IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Advances in Biometrics for Secure Human Authentication System: Biometric Authentication System

Advances in Biometrics for Secure Human Authentication System: Biometric Authentication System
View Sample PDF
Author(s): Jagannath Mohan (VIT University, India), Adalarasu Kanagasabai (PSNA College of Engineering and Technology, India)and Vetrivelan Pandu (VIT University, India)
Copyright: 2016
Pages: 19
Source title: Combating Security Breaches and Criminal Activity in the Digital Sphere
Source Author(s)/Editor(s): S. Geetha (Vellore Institute of Technology, India)and Asnath Victy Phamila (Vellore Institute of Technology, Chennai, India)
DOI: 10.4018/978-1-5225-0193-0.ch002

Purchase

View Advances in Biometrics for Secure Human Authentication System: Biometric Authentication System on the publisher's website for pricing and purchasing information.

Abstract

In the recent decade, one of our major concerns in the global technological society of information security is confirmation that a person accessing confidential information is authorized to perform so. Such mode of access is generally accomplished by a person's confirming their identity by the use of some method of authentication system. In present days, the requirement for safe security in storing individual information has been developing rapidly and among the potential alternative is implementing innovative biometric identification techniques. This chapter discusses how the advent of the 20th century has brought forth the security principles of identification and authentication in the field of biometric analysis. The chapter reviews vulnerabilities in biometric authentication and issues in system implementation. The chapter also proposes the multifactor authentication and the use of multimodal biometrics, i.e., the combination of Electrocardiogram (ECG) and Phonocardiogram (PCG) signals to enhance reliability in the authentication process.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom