Biometric System Penetration in Resource Constrained Mobile Device

dc.categoryJournal Article
dc.contributor.authorPadmavathi, G
dc.date.accessioned2017-03-28T22:20:02Z
dc.date.available2017-03-28T22:20:02Z
dc.date.issued2013
dc.departmentComputer Scienceen_US
dc.description.abstractOver the past few years, the usage of mobile devices to access data has becoming more frequent, and the usage of mobile devices in the applications such as web-browsing, email, multimedia, entertainment applications (games, videos, and audios), navigation, trading stocks, electronic purchase, banking and health care are increased, therefore data security is essential and also it becomes a challenge in securing the data in the mobile device. User authentication schemes such as Password or Personal Identllication Number (PIN) based authentication in mobile device is a difficult process for providing safe access to precious, private information or personalized services. To address these problems in the mobile devices, biometric system can be developed which are more secure, affordable and memorable authentication scheme based on graphical assistance, images and audio. We believe that biometric authentication is the most secure approach among other authenUcaUon mechanism. This paper discusses the various features of biometrics and mobile device security threats.en_US
dc.identifier.urihttps://ir.avinuty.ac.in/handle/avu/2241
dc.langEnglishen_US
dc.publisher.nameInternational Journal on Bioinformatics And Biosciencesen_US
dc.publisher.typeInternationalen_US
dc.titleBiometric System Penetration in Resource Constrained Mobile Deviceen_US
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
CS.international_2013_003.pdf
Size:
3.37 MB
Format:
Adobe Portable Document Format
Collections