Open Access   Article Go Back

A Study on Biometric Technology and Access Control System: Network Security

R. Lathwal1 , V.K. Saroha2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-7 , Page no. 31-35, Jul-2014

Online published on Jul 30, 2014

Copyright © R. Lathwal, V.K. Saroha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Lathwal, V.K. Saroha, “A Study on Biometric Technology and Access Control System: Network Security,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.7, pp.31-35, 2014.

MLA Style Citation: R. Lathwal, V.K. Saroha "A Study on Biometric Technology and Access Control System: Network Security." International Journal of Computer Sciences and Engineering 2.7 (2014): 31-35.

APA Style Citation: R. Lathwal, V.K. Saroha, (2014). A Study on Biometric Technology and Access Control System: Network Security. International Journal of Computer Sciences and Engineering, 2(7), 31-35.

BibTex Style Citation:
@article{Lathwal_2014,
author = {R. Lathwal, V.K. Saroha},
title = {A Study on Biometric Technology and Access Control System: Network Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2014},
volume = {2},
Issue = {7},
month = {7},
year = {2014},
issn = {2347-2693},
pages = {31-35},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=202},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=202
TI - A Study on Biometric Technology and Access Control System: Network Security
T2 - International Journal of Computer Sciences and Engineering
AU - R. Lathwal, V.K. Saroha
PY - 2014
DA - 2014/07/30
PB - IJCSE, Indore, INDIA
SP - 31-35
IS - 7
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3879 3747 downloads 3751 downloads
  
  
           

Abstract

Biometrics system used in worldwide in nature last few years. Using biometric we can combine with other tools to perform more security function and it is very easier to use verification solutions. It is easy to remember because it based on physiological and behavioral characteristics. In order to avoid problems of forgetting password and ID codes, biometric based authentication helps us in verifying your finger prints, iris pattern and voice for your identity at A.T.M�s, Airports etc�, you can unlock your houses, withdrawing money from a bank with just a blink of an eye, a tap of your finger or by just showing your face. A new technology come under consideration of biometric that is biometric attendance system. This system is very helpful with various patterns like face recognition, iris recognition, fingerprint etc.

Key-Words / Index Term

Biometric, Multimodal Biometric System, Biometric Access Control System, Attendance System, Digital Signature

References

[1]. http://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.htm
[2]. "Biometrics: Overview". Biometrics.cse.msu.edu. 6 September 2007. Retrieved 2012-06-10.
[3]. http://www.creativeworld9.com/2011/03/abstract-on-biometrics.html
[4]. http://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.htm
[5]. http://www.biometrics.gov/documents/biointro.pdf
[6]. "Questions Raised About Iris Recognition Systems". Science Daily. 12 July 2012.
[7]. Sahoo, SoyujKumar; Mahadeva Prasanna, SR, Choubisa, Tarun (1 January 2012). "Multimodal Biometric Person Authentication : A Review". IETE Technical Review 29 (1): 54. doi:10.4103/0256-4602.93139. Retrieved 23 February 2012.
[8]. Saylor, Michael (2012). The Mobile Wave: How Mobile Intelligence Will Change Everything. Perseus Books/Vanguard Press. p. 99.
[9]. Bill Flook (3 October 2013). "This is the `biometric war` Michael Saylor was talking about". Washington Business Journal.
[10]. http://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.htm
[11]. Jain, A.K.; Bolle, R.; Pankanti, S., eds. (1999). Biometrics: Personal Identification in Networked Society. Kluwer Academic Publications. ISBN 978-0-7923-8345-1.
[12]. Characteristics Of Biometric Systems". Cernet.
[13]. http://www.zicom.com/index.php/safebusiness-access-control-system
[14]. http://www.biometricsystem.in/
[15]. http://www.bioenabletech.com/biometric-attendance-system.html
[16]. http://www.biometricsystem.in/Biometrics-Attendance-System.html
[17]. http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies
[18]. http://patentlyapple.typepad.com/.a/6a0120a5580826970c0120a58a45ce970c-500wi
[19]. http://pubs.sciepub.com/ajcrr/2/1/2/figure/3