Information Provider via Biometrics Security |
Author(s): |
Sahil Santosh Kulkarni , AISSMS Polytechnic Pune; Rushikesh Narendra Gaikwad, AISSMS Polytechnic Pune; Omkar Shrinivas Cheriyal, AISSMS Polytechnic Pune; Vijay Parshuram Chavan, AISSMS Polytechnic Pune |
Keywords: |
Algorithms, Security, Authentication, Biometrics, Ridges, Valleys, Authorization, Arch, Whorl, Scanner, Database |
Abstract |
Over the last few years a we have observe a focus on engineering science has been established whose products are likely to create a large market in the near future. It has been known 'biometrics". Nature has build every human beings with different characteristics which may vary from one person to another. This property is made use of by Biometric technology to perfectly identify each person Biometric technique is necessary to determine a pattern which determines a user pattern by determining the validity of a specific substantial or behavioral types influenced by the user. Individual major concern must be observed in making a practical biometric system. First, a user must be register in the system so that his biometric impression can be identified. This impression is securely stored in a central database or a smart card given to the user. The impression is fetched when an individual needs to be verified. Depending on the information, a biometric system can operate either in a verification (authentication) or a recognition mode. |
Other Details |
Paper ID: IJSRDV7I20051 Published in: Volume : 7, Issue : 2 Publication Date: 01/05/2019 Page(s): 40-43 |
Article Preview |
|
|