CFP last date
20 December 2024
Reseach Article

Pitfalls in “part of yours” System: Biometrics

by Garima Yadav, Nikita Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 7
Year of Publication: 2015
Authors: Garima Yadav, Nikita Yadav
10.5120/ijca2015905526

Garima Yadav, Nikita Yadav . Pitfalls in “part of yours” System: Biometrics. International Journal of Computer Applications. 124, 7 ( August 2015), 38-40. DOI=10.5120/ijca2015905526

@article{ 10.5120/ijca2015905526,
author = { Garima Yadav, Nikita Yadav },
title = { Pitfalls in “part of yours” System: Biometrics },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 7 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 38-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number7/22120-2015905526/ },
doi = { 10.5120/ijca2015905526 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:48.469946+05:30
%A Garima Yadav
%A Nikita Yadav
%T Pitfalls in “part of yours” System: Biometrics
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 7
%P 38-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security? Yes, security in itself is the biggest concern today. From ancient time to present we have come a long way from “something you know” (e.g., password, Personal identification number- Knowledge based approach), to “something you carry” (e.g., physical key, ID card- token based approach) and to “something you are” (e.g., face, voice) [1]. All these methods of establishing the identity of the persons have their own advantages and limitation. But out of these three “something you are” is the latest, gaining popularity and used all over the world. This method is known as “Biometrics”, but this system is also having some pitfalls. In this paper we are trying to present the pitfalls in the biometric system.

References
  1. IBM Corporation. The Consideration of Data Security in a Computer Environment. Technical Report G520-2169, IBM, White Plains, USA, 1970.
  2. www.globalseci.com/?pageid=37
  3. karthikNandKumar_Multibiometric System_phd08.pdf
  4. Kant Chander, Nath Rajender, Chaudhary Sheetal “Biometrics Security usingSteganography,” cssjournals.com/Journals/IJS/Volume2/Issue1/IJS-5.pdf
  5. Heckathorn, D.D., Broadhead, R.S., Sergeyev, B.: A Methodology for ReducingRespondent Duplication and Impersonation in Samples of Hidden Populations. In: Annual Meeting of the American Sociological Association, Toronto, Canada (1997)
  6. U.K. Biometric Working Group, “Biometric security concerns,” Technical Report, CESG, September 2003, http://www.cesg.gov.uk/site/ast/biometrics/media/ BiometricSecurityConcerns.pdf.
  7. A. Adler, “Can images be regenerated from biometric templates?,” in Biometrics Consortium Conference, (Arlington, VA), September 2003.
  8. A. Ross, K. Nandakumar, and A. K. Jain. Handbook of Multibiometrics. Springer, 2006.
  9. L. Hong, A. K. Jain, and S. Pankanti. Can Multibiometrics Improve Performance? In Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), pages 59–64, New Jersey, USA, October 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Security