SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 2, February 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 911
Biometric System and Recognition:
Authentication and Security Issues
Shweta Naik
Department of MCA SEM VI, YMT College of Management,
Institutional Area, Kharghar, Navi Mumbai, Maharashtra, India
ABSTRACT
In recent days Biometric has become the most popular technique used. The
purpose of biometric systems is used to achieve high security, authentication
and many more. Through this scheme or technique itensuresthattheservices
are accessed only by the authorized persons. This system works effectively
and is user friendly. Biometric systems are progressively exchanging the
ongoing password and authentication (token based) system. Authentication
and Security recognition are the two most essential characteristic to consider
in scheming a biometric system. In this paper, a broad review is presented to
illuminate on the latest technologies in the study of fingerprint-based
biometric covering these two characteristic with a view to improving system
security and authentication recognition.
KEYWORDS: Biometric system, Security, Authentication, Recognition,
Authorization
How to cite this paper: Shweta Naik
"Biometric System and Recognition:
Authentication and Security Issues"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-2, February
2020, pp.911-915, URL:
www.ijtsrd.com/papers/ijtsrd30195.pdf
Copyright © 2019 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
I. INRODUCTION
Biometric is the particular phrase for human body
measurements and calculations. It refers to the function
related to human quality. Biometric are sensual or related
human attributes to that can be used to numerically
distinguish a individual to permit access to systems, devices
or data. With different biometric scanners on phones and
other electronic devices are universal or familiar and used
frequently, as well as a increasing the number of services
calling for high level security and good experience of
customers, usual methods of authentication (e.g. passwords
and PIN s) are progressively being supplant with biometric
technologies.
Passwords have some obvious or open drawbacks—they
could be sneak, forgotten, or lost. In comparison, biometric
offer an substitute or an alternative solution to the task of
personal or public authentication or identification based on
biometric features. To be unnoticed or lost is not possible,
and unlike passwords, they are hard toform.Therearesome
biometric features that can be defined for an individual.
Examples: fingerprint, finger-vein, iris, face, voice,andmany
more.
Generally, a biometric system consists of four modules
namely sensor module, feature extraction module, template
database, and matching module. Specifically, the sensor
module acquires the biometric image.
The use of biometric can build up the security level in
authentication. User authentication is the main step for
securing any information in the computer system. With
different biometric devices such as scanners on smart
phones, desktops, laptops and other devices has becoming
more frequent and dominant and also has increased the
number of services for more security and customer
experience, and other methods for authentication like
password, PINs are increasingly displace by the biometric
technologies.
A set features are taken out from the biometric image by the
feature extraction module. Organized features offerings are
stored in the template database as template data. The
matching module is responsible forexaminingthe queryand
template data to check whether the meet or not.
Types of Biometrics:
A biometric identifier is one that is relatedtointegral human
characteristics. They fall into two categories: physical
identifiers and behavioral identifiers.Physical identifiers are
those, for the most part, fixed, rigid and device free.
Fingerprints: Fingerprint scanners have become
omnipresent in recent years due to their distributed
deployment on smart-phones. Any device that can be
touched or which one can feel while using it, such as a phone
screen, computer mouse keyword or touchpad, or a door
IJTSRD30195
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 912
panel, has the potency to become an easy and favorable
fingerprint scanner.
Photo and video: If a device is provided with a camera, it
can br easy to use for authentication purpose. Facial
recognition and retinal scans are two common approaches.
Voice: Voice-based digital instrument and telephone-based
portals are already using voice recognition systems to
identify and verify users and authenticate the customers.
Signature: Digital signature scanners are already in
distributed among different places such as in checkouts and
in banks and are a good choice for environment whereusers
and customers are already assumes to have the signature of
their names.
DNA: Today, DNA scans are used mainly in law enforcement
to determine the suspects -- and also in movies. In practice,
DNA combinations has been too slow for common use
Face Recognition: The anatomy facial features or patterns
are used for authntication and recognition of an person's
identity.
II. LITERATURE REVIEW:
Biometric based security, such as fingerprintauthentication,
is proven to be both more protected and handy than
passwords,makingfingerprintsensingmaking progressively
common and product differentiating feature in smart
phones, tablets and PCs.However,fingerprintauthentication
also increased security concerns that can be addressed with
protections purpose built for biometrics. Synaptic s helps
ensure biometric data protection through the Sentry-point
Security Suite of features and architectures that meets or
suits the full range of market needs.
Spoofing attacks to the user interface (the sensor module)
are mostly because of the presenting the fake biometric
trait.[4]. A different forms of fingerprint sensors are
approved to see if they can reject a fake fingerprint film or
not. The test results show that the fake finger films are
accepted by most of the approved sensors in[4]. In recent
years, energetic work has been done in the research, which
is used to detect whether the existing feature is from a live
human being or not. The security vulnerabilities of a
biometric system were underlined using threat models [6].
The security and privacy about the biometric authentication
raises need to be addressed. It is analyzed that automatic
fingerprint recognition is the best candidate biometric
technology for explosives securityfromantechnical analysis
of the requirements: security,usability,toughness,size,form
factor, privacy andoperational temperaturerangearesolved
in this [7].
Fingerprint scanner is used with great extent in today‟s
attendance system. It provide huge security. Padma Rekha
[8] proposed the attendance is handled in every institution
or organization. In the old, the attendance is handled in
written work. In this paper, to put off the human work, the
automatic process is been maintained.
Kamta Nath Mishra, [6] have concisely explained about the
thumbprint based identificationsystemusedwiththehelpof
soft computing technique. Dr. Naik and Patil [9] uncovered
the biometric authentication is the most trusty method for
authenticating a user based on his/her thumb impression.
Now in modern approach, live fingerprint readers are used.
These are based on optical, thermal, capacitive, silicon or
ultrasonic principles [10,11,12]thevariancebetweenvalley
and rigid.
When it is time arises to use the biometric authentication,
the degree of security is concerned. In this paper, we will
discuss about recent research and insights into security
authentication and recognition accuracy. There are various
factors with the help of which we can judge the performance
of any biometric authentication techniques.
III. RESEARCH METHODOLOGY:
A. Biometric Authentication:
Biometric authentication is used in computer science as a
form used for recognition and for controlling the access. It is
also used for recognizing a single user or for a groups that
are under observation. The use of biometric can build upthe
security level in authentication. User authentication is the
main step for securing any information in the computer
system. With different biometricdevicessuchasscanners on
smart phones, desktops, laptops and other devices has
becoming more frequent and dominant and also has
increased the number of services for more security and
customer experience, and other methods for authentication
like password, PIN s are increasingly displace by the
biometric technologies. Authentication is done through
number of measures like Password,PIN,IDCardsetc.Misuse
of this measures are also increasing to a higher level
nowadays. It is an essential an most important step which
restricts the access to the critical data or personal
information only to the legislative users.
B. Authentication Process :
Authentication in biometric are carried out in twostagesthe
enrolment stage and verification stage. Fingerprint
recognition as an example. In the enrolment stage, a user
presents their finger to the fingerprint sensor and a
fingerprint image is generated bythesensor module.Certain
features of the generated fingerprint image are taken out
and further they are passed forward to generate template
data for the purpose of comparison in the verification stage.
In the second stage of verification, the fingerprint image of a
query is collected by the sensor module.
The image or photo of the query fingerprint image goes
through the similar process as in the enrolment stage, so as
to obtain query data. The querydata arethencompared with
the template data so that a similar result is obtained.
Compared with other biometric methods like (e.g.,
fingerprint, face, iris, voice, hand geometry) fingerprint-
based recognition systems are influenced more largely and
deployed more widely. Fingerprint recognition considerthe
patterns found on a fingertip. The use of fingerprints as a
biometric is both the oldest way of computer-aided
recognition, and the latest technology used most widely
established today. It has been compute that the probability
to find two persons with the same fingerprint is one in one
billion.
According to the recognition accuracy of fingerprint-based
recognition systems is very high but the general open public
showing medium acceptability to fingerprint accquring
system. This is why fingerprint biometric systems occupy a
high market shares and have been adopted and used in
various applications.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 913
Fig1: Two stages of Biometric Authentication (enrolment and verification).
Although fingerprint recognition shows significant strength and a rich and a well-heeled future, it has some unsolved issues,
such as inadequate accuracy and security concerns. In this paper, a broad review is been presented to clarify on the latest
development in the study of fingerprint-based biometric they are focused on two important aspects—authentication and
recognition accuracy.
Fig2 [13]: Analysis of Fingerprint
Spoofing attacks to the user interface (the sensor module) are mostly because of the presenting the fake biometric trait. Since
biometric traits are not secret or hidden, an adversary can intrude into the system with a fake trait (e.g., artificial fingerprint,
face mask or through other things) to spoof the biometric system if the systemisunabletodifferentiateorrecognizebetweena
fake and a genuine biometric trait. A number of fingerprint sensors are tested to see if they can reject a fake fingerprint filmor
not. The test results show that the fake finger films are accepted by most of the tested sensors.
C. Liveness Detection:
Liveness detection one of the technique is useful not only for authentication but also for identification of proofing. Where
biometric authentication involves verification that the user or an individual is the same identical person who initially at the
beginning enrolled, biometric identity proofing can be performed as part of an organizational socialization process to verify
that the person or an applicant is in fact a actual person. An example is using a mobile banking application for applying for a
new account. The applicant is not known to the bank, so liveness detection technique can be used to confirm and sustain that
the applicant is not trying to open a fraudulent which is illegal account.
In biometric systems, the purpose of liveness testing is to determine whether the biometric being captured of an person is an
actual measurement from the authorized legitimate, live personwhoisphysicallypresentatthetimeofcapturethefingerprint.
While fingerprint systems may have an superior performance and improve the security.
Fig3 [14]: Liveness Detection Process
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 914
Former studies have shown that it is not difficult to make moldsofpresentpotential fingerprintsleftbyauthorized usersandto
create fake fingers made from Play-Doh, gelatin, and silicone like other materials to fool a variety of collections of fingerprint
scanners, termed spoofing. Liveness detection deflate the risk of spoofing by demanding for a livenesssignature,inadditionto
matched with biometric information.Methodscanbedividedintotwocategories:hardwareandsoftwarecategories.Hardware
methods which includes various estimations like monitoring oxygen level, (ECG), or odor (fragrance), while software based
measurements uses additional processing of the biometricinformationitselftoSegregatelivenesssignatureslikemoistureand
distorting.
While liveness algorithm makes spoofing more difficult and challenging, they need to be considered as componentsofvarious
biometric system, which bring with it performance characteristics along with factors such as ease of use (the way of using it),
collectability (collected data), unviersality, spoof-ability, performance, and in some of cases, even uniqueness. No system is
perfect in its potentiality to prevent spoof attacks. However, thelivenessalgorithmcan reducethevulnerabilitytodecreasethe
risk of spoofing
The main efforts of this paper are highlighted as follows:
1. Security and recognition accuracy, despite being two most important aspects in biometric system design, have not been
fully satisfied the study simultaneously. Prior to this paper, no research work hasdeliveredorpresenteda comprehensive
review considering both of them. In this paper, the recent research and insights into securityandrecognitionaccuracyare
completely analyzed, examined and discussed.
2. Based on a careful analysis, limitations of existing research are discussed and suggestions for the future work has been
given and to overcome with the limitations are provided.
3. The two most critical attacks to biometric systems have been discussed in this paper. How to resolve the challenges, so as
to defend or justify the biometric systems, is the focus of current and future biometric security research.
4. Most existing methods, either with or without template protection, were set forward for the ideal situations.Inthis paper,
we underline the importance of considering recognition accuracy under non-ideal conditions. Our analysis is backed by
solidified evidence and with elaborated comparison.
Fig4 [14] Example of liveness Detection Fingerprint
IV. CONCULSION:
This paper gives a wide review of two significant measures
for fingerprint-based biometric systems that is,
authentication and recognition accuracy. In regards to
authentication, we have analyzed the method of liveness
detection. Most currently available methods, either with or
without template protection, were set forward for the ideal
situations. In this paper, we underline the importance of
considering recognition accuracy under non-ideal
conditions. Our analysis is backed by solidifiedevidenceand
with elaborated comparison. Since 2009, the fingerprint
Liveness Detection was aimed to allow the research
companies sensible and individual assessment in anti
spoofing algorithms and systems. Based on a careful
analysis, limitations of existing research are discussed and
suggestions for the future work has been given and to
overcome with the limitations are provided.
V. FUTURE ENHANCEMMENT:
In our future work, biometric technologies like facial
scanning, voice and iris recignition, fingerprint scanningcan
be more popularly because ofwhichauthentication becomes
much more convenient and secure for the data or
information in different organizations and smart phone.
More realistic methods and tenchology in future canbeused
for the security purpose of authentication in biomerics
systems.
VI. REFERENCE:
[1] https://www.google.com/search?tbm=isch&sxsrf=ACY
BGNSdHd5S8CnLDsMryFaT6vR6JW_mcg:1576511105
164&q=+biometric+authentication+diagram&chips=q:
biometric+authentication+diagram,g_1:identification&
usg=AI4_-kQN22p03Sx-
tc_YU7ei6F_rGghyXw&sa=X&ved=0ahUKEwizm6HDwb
rmAhUzguYKHVR5BT4Q4lYIKigA&biw=1242&bih=56
8&dpr=1.1#imgrc=8ht8EGwm6csK5M:
[2] https://scholar.google.co.in/scholar?q=Security+and+
Accuracy+of+Fingerprint-
Based+Biometrics:+A+Review&hl=en&as_sdt=0&as_vis
=1&oi=scholart
[3] https://www.researchgate.net/figure/Eight-possible-
attack-points-to-a-typical-biometric-authentication-
system-adapted-from_fig2_330711092
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 915
[4] Kang, H.; Lee, B.; Kim, H.; Shin, D.; Kim, J. A study on
performance evaluation of the liveness detection for
various fingerprint sensor modules. In Proceedings of
the International Conference onKnowledge-Basedand
Intelligent Information and Engineering Systems,
Oxford, UK, 3–5 September 2003; pp. 1245–1253
[5] https://www.researchgate.net/publication/33071109
2_Security_and_Accuracy_of_Fingerprint-
Based_Biometrics_A_Review
[6] Security Vulnerabilities Against Biometric System
Mahesh Joshi1 Bodhisatwa Mazumdar1SomnathDey1
{phd1701101004, bodhisatwa, somnathd}@iiti.ac.in1
Indian Institute of Technology Indore, India
[7] A Study of Biometric Approach Using Fingerprint
Recognition Ravi Subban and Dattatreya P. Mankame.
[8] P. Padma Rekha, D. Amudhan, V. Narendhiran, N.
Pavithra, S. Ramya, “AUTOMATIC ATTENDANCE
MONITORING SYSTEM”.
[9] Dr. Naik, P. G. and Patil, M. B, “BIOMETRIC DATA
ANALYSIS OF STUDENT ATTENDANCE SYSTEM AT
CSIBER”, International Journal of Current Research,
8(2), 26751-26762, 2016.
[10] A. Ross, S. Dass, and A. K. Jain, “A deformable model for
fingerprint matching”, Journal of Pattern Recognition,
Elsevier, Volume 38, No. 1, Jan. 2005, pp. 95–103.
[11] T. Matsumoto, H. Hoshino, K. Yamada, and S. Hasino,
“Impact of artificial gummy fingers on fingerprint
systems”, In Proc. of SPIE, Volume 4677, Feb. 2002, pp.
275–289.
[12] A. K. Jain, A. Ross, and S. Pankanti, “Biometric: A Tool
for Information Security”, IEEE Trans. Information
Forensics and Security, Volume 1, No. 2, Jun. 2006, pp.
125–144.
[13] https://www.semanticscholar.org/paper/Review-of-
the-Fingerprint-Liveness-Detection-2009-Ghiani-
Yambay/086b02da66d0f0128ec721974faad97945274
9cd
[14] https://www.intechopen.com/books/advanced-
biometric-technologies/liveness-detection-in-
biometrics
Ad

More Related Content

What's hot (19)

Final report
Final reportFinal report
Final report
Pranjul Mishra
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
Palak Pandoh
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET Journal
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
Siddharth Kishan
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
inventionjournals
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Harikrishna Patel
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
Jorge Sebastiao
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
Mumbai Academisc
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Biometric
 Biometric Biometric
Biometric
apekdm_91
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
Lavanya Lakshman
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
Ned Hayes
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
proma_goswami
 
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final versionIJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
Hagai Aronowitz
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
Palak Pandoh
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET Journal
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
Siddharth Kishan
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
inventionjournals
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Harikrishna Patel
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
Jorge Sebastiao
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
Mumbai Academisc
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
Ned Hayes
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
proma_goswami
 
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final versionIJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
Hagai Aronowitz
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
 

Similar to Biometric System and Recognition Authentication and Security Issues (20)

IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
Biometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdf
Biometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdfBiometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdf
Biometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdf
Delimp Technology
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
Waseelsultan
 
Using AI Chatbots to Drive Intelligent Customer Support Solutions: Amir Parek...
Using AI Chatbots to Drive Intelligent Customer Support Solutions: Amir Parek...Using AI Chatbots to Drive Intelligent Customer Support Solutions: Amir Parek...
Using AI Chatbots to Drive Intelligent Customer Support Solutions: Amir Parek...
amir parekh
 
Amir Parekh on Biometric Security Beyond Facial and Fingerprints: A Proof of ...
Amir Parekh on Biometric Security Beyond Facial and Fingerprints: A Proof of ...Amir Parekh on Biometric Security Beyond Facial and Fingerprints: A Proof of ...
Amir Parekh on Biometric Security Beyond Facial and Fingerprints: A Proof of ...
amir parekh
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
IRJET Journal
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
IJARIIT
 
Multi-factor Implicit Biometric Authentication
Multi-factor Implicit Biometric AuthenticationMulti-factor Implicit Biometric Authentication
Multi-factor Implicit Biometric Authentication
Jigisha Aryya
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
IRJET Journal
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital Trust
Bahaa Al Zubaidi
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
Enterprise Wired
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
Jenna Murray
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
presentation on Biometric authentication.ppsx
presentation on Biometric authentication.ppsxpresentation on Biometric authentication.ppsx
presentation on Biometric authentication.ppsx
sagarskp108
 
Biometrics
BiometricsBiometrics
Biometrics
Priyanka Sharma
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
Biometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdf
Biometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdfBiometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdf
Biometrics Authentication_ Revolutionizing UX Design for Enhanced Security.pdf
Delimp Technology
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
Waseelsultan
 
Using AI Chatbots to Drive Intelligent Customer Support Solutions: Amir Parek...
Using AI Chatbots to Drive Intelligent Customer Support Solutions: Amir Parek...Using AI Chatbots to Drive Intelligent Customer Support Solutions: Amir Parek...
Using AI Chatbots to Drive Intelligent Customer Support Solutions: Amir Parek...
amir parekh
 
Amir Parekh on Biometric Security Beyond Facial and Fingerprints: A Proof of ...
Amir Parekh on Biometric Security Beyond Facial and Fingerprints: A Proof of ...Amir Parekh on Biometric Security Beyond Facial and Fingerprints: A Proof of ...
Amir Parekh on Biometric Security Beyond Facial and Fingerprints: A Proof of ...
amir parekh
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
IRJET Journal
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
IJARIIT
 
Multi-factor Implicit Biometric Authentication
Multi-factor Implicit Biometric AuthenticationMulti-factor Implicit Biometric Authentication
Multi-factor Implicit Biometric Authentication
Jigisha Aryya
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
IRJET Journal
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital Trust
Bahaa Al Zubaidi
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
Enterprise Wired
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
Jenna Murray
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
presentation on Biometric authentication.ppsx
presentation on Biometric authentication.ppsxpresentation on Biometric authentication.ppsx
presentation on Biometric authentication.ppsx
sagarskp108
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Ad

More from ijtsrd (20)

A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its CausesA Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
ijtsrd
 
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
ijtsrd
 
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
ijtsrd
 
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
ijtsrd
 
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
ijtsrd
 
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
ijtsrd
 
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
ijtsrd
 
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
ijtsrd
 
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra StateManpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
ijtsrd
 
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
ijtsrd
 
Automatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoTAutomatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoT
ijtsrd
 
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
ijtsrd
 
The Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of OdishaThe Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of Odisha
ijtsrd
 
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
ijtsrd
 
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
ijtsrd
 
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
ijtsrd
 
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky DayPerformance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Uterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic PerspectivesUterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic Perspectives
ijtsrd
 
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its CausesA Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
ijtsrd
 
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
ijtsrd
 
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
ijtsrd
 
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
ijtsrd
 
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
ijtsrd
 
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
ijtsrd
 
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
ijtsrd
 
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
ijtsrd
 
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra StateManpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
ijtsrd
 
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
ijtsrd
 
Automatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoTAutomatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoT
ijtsrd
 
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
ijtsrd
 
The Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of OdishaThe Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of Odisha
ijtsrd
 
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
ijtsrd
 
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
ijtsrd
 
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
ijtsrd
 
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky DayPerformance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Uterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic PerspectivesUterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic Perspectives
ijtsrd
 
Ad

Recently uploaded (20)

Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
Operations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdfOperations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdf
Arab Academy for Science, Technology and Maritime Transport
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 

Biometric System and Recognition Authentication and Security Issues

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 2, February 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 911 Biometric System and Recognition: Authentication and Security Issues Shweta Naik Department of MCA SEM VI, YMT College of Management, Institutional Area, Kharghar, Navi Mumbai, Maharashtra, India ABSTRACT In recent days Biometric has become the most popular technique used. The purpose of biometric systems is used to achieve high security, authentication and many more. Through this scheme or technique itensuresthattheservices are accessed only by the authorized persons. This system works effectively and is user friendly. Biometric systems are progressively exchanging the ongoing password and authentication (token based) system. Authentication and Security recognition are the two most essential characteristic to consider in scheming a biometric system. In this paper, a broad review is presented to illuminate on the latest technologies in the study of fingerprint-based biometric covering these two characteristic with a view to improving system security and authentication recognition. KEYWORDS: Biometric system, Security, Authentication, Recognition, Authorization How to cite this paper: Shweta Naik "Biometric System and Recognition: Authentication and Security Issues" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-2, February 2020, pp.911-915, URL: www.ijtsrd.com/papers/ijtsrd30195.pdf Copyright © 2019 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) I. INRODUCTION Biometric is the particular phrase for human body measurements and calculations. It refers to the function related to human quality. Biometric are sensual or related human attributes to that can be used to numerically distinguish a individual to permit access to systems, devices or data. With different biometric scanners on phones and other electronic devices are universal or familiar and used frequently, as well as a increasing the number of services calling for high level security and good experience of customers, usual methods of authentication (e.g. passwords and PIN s) are progressively being supplant with biometric technologies. Passwords have some obvious or open drawbacks—they could be sneak, forgotten, or lost. In comparison, biometric offer an substitute or an alternative solution to the task of personal or public authentication or identification based on biometric features. To be unnoticed or lost is not possible, and unlike passwords, they are hard toform.Therearesome biometric features that can be defined for an individual. Examples: fingerprint, finger-vein, iris, face, voice,andmany more. Generally, a biometric system consists of four modules namely sensor module, feature extraction module, template database, and matching module. Specifically, the sensor module acquires the biometric image. The use of biometric can build up the security level in authentication. User authentication is the main step for securing any information in the computer system. With different biometric devices such as scanners on smart phones, desktops, laptops and other devices has becoming more frequent and dominant and also has increased the number of services for more security and customer experience, and other methods for authentication like password, PINs are increasingly displace by the biometric technologies. A set features are taken out from the biometric image by the feature extraction module. Organized features offerings are stored in the template database as template data. The matching module is responsible forexaminingthe queryand template data to check whether the meet or not. Types of Biometrics: A biometric identifier is one that is relatedtointegral human characteristics. They fall into two categories: physical identifiers and behavioral identifiers.Physical identifiers are those, for the most part, fixed, rigid and device free. Fingerprints: Fingerprint scanners have become omnipresent in recent years due to their distributed deployment on smart-phones. Any device that can be touched or which one can feel while using it, such as a phone screen, computer mouse keyword or touchpad, or a door IJTSRD30195
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 912 panel, has the potency to become an easy and favorable fingerprint scanner. Photo and video: If a device is provided with a camera, it can br easy to use for authentication purpose. Facial recognition and retinal scans are two common approaches. Voice: Voice-based digital instrument and telephone-based portals are already using voice recognition systems to identify and verify users and authenticate the customers. Signature: Digital signature scanners are already in distributed among different places such as in checkouts and in banks and are a good choice for environment whereusers and customers are already assumes to have the signature of their names. DNA: Today, DNA scans are used mainly in law enforcement to determine the suspects -- and also in movies. In practice, DNA combinations has been too slow for common use Face Recognition: The anatomy facial features or patterns are used for authntication and recognition of an person's identity. II. LITERATURE REVIEW: Biometric based security, such as fingerprintauthentication, is proven to be both more protected and handy than passwords,makingfingerprintsensingmaking progressively common and product differentiating feature in smart phones, tablets and PCs.However,fingerprintauthentication also increased security concerns that can be addressed with protections purpose built for biometrics. Synaptic s helps ensure biometric data protection through the Sentry-point Security Suite of features and architectures that meets or suits the full range of market needs. Spoofing attacks to the user interface (the sensor module) are mostly because of the presenting the fake biometric trait.[4]. A different forms of fingerprint sensors are approved to see if they can reject a fake fingerprint film or not. The test results show that the fake finger films are accepted by most of the approved sensors in[4]. In recent years, energetic work has been done in the research, which is used to detect whether the existing feature is from a live human being or not. The security vulnerabilities of a biometric system were underlined using threat models [6]. The security and privacy about the biometric authentication raises need to be addressed. It is analyzed that automatic fingerprint recognition is the best candidate biometric technology for explosives securityfromantechnical analysis of the requirements: security,usability,toughness,size,form factor, privacy andoperational temperaturerangearesolved in this [7]. Fingerprint scanner is used with great extent in today‟s attendance system. It provide huge security. Padma Rekha [8] proposed the attendance is handled in every institution or organization. In the old, the attendance is handled in written work. In this paper, to put off the human work, the automatic process is been maintained. Kamta Nath Mishra, [6] have concisely explained about the thumbprint based identificationsystemusedwiththehelpof soft computing technique. Dr. Naik and Patil [9] uncovered the biometric authentication is the most trusty method for authenticating a user based on his/her thumb impression. Now in modern approach, live fingerprint readers are used. These are based on optical, thermal, capacitive, silicon or ultrasonic principles [10,11,12]thevariancebetweenvalley and rigid. When it is time arises to use the biometric authentication, the degree of security is concerned. In this paper, we will discuss about recent research and insights into security authentication and recognition accuracy. There are various factors with the help of which we can judge the performance of any biometric authentication techniques. III. RESEARCH METHODOLOGY: A. Biometric Authentication: Biometric authentication is used in computer science as a form used for recognition and for controlling the access. It is also used for recognizing a single user or for a groups that are under observation. The use of biometric can build upthe security level in authentication. User authentication is the main step for securing any information in the computer system. With different biometricdevicessuchasscanners on smart phones, desktops, laptops and other devices has becoming more frequent and dominant and also has increased the number of services for more security and customer experience, and other methods for authentication like password, PIN s are increasingly displace by the biometric technologies. Authentication is done through number of measures like Password,PIN,IDCardsetc.Misuse of this measures are also increasing to a higher level nowadays. It is an essential an most important step which restricts the access to the critical data or personal information only to the legislative users. B. Authentication Process : Authentication in biometric are carried out in twostagesthe enrolment stage and verification stage. Fingerprint recognition as an example. In the enrolment stage, a user presents their finger to the fingerprint sensor and a fingerprint image is generated bythesensor module.Certain features of the generated fingerprint image are taken out and further they are passed forward to generate template data for the purpose of comparison in the verification stage. In the second stage of verification, the fingerprint image of a query is collected by the sensor module. The image or photo of the query fingerprint image goes through the similar process as in the enrolment stage, so as to obtain query data. The querydata arethencompared with the template data so that a similar result is obtained. Compared with other biometric methods like (e.g., fingerprint, face, iris, voice, hand geometry) fingerprint- based recognition systems are influenced more largely and deployed more widely. Fingerprint recognition considerthe patterns found on a fingertip. The use of fingerprints as a biometric is both the oldest way of computer-aided recognition, and the latest technology used most widely established today. It has been compute that the probability to find two persons with the same fingerprint is one in one billion. According to the recognition accuracy of fingerprint-based recognition systems is very high but the general open public showing medium acceptability to fingerprint accquring system. This is why fingerprint biometric systems occupy a high market shares and have been adopted and used in various applications.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 913 Fig1: Two stages of Biometric Authentication (enrolment and verification). Although fingerprint recognition shows significant strength and a rich and a well-heeled future, it has some unsolved issues, such as inadequate accuracy and security concerns. In this paper, a broad review is been presented to clarify on the latest development in the study of fingerprint-based biometric they are focused on two important aspects—authentication and recognition accuracy. Fig2 [13]: Analysis of Fingerprint Spoofing attacks to the user interface (the sensor module) are mostly because of the presenting the fake biometric trait. Since biometric traits are not secret or hidden, an adversary can intrude into the system with a fake trait (e.g., artificial fingerprint, face mask or through other things) to spoof the biometric system if the systemisunabletodifferentiateorrecognizebetweena fake and a genuine biometric trait. A number of fingerprint sensors are tested to see if they can reject a fake fingerprint filmor not. The test results show that the fake finger films are accepted by most of the tested sensors. C. Liveness Detection: Liveness detection one of the technique is useful not only for authentication but also for identification of proofing. Where biometric authentication involves verification that the user or an individual is the same identical person who initially at the beginning enrolled, biometric identity proofing can be performed as part of an organizational socialization process to verify that the person or an applicant is in fact a actual person. An example is using a mobile banking application for applying for a new account. The applicant is not known to the bank, so liveness detection technique can be used to confirm and sustain that the applicant is not trying to open a fraudulent which is illegal account. In biometric systems, the purpose of liveness testing is to determine whether the biometric being captured of an person is an actual measurement from the authorized legitimate, live personwhoisphysicallypresentatthetimeofcapturethefingerprint. While fingerprint systems may have an superior performance and improve the security. Fig3 [14]: Liveness Detection Process
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 914 Former studies have shown that it is not difficult to make moldsofpresentpotential fingerprintsleftbyauthorized usersandto create fake fingers made from Play-Doh, gelatin, and silicone like other materials to fool a variety of collections of fingerprint scanners, termed spoofing. Liveness detection deflate the risk of spoofing by demanding for a livenesssignature,inadditionto matched with biometric information.Methodscanbedividedintotwocategories:hardwareandsoftwarecategories.Hardware methods which includes various estimations like monitoring oxygen level, (ECG), or odor (fragrance), while software based measurements uses additional processing of the biometricinformationitselftoSegregatelivenesssignatureslikemoistureand distorting. While liveness algorithm makes spoofing more difficult and challenging, they need to be considered as componentsofvarious biometric system, which bring with it performance characteristics along with factors such as ease of use (the way of using it), collectability (collected data), unviersality, spoof-ability, performance, and in some of cases, even uniqueness. No system is perfect in its potentiality to prevent spoof attacks. However, thelivenessalgorithmcan reducethevulnerabilitytodecreasethe risk of spoofing The main efforts of this paper are highlighted as follows: 1. Security and recognition accuracy, despite being two most important aspects in biometric system design, have not been fully satisfied the study simultaneously. Prior to this paper, no research work hasdeliveredorpresenteda comprehensive review considering both of them. In this paper, the recent research and insights into securityandrecognitionaccuracyare completely analyzed, examined and discussed. 2. Based on a careful analysis, limitations of existing research are discussed and suggestions for the future work has been given and to overcome with the limitations are provided. 3. The two most critical attacks to biometric systems have been discussed in this paper. How to resolve the challenges, so as to defend or justify the biometric systems, is the focus of current and future biometric security research. 4. Most existing methods, either with or without template protection, were set forward for the ideal situations.Inthis paper, we underline the importance of considering recognition accuracy under non-ideal conditions. Our analysis is backed by solidified evidence and with elaborated comparison. Fig4 [14] Example of liveness Detection Fingerprint IV. CONCULSION: This paper gives a wide review of two significant measures for fingerprint-based biometric systems that is, authentication and recognition accuracy. In regards to authentication, we have analyzed the method of liveness detection. Most currently available methods, either with or without template protection, were set forward for the ideal situations. In this paper, we underline the importance of considering recognition accuracy under non-ideal conditions. Our analysis is backed by solidifiedevidenceand with elaborated comparison. Since 2009, the fingerprint Liveness Detection was aimed to allow the research companies sensible and individual assessment in anti spoofing algorithms and systems. Based on a careful analysis, limitations of existing research are discussed and suggestions for the future work has been given and to overcome with the limitations are provided. V. FUTURE ENHANCEMMENT: In our future work, biometric technologies like facial scanning, voice and iris recignition, fingerprint scanningcan be more popularly because ofwhichauthentication becomes much more convenient and secure for the data or information in different organizations and smart phone. More realistic methods and tenchology in future canbeused for the security purpose of authentication in biomerics systems. VI. REFERENCE: [1] https://www.google.com/search?tbm=isch&sxsrf=ACY BGNSdHd5S8CnLDsMryFaT6vR6JW_mcg:1576511105 164&q=+biometric+authentication+diagram&chips=q: biometric+authentication+diagram,g_1:identification& usg=AI4_-kQN22p03Sx- tc_YU7ei6F_rGghyXw&sa=X&ved=0ahUKEwizm6HDwb rmAhUzguYKHVR5BT4Q4lYIKigA&biw=1242&bih=56 8&dpr=1.1#imgrc=8ht8EGwm6csK5M: [2] https://scholar.google.co.in/scholar?q=Security+and+ Accuracy+of+Fingerprint- Based+Biometrics:+A+Review&hl=en&as_sdt=0&as_vis =1&oi=scholart [3] https://www.researchgate.net/figure/Eight-possible- attack-points-to-a-typical-biometric-authentication- system-adapted-from_fig2_330711092
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30195 | Volume – 4 | Issue – 2 | January-February 2020 Page 915 [4] Kang, H.; Lee, B.; Kim, H.; Shin, D.; Kim, J. A study on performance evaluation of the liveness detection for various fingerprint sensor modules. In Proceedings of the International Conference onKnowledge-Basedand Intelligent Information and Engineering Systems, Oxford, UK, 3–5 September 2003; pp. 1245–1253 [5] https://www.researchgate.net/publication/33071109 2_Security_and_Accuracy_of_Fingerprint- Based_Biometrics_A_Review [6] Security Vulnerabilities Against Biometric System Mahesh Joshi1 Bodhisatwa Mazumdar1SomnathDey1 {phd1701101004, bodhisatwa, somnathd}@iiti.ac.in1 Indian Institute of Technology Indore, India [7] A Study of Biometric Approach Using Fingerprint Recognition Ravi Subban and Dattatreya P. Mankame. [8] P. Padma Rekha, D. Amudhan, V. Narendhiran, N. Pavithra, S. Ramya, “AUTOMATIC ATTENDANCE MONITORING SYSTEM”. [9] Dr. Naik, P. G. and Patil, M. B, “BIOMETRIC DATA ANALYSIS OF STUDENT ATTENDANCE SYSTEM AT CSIBER”, International Journal of Current Research, 8(2), 26751-26762, 2016. [10] A. Ross, S. Dass, and A. K. Jain, “A deformable model for fingerprint matching”, Journal of Pattern Recognition, Elsevier, Volume 38, No. 1, Jan. 2005, pp. 95–103. [11] T. Matsumoto, H. Hoshino, K. Yamada, and S. Hasino, “Impact of artificial gummy fingers on fingerprint systems”, In Proc. of SPIE, Volume 4677, Feb. 2002, pp. 275–289. [12] A. K. Jain, A. Ross, and S. Pankanti, “Biometric: A Tool for Information Security”, IEEE Trans. Information Forensics and Security, Volume 1, No. 2, Jun. 2006, pp. 125–144. [13] https://www.semanticscholar.org/paper/Review-of- the-Fingerprint-Liveness-Detection-2009-Ghiani- Yambay/086b02da66d0f0128ec721974faad97945274 9cd [14] https://www.intechopen.com/books/advanced- biometric-technologies/liveness-detection-in- biometrics