hi this is my file and its link with the past Order No : 33100the abstract is sameMy Topic Name is "Biometric authentication"

1 answer below »
Answered Same DaySep 14, 2020ITC595Charles Sturt University

Answer To: hi this is my file and its link with the past Order No : 33100the abstract is sameMy Topic Name is...

Ankit answered on Sep 18 2020
157 Votes
Student_Id
                Student_name
                Biometric authentication
Abstract
Today Biometric authentication is very important part of information technology to protect the system from security threats. There is great advancement in information technology that makes security of network or system an indivisible part of IT. Biometric authentication is the system in which the au
thentication of human is performed in the light of a component vector got from physiological and behavioural features of a person by utilizing biometrics innovation.
The purpose of this research document is to take overview of Biometric authentication and to focus on relevant technologies. The research paper also discusses security challenges or issues in all the emerging biometric technologies and future trends in biometric technologies in this area.
Keyword
Biometric authentication, Biometric technologies, fingerprint recognition, Iris recognition, Voice recognition
Introduction
Biometric authentication is a digitalized technique that avoids the assaults on network or system by authenticating the people which depends on different features of human body such as face, eyes, voice, hands etc. Nowadays security is enormous challenge everywhere so keeping in mind the end goal to shield information from steal or copyright. To guarantee and provide security of data, identity confirmation is conveyed for every individual who wants to access or retrieve that data in an organization. For example, Iris recognition has been utilized in various expansive air terminals for long time. (Hemidal)
The aim of this paper is to take overview of Biometric authentication and to explain different Biometric technologies. This document also focuses on security issues in all the emerging biometric technologies and future trends in biometric technologies in this area.
Biometric authentication system and Technologies
Biometric authentication system is a digitalized technique that relies upon various physical characteristics of human, for instance, perceiving of human voice, fingerprints, eye perceiving, assorted facial etc. The diverse characteristics of physiological biometric structure contain condition of body, weight, height, eye shape, the case of face, the skin or thumbs shape or fingerprints. The diverse characteristics of behavioural biometric system contain perceiving of human voice, human also has the keystroke plan and besides fuses the check and mark. (Securecomm 2017)
There are various kind of biometric authentication technologies for example “fingerprint recognition, voice recognition, iris recognition, hand geometry etc.”
Fingerprint recognition: Fingerprint recognition is technique in which human is authenticated that depend upon on their finger prints. As we all know that every human has unique fingerprint. This technology is used most of time due to easy deployment. The best conduct through which this technology was used to encourage hacker’s analysis, the recognition of fingers is developed by Sir Edward Henry in London, England during the year1900 as a way to deal with hackers. (Woodford 2018)
Fingerprint Scanning framework is very protective and innovative which is easy to deploy. This Scanning framework locks and unlock the gadgets due to no requirement to remind complex passwords.
Techniques and technologies used for fingerprint
The basic techniques are used for scanning fingerprints. The optical scanner works by utilizing dull a marvellous beam on unique finger prints and catching what is sufficiently a computerized picture. If person anytime computerized replicated their finger; person may see presently with respect to it is running. Regularly giving a...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here