A Comprehensive Review of Various Security Features

Abstract

In recent decades the subject of "handwritten authentication verification" has been investigated extensively, although there is still an open research issue. People are familiar with stylus and paperwork for legal transaction certification and approval. Due to the expansion of the usage of handwritten authentications, it is necessary to identify authentications by a person manually. Authentication is a social biometric which is defined by a social characteristic that a person learns over time and becomes his unique identity. This article explains the significance of the offline system and gives an overview of several methods in many areas. As this is a region under consideration, the overview deals with a number of examples. The objective of an independent confirmation system is to distinguish whether a given authentication can be certified or duplicated. The result was a tough task in particular in the offline (static) scenario, where the dynamic data about the objectivism process is not available. Although extensive research has been done in this field but there are more opportunities of more research in future.

Authors and Affiliations

Jaskirandeep kaur Jossan

Keywords

Related Articles

A Comparative Study of Firewall and Intrusion Prevention System

In the real world a firewall is a solid barrier between a precious asset on one side and a hazard on the other. Firewalls are often used to protect an organization from hazards on the Internet but they can, and probably...

GPU Implementation of Sales Forecasting with Linear Regression

Forecasting of sales is very important in any business as it helps managers to learn from historical data and make informed decisions. This generally involves intensive processes using spreadsheets which require inputs f...

An Improved Dynamic Round Robin CPU Scheduling Algorithm Using SJF Technique

CPU Scheduling is one of the fundamental concepts of operating system. There exists a number of CPU scheduling algorithms like first come f irst serve, shortest job first scheduling, round robin scheduling, priority sche...

A Review Paper on Slit Erosion

The eruptive wearing of hydrokinetic blades is a complex operation impacted by a number of elements such as silt size, softness and concentrations, flow speed, and foundation materials properties. As eruptive attrition a...

In India, There Are Social Divisions in Education

The variations for 6-14-year-old India children in primary school enrollment by gender across three socioeconomic divisions, namely bottom and top caste Hindus, and Muslims, are described and analyzed in this study. It a...

Download PDF file
  • EP ID EP746567
  • DOI 10.55524/ijircst.2022.10.2.11
  • Views 41
  • Downloads 0

How To Cite

Jaskirandeep kaur Jossan (2022). A Comprehensive Review of Various Security Features. International Journal of Innovative Research in Computer Science and Technology, 10(2), -. https://europub.co.uk/articles/-A-746567