Loading

Biometric Security Systems
A. M. Bojamma1, B. Nithya2, Prasad C. N.3, M. N. Nachappa4

1A.M. Bojamma: Department Of Computer Science, St. Joseph’s College (Autonomous), Langford Road, Shanthinagar, Bangalore – 560027.
2B. Nithya: Department Of Computer Science, St. Joseph’s College (Autonomous), Langford Road, Shanthinagar, Bangalore – 560027.
3Prasad .C.N.: Department Of Computer Science, St. Joseph’s College (Autonomous), Langford Road, Shanthinagar, Bangalore – 560027.
4M.N. Nachappa: Department Of Computer Science, St. Joseph’s College (Autonomous), Langford Road, Shanthinagar, Bangalore – 560027.
Manuscript received on February 08, 2013. | Revised Manuscript Received on February 23, 2013. | Manuscript published on February 20, 2013. | PP: 32-38 | Volume-1 Issue-3, February 2013. | Retrieval Number: D0158031413/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The modern information technology evolution demands the use of computer networks with strict security performance. The password-based authentication system and the token-based systems that are currently deployed are not able to meet this performance Verification using biometrics has become in the last few years a key issue in security and privacy .The problems of traditional personal authentication systems may be solved by biometric systems. Information security has gained more and more attention from researchers because it plays an important role in our daily life. Biometrics-based authentication offers several advantages over other authentication methods; hence there has been a significant rise in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in critical applications, especially in remote applications which are unattended such as ecommerce environment. In this paper we outline the strengths and weakness of biometrics-based authentication, and techniques to enhance the strength of the biometric system with new solutions for eliminating some of the weak links with techniques like steganography , watermarking, cryptosystems. For illustration purpose, finger print authentication, facial recognition has been considered.
Keywords: steganography , watermarking, cryptosystem.