need to know the trick of acquiring the validations without wasting much time. Experts at MyAssignmenthelp.com will not only show you how to write a thesis statement but will hand you the most compelling content. If you have no idea how to write a research paper, checking out thesis examples won’t help you much. In such cases, PhD experts’ assistance will provide you with the much-needed marks.
Answer: Introduction The paper is a combination of two tasks. First part includes a strategic report on Houzit and the second part includes a marketing plan of Houzit. Systematic structuring is followed in both tasks. Organizational Overview Strategic Directions And Organizational Objectives Vision Statement The vision statement of Houzit is- To be one of the national retail homeware brands, emphasizing on the various home makers&rsqu...Read More
Answer: To Claire Smithfield Subject: Lunch and Learn Session Dear Ma’am, It is in regard to the very recent decision of yours to have informal “Lunch and Learn” sessions. This idea is undoubtedly interesting and I would not decline it in any way. It would be very helpful in creating a critical awareness for the issues right at hand and would also reinforce the overall culture of our company. I believe that these sessions...Read More
Answer: Address Planning Workout of IPv6 subnet for company HQ and each branch from the address block AB12:1640::/51 AB12:1640:0:2000::/51 AB12:1640:0:4000::/51 AB12:1640:0:6000::/51 AB12:1640:0:8000::/51 AB12:1640:0:A000::/51 AB12:1640:0:C000::/51 Address assignment table for the company network HQ Router Subnet ::/51 Network AB12:1640::/51 Default- Gateway AB12:1640::1 ...Read More
Answer: Section 1 Question 1 The project classification and consideration for classification are shown in the following table. Project Classification Consideration Project A Strategic The new service will significantly enhance the strategic direction of the polyclinic Project B Operational This project will enhance the operations of the polyclinic Project C Compliance ...Read More
Answer: System requirements for Smith Antiques System requirement level includes functional and non-functional requirement type. It is important for every system to ensure proper working. The Smith antique needs to have proper management information system that will ensure managing the details. Details regarding every customer needs to be managed properly. The newly developed management information system will also help in understanding the c...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
expert working good with ratio analysis i got full marks for ratio but overall good presentation.
excellent work by tutor and quality of good work excellent work by tutor and quality of good work excellent work by tutor and quality of good work excellent work by tutor and quality of good work excellent work by tutor and quality of good work
Brilliant work, paid attention to every details, And submitted on time for review.
The report was exceptional. Thank you for helping me with this assignment, and I am very satisfied with the result. The content was exceptional and my grade was exactly what I needed, the writer was very on point and finished my report in a timely ma...