EFFECTS OF USING BIOMETRICS AS AUTHENTICATION TOOL IN SECURITY SYSTEMS IN THE DEVELOPING COUNTRIES

  • Kingsley Otubo
Keywords: Security, Effects, Behavoural, Authentication, Physiological

Abstract

The developing countries have been faced with a lot of security challenges in the world today. Security threats in areas of food, Lives, climates, and properties have remained a thorn in the flesh in developing countries. One of the greatest concerns among the inhabitants of Nigeria as one of developing countries of the world today is how to secure Lives and properties of the citizenry. The introduction of Biometrics security technology into access control systems and other security mechanisms has brought big relief to the society. Biometrics uses the physiological and behavioural characteristics of a person to properly identify him and help to tell the class of person he belongs based on the available data.  Sometimes these treats are adversely affected in the developing countries. We used verification and authentication methodology to verify how  fingerprints and facial screening can explore the different aspects of the face structure and pattern of arrangement of the fingerprint ridges that implement a unique personal identification system are used against the owner. It measures the different components of the face structure, such as the nose position, the mouth, the distance of the left eye to right eye and the actual location of the eyes to the mouth, nose, and the fingerprint ridges and its bifurcations etc and stores the bio-information extracted from every person that enrolls in a database. These form the basic identification data. It has increased  denial of access to personal data and right of ownership to personal properties.  It has also reduced unauthorized access to confidential documents. 

Downloads

Download data is not yet available.

References

1. Amjed A. Ahmed (2018) Future Effects and Impacts of Biometrics integrations on Everyday Living. Al-Mustansiriyah Journal of Science ISSN: 1814-635X(print) Vol. 29, Issue 3, 2018. DOI: http://doi.org/10.23851/mjs.v29i3.642
2. Aranuwaand F.O. and Ogunniye G. B (2012) Enhanced Biometric Authentication System for Efficient and Reliable e-Payment System in Nigeria
3. Ayhan E. (2006) Biometric Security Technologies [On-line] http://www.biometrics.tibs.org
4. Bonsor, K and Johnson, R, (2008), How Facial Recognition Systems Work, How Stuff Works, viewed on 2nd March 2008 at available at
http://computer.howstuffworks.com/facialrecognition.htm
5. Chien Le (2011) A SURVEY OF BIOMETRICS SECURITY SYSTEM http://www.cse.wustl.edu/~jain/cse571-11/index.html
6. Cory Janssen (2015) [On-line] http://www.techopedia.com
7. Drahansky Martin et al (2012) Journal of Biomedicine and Biotechnology
Volume 2012 (2012), Article ID 626148, 14 pages http://dx.doi.org/10.1155/2012/626148
8. Gordon, G. (1992) Face Recognition Based on Depth and Curvature Features. Proc, IEEE CS Conf Computer Vision and pattern recognition. pp 129- 136
9. Iwuoha,Victor C (2018) ICT and Elections in Nigeria: Rural Dynamics of Biometrics Voting Technology Adoption, in: African Spectrum
10. Selina Oko and Janr Oruh (2012) Enhanced ATM Security System using Biometrics. International Journal of Computer Science Issues, Vol. 9, Issue 5, No 3, September 2012
11. Stanley, P., Jeberson, W., and Klinsega V.V. 2009. Biometric Authentication: A Trustworthy Technology for Improved Authentication. 2009 International Conference on Future Networks
12. Storisteanu Daniel M. L, Norman Toby L, Grigore Alexandra and Labrique Alain B (2016): Can Biometric Beat The Developing World’s Challenges: Biometrics Technology Today
13. Thamer Alhussain and Steve Drew (2012) Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory http://www.intechopen.com
Published
2020-05-31
How to Cite
Otubo, K. (2020). EFFECTS OF USING BIOMETRICS AS AUTHENTICATION TOOL IN SECURITY SYSTEMS IN THE DEVELOPING COUNTRIES . IJRDO -Journal of Computer Science Engineering, 6(5), 01-07. https://doi.org/10.53555/cse.v6i5.3601