Open Access   Article Go Back

Biometrics in Network Security

Noor Fathima1 , Pallavi B N2 , Kavitha 3

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-09 , Page no. 25-28, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si9.2528

Online published on Apr 30, 2019

Copyright © Noor Fathima, Pallavi B N, Kavitha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Noor Fathima, Pallavi B N, Kavitha, “Biometrics in Network Security,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.25-28, 2019.

MLA Style Citation: Noor Fathima, Pallavi B N, Kavitha "Biometrics in Network Security." International Journal of Computer Sciences and Engineering 07.09 (2019): 25-28.

APA Style Citation: Noor Fathima, Pallavi B N, Kavitha, (2019). Biometrics in Network Security. International Journal of Computer Sciences and Engineering, 07(09), 25-28.

BibTex Style Citation:
@article{Fathima_2019,
author = {Noor Fathima, Pallavi B N, Kavitha},
title = {Biometrics in Network Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {07},
Issue = {09},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {25-28},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=948},
doi = {https://doi.org/10.26438/ijcse/v7i9.2528}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.2528}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=948
TI - Biometrics in Network Security
T2 - International Journal of Computer Sciences and Engineering
AU - Noor Fathima, Pallavi B N, Kavitha
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 25-28
IS - 09
VL - 07
SN - 2347-2693
ER -

           

Abstract

Security has been a major interest for authentication over networking. In this modern society, mobile devices have a pertained importance with hundreds and millions users. With the help of pins, passwords there are weak authentication mechanisms which allow attackers to access the stored data. By implementing various methods for key exchange cryptographic can solve the problem of security. Identity verification is a developing and mesmerizes much attention. Biometric recognition mainly relates to the automatic recognition of individuals based on their behavioral characteristics. Almost appropriate is based on vein pattern is an approach that uses the vast network of blood vessels that lie underneath a skin. Vein pattern are unique and also difficult to duplicate even twin has an unlike and unique vein structure. Biometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye and finger print. In biometrics, it is very difficult for someone to break into a system. Biometric security is a mechanism which is used to prove and provide access to a facility or system based on the automatic and direct verification of a single person’s physical behavior.

Key-Words / Index Term

Authentication, cryptography, networking

References

[1]. Kirat Pal Singh Senior Project Fellow Council of Scientific and Industrial Research (CSIR) – Central Scientific Instruments Organization (CSIO) CSIR-CSIO, Ministry of Science & Technology, Chandigarh-160030
[2]. Mohammed Nasir Uddin1, Selina Sharmin2, Abu Hasnat Shohel Ahmed3 and Emrul Hasan4, Shahadot Hossain5 and Muniruzzaman6 Shanto Mariam University of Creative Technology1, 3 ,Uttara University4,5,6 IJCSNS International Journal of Computer Science and Network 16 Security, VOL.11 No.10, October 2011
[3]. SURVEY OF BIOMETRIC RECOGNITION SYSTEMS AND THEIR APPLICATIONS 1 SULOCHANA SONKAMBLE, 2DR. RAVINDRA THOOL, 3BALWANT SONKAMBLE 1Asstt Prof., Department of Information Technology , MMCOE, Pune, India 411052 2Professor, Department of Information Technology, SGGSIE&T,Nanded, India -411017 3Asstt Prof., Department of Computer Engineering, PICT, Pune, India-411043
[4]. Himanshu Srivastava Department of Computer Science & Engineering Roorkee Institute of Technology, Roorkee (U.K.), India IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 22-29
[5]. Ravi Subban and Dattatreya P. Mankame A Study of Biometric Approach Using Fingerprint Recognition Lecture Notes on Software Engineering, Vol. 1, No. 2, May
[6]. Mohammed Nasir Uddin1, Selina Sharmin2, Abu Hasnat Shohel Ahmed3 and Emrul Hasan4, Shahadot Hossain5 and Muniruzzaman6 Shanto Mariam University of Creative Technology1, 3 ,Uttara University4,5,6 A Survey of Biometrics Security System IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011