2020
DOI: 10.31838/jcr.07.03.97
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Biometric Authentication Systems in Cloud to Combat Identity Theft

Abstract: Biometrics has by far proven to be an effective solution for many of the security challenges that is prevalent in most of the technical fields in this Digital era. It is the measurement of physical or behavioral traits in humans used for unique identification. Biometricsuses the pattern recognition technology of Digital Image Processing for identifying unique features in humans. Most commonly applied or considered biometric modalities comprise fingerprint impression, facial landmarks, iris anatomy, speech reco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…According to this survey, it is crucial to increase the security and privacy of biometric authentication systems. In order to prevent theft of identities, Paper [13] presented a state-of-the-art survey of the various authentication techniques available in cloud environments. An effective authentication system that ensures security against data theft has been the focus of numerous research studies.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…According to this survey, it is crucial to increase the security and privacy of biometric authentication systems. In order to prevent theft of identities, Paper [13] presented a state-of-the-art survey of the various authentication techniques available in cloud environments. An effective authentication system that ensures security against data theft has been the focus of numerous research studies.…”
Section: Related Workmentioning
confidence: 99%
“…Robustness of the authorized templates More complex to analyze the system [13] PIN and random salting are used to create the cancelable biometric Fingerprint templates…”
Section: Hybrid Transformati Onmentioning
confidence: 99%
“…When compared to standard authentication techniques done with keys and identification cards, BA is evaluated to be more genuine and appropriate (Yadav et al, 2020). Since modalities, namely faces, fingerprints, palm vein irises, hand geometry, and voices are truly unique, the usage of biometrics is increasing each day, which makes them an effectual blockade to cyber criminals trying to underhandedly impersonate us (Carmel & Akila, 2020). This system recommended several privacy-preserving biometric verification solutions.…”
Section: Introductionmentioning
confidence: 99%
“…Access control systems may also include authorization policies that specify which users are allowed to access specific resources, and what actions they are allowed to perform. Traditional access control systems are an important component of security infrastructure in many organizations, and are used to protect against theft, vandalism, data breaches, and other security threats [17,55].…”
Section: Introductionmentioning
confidence: 99%
“…Access control systems may also include authorization policies that specify which users are allowed to access specific resources, and what actions they are allowed to perform. Traditional access control systems are an important component of security infrastructure in many organizations, and are used to protect against theft, vandalism, data breaches, and other security threats [17,55].However, traditional access control systems have limitations, such as their inability to adapt to changing user behavior and evolving security threats. Applying machine learning to access control systems presents a promising future research direction that could enhance the accuracy, efficiency, and effectiveness of these systems.…”
mentioning
confidence: 99%