BIOMETRIC AUTHENTICATION: LITERATURE REVIEW
INTRODUCTION
Human identification has generally been carried out by utilizing ID cards and passwords. Such techniques can be violated easily. Passwords can be guessed and ID cards can be robbed, rendering them temperamental [Jain et al. 2006].
< Jain, A., Bolle, R., & Pankanti, S. (Eds.). (2006). Biometrics: personal identification in networked society (Vol. 479). Springer Science & Business Media.>
Biometrics is defined as a process of identifying a person identity on the basis of physiological and behavioral features; it is capable of differentiating between the genuine person and the fake one. A biometric system is that system which identifies data of the person, by fetching the set of features and verifying it with the set stored in the database, which is dependent on the application context. An individual’s identity can be found out in two ways: Identification and verification. Working of biometric system is divided into eight stages (Liu and Silverman 2001). First, capturing the biometrics. Second, processing, enrolling and extraction of biometric template. Third, storing the data in tokens such as smart card. Fourth, lively scan the selected biometric. Fifth, processing of biometric and extraction of biometric template. Sixth, matching of biometric with the stored one. Seventh, matching score is being provided to the business application. Eighth, recording of correct audit train in regards to the system. Processing of biometric system is shown below:
< Liu, Simon, and Mark Silverman. “A practical guide to biometric security technology.” IT Professional 3.1 (2001): 27-32.>
Figure 1How a biometric system work
MAIN MODULE:
BIOMETRIC SYSTEM
A biometric system is basically an example of acknowledgment framework that works by obtaining biometric information from an individual, processing the procured information, and comparing it against the layout set in the database. Based on the application setting, a biometric framework may work either in check mode or distinguishing proof model.
Figure 2 diagrams of verification task
< Prabhakar, Salil, Sharath Pankanti, and Anil K. Jain. “Biometric recognition: Security and privacy concerns.” IEEE security & privacy 99.2 (2003): 33-42.>
Figure 3 diagrams of Identification task
Physical biometric