Biometric authentication – Overview and Experiments

Published: Posted on

From the casual users of the home computer to the business, corporations and government, there is a great concern about the security of files, systems, and the ability of technology to protect us from unauthorized access. Computer software companies have put a great effort to meet the demand for better security of sensitive, confidential, and classified information. This is where the biometric technology is getting widely adopted. In recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. By using biometrics, authentication is directly linked to the person, rather than their token or password.

Biometric authentication is any process that validates the identity of a user who wishes to sign into a system by measuring some intrinsic characteristic of that user. Biometric samples include fingerprints, retinal scans, face recognition, voice prints and even typing patterns. In this article, we will discuss the concept of biometric authentication, the different types of biometric authentication, compare their pros and cons and the technology current maturity level. Finally, we will conclude our paper with findings and recommendations on how biometric authentication could be used in the university.

Read the full report

IT Innovation Centre also conducted the experiments of developing  a fingerprint based security and access tracking system, also a face detection and recognition prototype and give insight on how feasible it is to use the technology in a university environment.

Read the full  report of “Fingerprint security and access tracking system”

Read the full report of “Face detection and recognition prototype”

1 thought on “Biometric authentication – Overview and Experiments”

  1. Computer software companies have put a great effort to meet the demand for better security of sensitive, confidential, and classified information. Biometric samples include fingerprints, retinal scans, face recognition, voice prints and even typing patterns.

Leave a Reply

Your email address will not be published. Required fields are marked *