Methods of biometric identification and authentication

Richard Rinaldo Konggoasa,  NIM       : 2301884141

Methods of biometric identification and authentication
Biometric identification techniques may be implemented on mobile devices either via the use of external biometric sensors or through the use of the device’s built-in biometric sensors. Consider a few biometric authentication techniques that have previously been implemented in real-time, such as the following:
In this mode, more than 200 distinct points of data are collected and saved in the institution’s database, making it the most comprehensive option available. iris scanning is widely considered to be the most reliable method of validating a user’s identification by many biometric specialists.
Voice Recognition is claimed to perform best when used in conjunction with another authentication method. Voice recognition mobile applications and ATMs were introduced by HSBC at the beginning of the year, allowing consumers to make transactions without the need for passwords or card swipes to save time and improve convenience.
ATMs, internet banking, and mobile banking all employ facial recognition to verify users’ identities, and facial recognition may be used to verify users at ATMs. When a user’s surroundings, such as illumination or positioning of their face, is taken into consideration, this sort of authentication is considered a less effective security method.
The scanning of a fingerprint is now the most widespread kind of biometric identification, with fingerprint scans being utilized on a large number of mobile devices throughout the globe.
Vein Pattern Authentication: Vein pattern authentication is based on the unique pattern of veins in the user’s palm, finger, or eye to identify them as the owner of the device. It is possible to copy the vein patterns of the user, although they are not as simple to duplicate as fingerprints.
Passwords, PINs, and security questions are becoming less safe as biometric technology advances, making them a less secure alternative for mobile banking. Even while companies are aware that no form of security can be guaranteed to be 100% secure, they should use the finest options available to safeguard their customers and themselves.

References

Bhattacharyya, D., Ranjan, R., Alisherov, F. A., & Choi, M. (2009). Biometric Authentication: A Review. Research Gate.

Rui, Z., & Yan, Z. (2019). A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification. IEEE Access.

Dicky Hida Syahchari