INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15
ABSTRACT: In order to serve as a primer on this topic, this essay provides an outline of the major issues surrounding biometric security technologies. Compared to conventional ways of recognizing persons, biometric can provide more security and ease. Even if we don't wish to switch to a biometric system from a traditional one (such as a password or mobile token), we are undoubtedly potential consumers of these technologies, which will even be required for new passport models. Knowing the potential of biometric security technologies is helpful for this reason. A new era of engineering science has emerged in recent years, and its products are anticipated to spark the growth of a sizable bazaar in the near future. It has been referred to as "biometric." The creators of this novel field hope to develop methods that would allow the identification of a person based on their "biological" characteristics, such as their vocal tone, diminuendos in their movements, facial features, physical characteristics of other body parts, optic nerve pattern, or sword lily pattern. Human beings have been created by nature with unique appearances that can vary from person to person. Biometric technology uses this characteristic to positively identify each person. Biometric refers to a person's subconscious records based on their physical or social features. For a variety of reasons, this method of identification was designed to make several improvements over antiquated procedures including ID cards (tokens) or PIN numbers (passwords). (i) The human being to be identified is mandatory to physically exist at the point of identification; (ii) Identification grounded on the biometric methods evades the essential to recall a password or carry a token. Through the distended addition of computers and the Internet into our ordinary lives, it is essential to protect penetrating and personal data. By exchanging PINs (or using biometric in totaling to PIN), biometric methods can theoretically avoid illegal access to ATMs, cellular mobiles, workstations, and PC networks. Opposing biometric traits and tokens like permits and driver's licenses may be forged or missing.
Keywords:
-
Cite Article:
"Biometrics Security System", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.8, Issue 3, page no.1374 - 1378, March-2023, Available :http://www.ijsdr.org/papers/IJSDR2303231.pdf
Downloads:
000337356
Publication Details:
Published Paper ID: IJSDR2303231
Registration ID:204959
Published In: Volume 8 Issue 3, March-2023
DOI (Digital Object Identifier):
Page No: 1374 - 1378
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631
Facebook Twitter Instagram LinkedIn