Biometric in Cyber Security: A Mini Review

被引:1
作者
Debas, Elhaam Abdulrahman [1 ]
Alajlan, Razan Sulaiman [1 ]
Rahman, M. M. Hafizur [1 ]
机构
[1] King Faisal Univ, Dept Comp Networks & Commun, CCSIT, Al Hufuf 31982, Al Hassa, Saudi Arabia
来源
2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC | 2023年
关键词
cybersecurity; biometric; biometric identification; authentication; security;
D O I
10.1109/ICAIIC57133.2023.10067017
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Our lives totally depend on computers and mobile devices. Nowadays, we see a massive development in the digital world that makes it easy to stay in touch with friends and family and even work remotely. The growth led to losses and distress caused by cyber-attacks, which attempt to harm by unauthorized access. Cybersecurity is a major issue in our digital world, while cybercrime is increasing. The banking and finance sectors have started to rely on biometric security systems for their apps and services. Biometric identification uses unique human characteristics to authenticate a person's identity, such as voice/speech recognition, fingerprint recognition, facial recognition, iris recognition, signature dynamics, etc. Biometric technology is used in banking, e-commerce, account login, access control, etc, which can be considered a valuable measure against cybercrime. Biometrics is a key to the future of cybersecurity and safeguards against cybercrime.
引用
收藏
页码:570 / 574
页数:5
相关论文
共 21 条
  • [1] Alam S, 2022, CYBERSECURITY PRESEN
  • [2] Alariki A. A., 2018, REV FINGERVEIN BIOME
  • [3] Spoofing detection on adaptive authentication System-A survey
    Baaqeel, Hind
    Olatunji, Sunday
    [J]. IET BIOMETRICS, 2022, 11 (02) : 87 - 96
  • [4] Bhattacharyya Debnath., 2009, INT J UAND ESERVICE, V2, P29
  • [5] Farazdaghi E., 2021, INT ARCH PHOTOGRAMME
  • [6] Gomez-Barrero M, 2022, IEEE Transactions on Technology and Society
  • [7] Biometric authentication: Assuring access to information
    Harris, Austin Jay
    Yen, David C.
    [J]. Information Management and Computer Security, 2002, 10 (01): : 12 - 19
  • [8] Hummel R., 2021, STEPS SCI TECHNOLOGY, V5
  • [9] Jain R., 2015, INT J ADV SCI RES, V3
  • [10] Labati RD, 2012, COMM COM INF SC, V314, P3