I. Introduction
Our modern day era faces a never ending problem of securing our most integrated data and messages. The chief problem is to protect our data in a unique way that could only be worked upon by the sender and the receiver. Most of the traditional techniques stresses on keys that are generated by generic function, algorithms or in random key generators. But question remains whether this key is unique and reliable in nature. Moreover how can these keys be unique to one and only one person? The answer to this would be Biometric Cryptosystems. Biometric Cryptosystems are the newest inventions in the field of security. The fundamentals of this Biometric Cryptosystem lies on the very fact that some features of human body are significantly unique to each and every person in the world, such as fingerprint, DNA sequence, Iris, etc. Using those biometric we can generate an exclusive key that will be unique for each and every individual. With these keys we can encrypt our message. And as because these keys are uniquely generated for individual person there’s no chance that there will be another matching key. Hence, eavesdropper or third unwanted parties have to acquire two set of keys which adds up to security level of the encryption and hence protect the message from unwanted third parties from acquiring our secret message.[2]
II. Types of biometrics
Biometrics are of two types: Physiological and Behavioural.
A. Physiological Biometrics
The recognition of physiological
Biometrics technology aims at utilizing major and distinctive characteristics such as behavioral or biological, for the sake of positively indentifying people. With the help of a combination of hardware and specific identifying sets of rules, a basic human attribute, automated biometric recognition mimics to distinguish and categorize other people as individual and unique. But the challenges surrounding biometrics are great as well.
The thing with biometrics is that it works great only if the verifier can verify two things: Firstly, that the biometric to be used has come from the intended person at the time of verification, and Secondly, which the biometric should match with the master biometric entry in the file database. If the system can't do that, it can't work. Biometrics are good in uniquely identifying the people, butat the same time they are not secrets and cannot be trusted [1].
In today’s world of instant connectivity and information at users’ fingertips, it’s vital that sensitive information is safeguarded against those who seek to do personal harm and profit from gaining access to the data. The key behind keeping information safe is the method in which it’s protected and encrypted. In order to appreciate how information is secured, users must understand the encryption concepts behind it. To do this, one must comprehend the current encryption standards, the trends and developments in encryption technology, the importance of securing data, the government’s regulations pertaining to encryption, the companies involved in research and implementation, the implications of leaked or stolen data, and a brief look into
Each person's DNA is unique . DNA biometrics technology is highly unique .The chance of two individuals having the exact same DNA is extremely impossible .Moreover ,DNA biometric technology impossible to fake because each person's DNA contains some unique trait from parents. DNA biometrics technology used in security systems but this technology is still new and it is hardly applied in public.[15]
Biometrics is a method of identifying an individual based on characteristics that they possess, typically physiological features such as a fingerprint, hand, iris, retina, face, voice, and even DNA. Some methods of biometrics security even use multiple physiological features or multimodal biometrics to provide superior security than a single form of biometrics can provide. Why are biometrics important in the field of information security? Biometrics provide a remarkable amount of security for information because biometrics are unique to each person, and thus cannot be lost, copied, or shared with another individual. This security allows for biometrics to provide a means to reliability authenticate personnel. The importance of biometrics can be further divided into the history of biometrics and why it was devised, past implementations of biometrics, current implementations of biometrics, and future implementations of biometrics.
Biometric Authentication refers to the usage of software that looks for physical markers to allow access to a system. Some of the most commonly used physical markers are fingerprints, face-recognition, voice-recognition, and iris-recognition (Williams & Sawyer, 2015). As no two humans are exactly alike biometics are less likely to be hacked, although it is not impossible.
Technology is always improving, and new software is always being developed. One of these new technologies that have been developed is biometrics. Biometrics is the process by which a person's unique physical and other traits are detected and recorded by an electronic device or system as means of confirming identity (Dictionary.com, 2013). In recent years, the FBI has employed new biometrics technology.
The world is inhabited by people of unique personalities and traits. People notice one another’s physical appearances, talents, and habits, but their stories are unknown to the world’s prying eyes. A secure world never allows an individual to go out of their comfort zone. Only in times of trial will an individual grow and prosper. Such adversity develops and molds a person’s character, revealing obscure skills and dexterity.
In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become
We live in a world today, in which technology moves at a very rapid pace. Many of these technological advances can be used to make our everyday lives easier and safer. One of these new technologies is Biometrics. Biometrics is the process of measuring a person’s physical properties. This would include measuring things like fingerprints, retinas, odor, vein structure on the back of the hand and many other things. Biometrics is a very important topic because it would create better security precautions for certain places that need to be secure. Biometrics will make our society safer by only allowing authorized people out of secure facilities and by keeping the unauthorized people out. Throughout the rest of this
The human body is unique to every person and we can essentially use this to our advantage. Ocular-base biometric devices scan either the retina or the iris, and the image is used to authenticate the user. The human eyes are unique to each person, and creating an exact replica of the eye without the subject is virtually impossible. Using the eyes to authenticate user offer advantages over fingerprint scanner. Fingerprint scanners use the skin in the finger to authenticate the user, and the problem arises when the skin
a significant amount of data security breaches are due to either employee oversight or poor business process. This presents a challenge for businesses as the solution to these problems will be far greater than simply deploying a secure content management system. Business processes will need to be examined, and probably re-engineered; personnel will need to be retrained, and a cultural change may be required within the organization. These alone are significant challenges for a business. A recent example of what is probably unintentional featured an Australian employment agency’s web site publishing “Confidential data including names, email addresses and passwords of clients” from its database on the public web site. An additional
Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked two questions. The first question I asked was do you know what encryption means and the second question I asked was have you ever heard of anybody using encryption. This is a chart of the information I received:
One of the most important ways that biometric technology is impacting security lies within the confines of computer information systems. The government, the military, and large corporations need to have complete assurance that the data and information stored on their networks and databases are only available to users who have been authorized to view such material.
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.