Security Defects in Biometric- based IdentificationSystemsand Mechanisms torectify them

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 14, Issue 2

Abstract

Biometrics is one of the evolving technologies widely used in different aspects of life today. Theuse of biometrics for identification is a system mainly established to recognize a certain person through authentication by using a set of biological characteristics. In this paper, I aim to survey the security risks and defects in identity verification systems that are based on biometrics, and try to suggest risk management solutions in order to increase the security factor whenever using such systems.

Authors and Affiliations

Dr. Mozamel M. Saeed, Dr. Abdulwahid A. Fadul, Mesfer A. Al Duhayyim

Keywords

Related Articles

The Fuzzy Control for Rotor Flux Orientation of the double-fed asynchronous generator Drive

In This paper we present a new contribution of fuzzy logic for electrical machine control. We are interested to the control direction of the rotor flux applied to Doubly-Fed Induction Generators (DFIG)At first, the princ...

Cloud Computing Environment: A Review

Cloud computing is a vigorous technology by which a user can get software, application, operating system and hardware as a service without actually possessing it and paying only according to the usage. Cloud Computing is...

RANKING of the E-TRUST FACTORS in ELECTRONIC TRANSACTIONS in the CONTEXT of B2C E-COMMERCE (from the consumers point of view and by using Friedmans ranking method)

Today, a considerable amount of commercial transactions have appertained to the electronic transactions and electronic markets, aside from or versus the traditional markets, have attracted and collected a large number of...

HMotion: An Algorithm for Human Motion Detection

Computer memory is expensive and the recording of data captured by a webcam needs memory. In order to minimize the memory usage in recording data from human motion as recorded from the webcam, this algorithm will use mot...

A Review of Digital Signature Using Different Elliptic Cryptography Technique

Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital sig...

Download PDF file
  • EP ID EP650622
  • DOI 10.24297/ijct.v14i2.2062
  • Views 88
  • Downloads 0

How To Cite

Dr. Mozamel M. Saeed, Dr. Abdulwahid A. Fadul, Mesfer A. Al Duhayyim (2014). Security Defects in Biometric- based IdentificationSystemsand Mechanisms torectify them. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 14(2), 5432-5436. https://europub.co.uk/articles/-A-650622