High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Information Provider via Biometrics Security

Author(s):

Sahil Santosh Kulkarni , AISSMS Polytechnic Pune; Rushikesh Narendra Gaikwad, AISSMS Polytechnic Pune; Omkar Shrinivas Cheriyal, AISSMS Polytechnic Pune; Vijay Parshuram Chavan, AISSMS Polytechnic Pune

Keywords:

Algorithms, Security, Authentication, Biometrics, Ridges, Valleys, Authorization, Arch, Whorl, Scanner, Database

Abstract

Over the last few years a we have observe a focus on engineering science has been established whose products are likely to create a large market in the near future. It has been known 'biometrics". Nature has build every human beings with different characteristics which may vary from one person to another. This property is made use of by Biometric technology to perfectly identify each person Biometric technique is necessary to determine a pattern which determines a user pattern by determining the validity of a specific substantial or behavioral types influenced by the user. Individual major concern must be observed in making a practical biometric system. First, a user must be register in the system so that his biometric impression can be identified. This impression is securely stored in a central database or a smart card given to the user. The impression is fetched when an individual needs to be verified. Depending on the information, a biometric system can operate either in a verification (authentication) or a recognition mode.

Other Details

Paper ID: IJSRDV7I20051
Published in: Volume : 7, Issue : 2
Publication Date: 01/05/2019
Page(s): 40-43

Article Preview

Download Article