alexa Abstract | Vulnerability of Biometric Authentication System
ISSN ONLINE(2319-8753)PRINT(2347-6710)

International Journal of Innovative Research in Science, Engineering and Technology
Open Access

Like us on:
OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access


Biometrics is a means of identifying somebody or an electronic system through some measurable, behavioral or biological characteristics such as fingerprints, voice or iris, patterns, a password etc for the singular aim of distinguishing between a specific individual and an impostor. In computer technology, biometrics relates to identity confirmation and security techniques that rely on measurable, individual biological features that recognize or verify the identity of individuals through automated means. This paper is motivated by the fact that some traditional authentication methods as mentioned above might not be sufficient to combat identification (ID) theft or ensure adequate security. For example, password could be easily forgotten, lost, guessed or stolen. Again, the Biometric System may also fail to operate as intended due to manipulations by adversaries. Thus, the objective of this work is to examine the Biometric Authentication System vulnerabilities and attack which may come in form of intrinsic limitation, adversary attacks, Biometric Encryption. The methodology used involved steganographic and water making techniques and cancelled Biometric Techniques. It was found that spoofing attacks are major threat to Biometric Systems and Liveness detection are vulnerable.

To read the full article Peer-reviewed Article PDF image

Author(s): Ekwonwune Emmanue, Nwabueze, Dominic Edebatu, Nwachukwu Catherine Ada Ngozi


Security, Biometric Authentication, Verification, Vulnerability, Attacks, Fluid dynamics

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version