Biometric Authentication: Past, Present, and Future Perspectives


  • Mohammad Mubeen SAM Global University, Bhopal, India Author


Biometric authentication, Individual identification, Authentication systems, Physiological characteristics, Behavioural characteristics


Data security is concerned with verifying confidentiality, integrity, and availability of information in all forms. Many tools and processes can support the management of data security. However, systems based on biometrics have evolved to address several aspects of data security. Biometric authentication supports the aspects of identification, verification, and non-repudiation in data security. Biometric authentication has gained popularity as a means of providing individual identification. Individual identification is crucial in many applications, and the rise in credit card fraud and identity theft in recent years indicates that this is a matter of significant concern in broader society. Personal passwords, PIN IDs, or even token-based systems all have deficiencies that limit their relevance in a well-structured society. Biometrics are used to identify the identity of an input sample when compared to a template, and they are used in cases to identify specific individuals by particular traits. Ownership-based authentication involves using one specific “token,” such as a security tag or a card, while knowledge-based authentication involves using a code or password. Standard authentication systems often use multiple inputs or samples for adequate authentication, such as specific characteristics of the sample. This research aims to enhance security as multiple samples, such as security tags and codes, are required. In this paper, we present a detailed study of Biometric Authentication, and we believe that this work will provide a comprehensive overview of the past, present, and future perspectives in this field.




How to Cite

Biometric Authentication: Past, Present, and Future Perspectives. (2024). International Journal of Innovative Research in Technology and Science, 12(2), 351-362.

Similar Articles

1-10 of 33

You may also start an advanced similarity search for this article.