Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Future use of biometric technology for security and authontication
Post: #1

Biometric technology is the technology which is based on the samples of the human body. This is based on the things which every person is having different to the any other person. And using this technology is far more better than using any other technology.
Post: #2
i m interested in biometrics.i want 2 do my project in biometric technology for security nd authentification:
Post: #3
i want 2 know more abt tis topic
Post: #4
Thumbs Up 

This article is presented by :
Visvesvaraya Technological University
Santhibastawad Road, Machhe
Belgaum-590 014, Karnataka


In this Hi-Tech era, there is a great demand to identify and authenticate the individuals. Till now we are totally dependent upon Passwords and Pin Numbers for identification. How secure are passwords? With the numerous passwords that an individual has to remember, they are often forgotten, misplaced, or stolen. Think of how many different passwords you have to remember: computer passwords, internet site logons and passwords, PIN numbers for the ATM and for credit cards, the list goes on. We are arriving at a conclusion that these technologies are not sufficient for the security of an individual as these are hard to remember, easily transferable, easily stolen and there are many weaknesses. Due to these weaknesses biometrics came into existence.
Biometrics is that study of science that deals with personal human behavioral and physiological characteristics and such as fingerprints, handprints, iris scanning, voice scanning, face recognition and signature recognition. These technologies are far more promising than that which are used currently to identify an individual. This paper highlights some of the benefits and the few limitations of using biometrics for authentication .With biometrics it doesn’t matter if we forget your password or lose your smart card.

The term "biometrics" is derived from the Greek words bio means “life” and metric means “to measure”.
BIOMETRICS refers to the automatic identification of a person based on his physiological / behavioral characteristics. This method of identification is preferred for various reasons; the person to be identified is required to be physically present at the point of identification; identification based on biometric techniques obviates the need to remember a password or carry a token.
A biometric is a unique, measurable characteristic or trait for automatically recognizing or verifying the identity of a human being. Biometrics is a powerful combination of science and technology that can be used to protect and secure our most valuable information and property.
With the increased use of computers or vehicles of information technology, it is necessary to restrict access to sensitive or personal data. By replacing PINs, biometric techniques can potentially prevent unauthorized access to fraudulent use of ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. PINs and passwords may be forgotten, and token based methods of identification like passports and driver’s licenses may be forged, stolen, or lost .Thus biometric systems of identification are enjoying a renewed interest.

Post: #5

Biometrics is the science for measurements of physical or biological characteristics of an individual to create a unique identifier which can be electronically stored, retrieved and compared for positive identification purposes. Biometrics includes automated methods of recognizing a person based on a physiological or behavioural characteristic. They include fingerprints, retinal and iris scanning, hand and finger geometry, voice patterns, facial recognition and other techniques.
The biometric technologies are becoming the foundation of an extensive array of highly secure identification, personal verification and access solutions. Biometrics is expected to be incorporated in solutions for improving airport security, in travel documents, passports and visas, and in preventing thefts.
Biometric systems work by converting data derived from behavioural or physiological characteristics into templates, which are used for subsequent matching. This is a multi stage process whose stages are enrolment, submission, acquisition device, biometric sample, feature extraction, template, matching, score, threshold and decision.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: future use of biometric technology for security, my future profession, powered by smf future of technology, what is the use of abstract in, information technology future, discover science technology and the future, use of ngr in wartsila engine,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  money pad the future wallet electronics seminars 15 10,981 22-10-2016 10:34 AM
Last Post: jaseela123
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 17,228 07-08-2014 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 6,688 30-03-2014 04:40 AM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 2,364 12-08-2013 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 4,023 27-07-2013 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 5,482 24-06-2013 11:44 AM
Last Post: Guest
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 9,174 02-02-2013 03:56 PM
Last Post: seminar details
  network security seminar report computer science technology 13 10,543 24-01-2013 12:42 PM
Last Post: seminar details
  Network security and protocols project topics 1 1,356 24-01-2013 12:41 PM
Last Post: seminar details
  Security Challenge and Defense in VoIP Infrastructures project topics 3 1,689 04-01-2013 11:16 AM
Last Post: [email protected]