Volume 65 | Issue 10 | Year 2019 | Article Id. IJMTT-V65I10P506 | DOI : https://doi.org/10.14445/22315373/IJMTT-V65I10P506
The advancements in the field of Information Technology have made information security an inseparable part of it. In this research paper, we are going to look at how authentication plays a vital role in dealing with security. The position of biometrics in the current field of security has been depicted in this work. Therefore, the review presented in this paper is about biometric authentication techniques including some future possibilities in this field.
[1] Bakkelie, K. A. E., Schneider, S. C., Hagman, C. H., & Petrin, Z. (2017). Effects of flow events and nutrient addition on stream periphyton and macroinvertebrates: an experimental study using flumes. Knowledge & Management of Aquatic Ecosystems, (418), 47.
[2] Kline, M. A., & Boyd, R. (2010). Population size predicts technological complexity in Oceania. Proceedings of the Royal Society B: Biological Sciences, 277(1693), 2559-2564.
[3] Lesk, A. (2019). Introduction to bioinformatics. Oxford University Press.
[4] Peter, S., Pratap Reddy, B., Momtaz, F., & Givargis, T. (2016). Design of secure ECG-based biometric authentication in body area sensor networks. Sensors, 16(4), 570.
[5] Pevsner, J. (2015). Bioinformatics and functional genomics. John Wiley & Sons.
[6] Singh, G. B. (2015). Introduction to bioinformatics. In Fundamentals of Bioinformatics and Computational Biology (pp. 3-10). Springer, Cham.
[7] Tepeler, A., Armagan, A., Sancaktutar, A. A., Silay, M. S., Penbegul, N., Akman, T.,& Akcay, M. (2013). The role of microperc in the treatment of symptomatic lower pole renal calculi. Journal of endourology, 27(1), 13-18.
[8] Trader, D. J., & Carlson, E. E. (2015). Chemoselective enrichment as a tool to increase access to bioactive natural products: Case study borrelidin. Bioorganic & medicinal chemistry letters, 25(21), 4767-4769.
[9] F.L.BOOKSTEIN(1996). BIOMETRICS, BIOMATHEMATICS AND THE MORPHOMETRIC SYNTHESIS. Retrieved from URL: https://link.springer.com/content/pdf/10.1007/BF02458311.pdf
[10] Al S,Bromme A,Tonnies K (2003). Using an active shape structural model for biometric sketch recognition.
[11] Retriveved from URL: https://pdfs.semanticscholar.org/1958/eebd997a2e90b88e1f8bb5345ec88408a1ce.pdf
[12] Sharif MHU, Datta R(2019). SOFTWARE AS A SERVICE HAS STRONG CLOUD SECURITY. Retrieved from URL: https://www.researchgate.net/profile/Haris_Sharif/publication/335232826_Software_as_a_Service_has_Strong_Cloud_Security/links/5d6466fc299bf1f70b0eb0f2/Software-as-a-Service-has-Strong-Cloud-Security.pdf
Md Haris Uddin Shairf, Ripon Datta, Mounicasri Valavala, "Biometrics Authentication Analysis," International Journal of Mathematics Trends and Technology (IJMTT), vol. 65, no. 10, pp. 41-44, 2019. Crossref, https://doi.org/10.14445/22315373/IJMTT-V65I10P506