From the casual users of the home computer to the business, corporations and government, there is a great concern about the security of files, systems, and the ability of technology to protect us from unauthorized access. Computer software companies have put a great effort to meet the demand for better security of sensitive, confidential, and classified information. This is where the biometric technology is getting widely adopted. In recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. By using biometrics, authentication is directly linked to the person, rather than their token or password.
Biometric authentication is any process that validates the identity of a user who wishes to sign into a system by measuring some intrinsic characteristic of that user. Biometric samples include fingerprints, retinal scans, face recognition, voice prints and even typing patterns. In this article, we will discuss the concept of biometric authentication, the different types of biometric authentication, compare their pros and cons and the technology current maturity level. Finally, we will conclude our paper with findings and recommendations on how biometric authentication could be used in the university.
IT Innovation Centre also conducted the experiments of developing a fingerprint based security and access tracking system, also a face detection and recognition prototype and give insight on how feasible it is to use the technology in a university environment.
Read the full report of “Fingerprint security and access tracking system”
Read the full report of “Face detection and recognition prototype”
Computer software companies have put a great effort to meet the demand for better security of sensitive, confidential, and classified information. Biometric samples include fingerprints, retinal scans, face recognition, voice prints and even typing patterns.