Providing Confidentiality using Bio Metrics

Tella Prameela*, Tejasree Samakoti**
* Assistant Professor, Department of Computer Science, Siddhartha Educational Academy Group of Institutions, Andhra Pradesh, India.
** Assistant Professor, Department of Computer Science, VEMU Institute of Technology, Pakala, Andhra Pradesh, India.
Periodicity:April - June'2018
DOI : https://doi.org/10.26634/jse.12.4.14670

Abstract

Now-a-days, every organization and institution provides security for their users. There are different systems are available for providing security and identifying of employees of the desired organization. No one is stick on one system for providing security. Every system having some disadvantages. Compared to the other systems most of the confidential organizations uses the biometric system for providing security and recognition. This paper depicts about the biometric system clearly with many types, steps involved in this system, advantages and disadvantages and finally applications.

Keywords

Biometric, Recognition, Identification.

How to Cite this Article?

Prameela, T., Samakoti, T. (2018). Providing Confidentiality Using Bio Metrics i-manager's Journal on Software Engineering, 12(4), 7-11. https://doi.org/10.26634/jse.12.4.14670

References

[1]. Application of Biometric Technology Solutions to Enhance Security. (n.d.). In www.chemicalprocessing. com. Retrieved from https://www.chemicalprocessing. com/assets/Media/MediaManager/FingerprintsIncrease Security.pdf
[2]. Bonneau, J., & Schechter, S. E. (2014, August). Towards reliable storage of 56-bit secrets in human memory. In USENIX Security Symposium (pp. 607-623).
[3]. Chang, H. B., & Schroeter, K. G. (2010). Creating safe and trusted social networks with biometric user authentication. In Ethics and Policy of Biometrics (pp. 89-95). Springer, Berlin, Heidelberg.
[4]. Counter, P. B. (2014). The biometric social network and keystroke authentication. In findbiometrics.com. Retrieved from https://findbiometrics.com/the-biometricsocial- network-and-keystroke-authentication-01241401/
[5]. Cyber security community by TATA group of companies (n.d.). Retrieved from https://security community.tcs.com/infosecsoapbox/
[6]. Deans, D. H. (n.d). How biometric authentication apps enhance security. In socialmediatoday.com. https:// www.socialmediatoday.com/ users/david-h-deans/
[7]. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4-20.
[8]. Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security & Privacy, (2), 33-42.
[9]. Samakoti, T., Naseera, S., & Pramila, T. (2016). Perception of trend topic in twitter: A case study. i-manager's Journal on Software Engineering, 11(4), 12-17.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.