Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A study of internet threats, avoidance and biometric security techniques - comparison of biometric techniques.
Author(s):
1. M. Junaid Arshad: Department of Computer Science and Engineering, UET, Lahore, Pakistan
2. Arjumand Iqbal: Department of Chemistry, UET, Lahore-Pakistan
3. Amjad Farooq: Department of Computer Science and Engineering, UET, Lahore, Pakistan
4. M. Usman Ghani Khan: Department of Computer Science and Engineering, UET, Lahore, Pakistan
5. M. Afzal: Department of Computer Science and Engineering, UET, Lahore, Pakistan
6. Amna Wajid: Department of Computer Science and Engineering, UET, Lahore, Pakistan
7. Abdul-Nasir: Department of Computer Science and Engineering, UET, Lahore, Pakistan
Abstract:
In today’s IT world, most of the communication is done through networking. So, security of information is very crucial. A lot of techniques have been developed for security which involves passwords, encryption, digital signatures etc. But there are chances of vulnerabilities in these techniques and hackers can break the security algorithms of these techniques. So, in this era, researchers have moved towards biometric techniques of security. It involves identification of people based on their physical characteristics or psychological behaviors. A choice of biometric method to be used is made depending on the level of security required and the goals of the system. Biometric identification is very excellent and secure way of authenticating people. But it can also suffer from security threats, if proper design considerations are not taken into account. This work presents details of biometric techniques and a detailed comparison of most famous biometric techniques.
Page(s): 135-146
DOI: DOI not available
Published: Journal: Journal of Faculty of Engineering and Technology, Volume: 21, Issue: 2, Year: 2014
Keywords:
Keywords are not available for this article.
References:
References are not available for this document.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

15

Views