Security Defects in Biometric- based IdentificationSystemsand Mechanisms torectify them

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 14, Issue 2

Abstract

Biometrics is one of the evolving technologies widely used in different aspects of life today. Theuse of biometrics for identification is a system mainly established to recognize a certain person through authentication by using a set of biological characteristics. In this paper, I aim to survey the security risks and defects in identity verification systems that are based on biometrics, and try to suggest risk management solutions in order to increase the security factor whenever using such systems.

Authors and Affiliations

Dr. Mozamel M. Saeed, Dr. Abdulwahid A. Fadul, Mesfer A. Al Duhayyim

Keywords

Related Articles

A Survey on Design Methods for Secure Software Development

Software provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many sec...

Knowledge based System for Improving Design and Manufacturing Processes for Electrochemical MachiningIn Computer based Concurrent Engineering

The traditional design of product, the preceding constraints and limitations are considered sequentially. In order to reduce the product development cycle time and cost and increase quality and productivity, concurrent (...

An Overview of Data Analysis of EMR, Its Clinical Ontologies & Security in Database with respect to Todays Ehealth Apps

The convergence of the information and communication technology (ICT) has produced many exciting possibilities for developing new services in medical field for the citizens. Electronic medical records (EMRs) are used in...

Implementation of Brain Tumor Segmentation in brain MR Images using K-Means Clustering and Fuzzy C-Means Algorithm

This paper deals with the implementation of Simple Algorithm for detection of range and shape of tumor in brain MR images. Tumor is an uncontrolled growth of tissues in any part of the body. Tumors are of different types...

Optimum Space Utilization Approach to Improve Persistence of WSNs

Wireless Sensor Networks (WSNs) are consists of huge number of sensor nodes, restricted with limited power,  for provide services with cooperation to sense data and send to server. Various routing techniques are introdu...

Download PDF file
  • EP ID EP650622
  • DOI 10.24297/ijct.v14i2.2062
  • Views 72
  • Downloads 0

How To Cite

Dr. Mozamel M. Saeed, Dr. Abdulwahid A. Fadul, Mesfer A. Al Duhayyim (2014). Security Defects in Biometric- based IdentificationSystemsand Mechanisms torectify them. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 14(2), 5432-5436. https://europub.co.uk/articles/-A-650622