Security Defects in Biometric- based IdentificationSystemsand Mechanisms torectify them
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 14, Issue 2
Abstract
Biometrics is one of the evolving technologies widely used in different aspects of life today. Theuse of biometrics for identification is a system mainly established to recognize a certain person through authentication by using a set of biological characteristics. In this paper, I aim to survey the security risks and defects in identity verification systems that are based on biometrics, and try to suggest risk management solutions in order to increase the security factor whenever using such systems.
Authors and Affiliations
Dr. Mozamel M. Saeed, Dr. Abdulwahid A. Fadul, Mesfer A. Al Duhayyim
A Survey on Design Methods for Secure Software Development
Software provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many sec...
Knowledge based System for Improving Design and Manufacturing Processes for Electrochemical MachiningIn Computer based Concurrent Engineering
The traditional design of product, the preceding constraints and limitations are considered sequentially. In order to reduce the product development cycle time and cost and increase quality and productivity, concurrent (...
An Overview of Data Analysis of EMR, Its Clinical Ontologies & Security in Database with respect to Todays Ehealth Apps
The convergence of the information and communication technology (ICT) has produced many exciting possibilities for developing new services in medical field for the citizens. Electronic medical records (EMRs) are used in...
Implementation of Brain Tumor Segmentation in brain MR Images using K-Means Clustering and Fuzzy C-Means Algorithm
This paper deals with the implementation of Simple Algorithm for detection of range and shape of tumor in brain MR images. Tumor is an uncontrolled growth of tissues in any part of the body. Tumors are of different types...
Optimum Space Utilization Approach to Improve Persistence of WSNs
Wireless Sensor Networks (WSNs) are consists of huge number of sensor nodes, restricted with limited power, Â for provide services with cooperation to sense data and send to server. Various routing techniques are introdu...