Author/Authors :
Arshad, M. Junaid UET - Department of Computer Science and Engineering, Pakistan , Iqbal, Arjumand UET - Department of Chemistry, Pakistan , Farooq, Amjad UET - Department of Computer Science and Engineering, Pakistan , Khan, M. Usman Ghani UET - Department of Computer Science and Engineering, Pakistan , Afzal, M. UET - Department of Computer Science and Engineering, Pakistan , Wajid, Amna UET - Department of Computer Science and Engineering, Pakistan , Abdul Nasir UET - Department of Computer Science and Engineering, Pakistan
Abstract :
In today’s IT world, most of the communication is done through networking. So, security of information is very crucial. A lot of techniques have been developed for security which involves passwords, encryption, digital signatures etc. But there are chances of vulnerabilities in these techniques and hackers can break the security algorithms of these techniques. So, in this era, researchers have moved towards biometric techniques of security. It involves identification of people based on their physical characteristics or psychological behaviors. A choice of biometric method to be used is made depending on the level of security required and the goals of the system. Biometric identification is very excellent and secure way of authenticating people. But it can also suffer from security threats, if proper design considerations are not taken into account. This work presents details of biometric techniques and a detailed comparison of most famous biometric techniques.