A Comprehensive Review of Various Security Features
DOI:
https://doi.org/10.55524/Keywords:
Authentication, Biometric, Duplicity, Identification, Validation, VerificationAbstract
In recent decades the subject of "handwritten authentication verification" has been investigated extensively, although there is still an open research issue. People are familiar with stylus and paperwork for legal transaction certification and approval. Due to the expansion of the usage of handwritten authentications, it is necessary to identify authentications by a person manually. Authentication is a social biometric which is defined by a social characteristic that a person learns over time and becomes his unique identity. This article explains the significance of the offline system and gives an overview of several methods in many areas. As this is a region under consideration, the overview deals with a number of examples. The objective of an independent confirmation system is to distinguish whether a given authentication can be certified or duplicated. The result was a tough task in particular in the offline (static) scenario, where the dynamic data about the objectivism process is not available. Although extensive research has been done in this field but there are more opportunities of more research in future.
Downloads
References
Patel D. MULTIMODAL BIOMETRIC SYSTEMS: A REVIEW. Int J Adv Res Comput Sci. 2018;
Yasin A, Abuhasan A. Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT). Int Arab J Inf Technol. 2018;
Islam SKH, Khan MK, Li X. Security analysis and improvement of “α more secure anonymous user authentication scheme for the integrated EPR information system.” PLoS One. 2015;
Goswami L, Kaushik MK, Sikka R, Anand V, Prasad Sharma K, Singh Solanki M. IOT Based Fault Detection of Underground Cables through Node MCU Module. In: 2020 International Conference on Computer Science, Engineering and Applications, ICCSEA 2020. 2020.
Solanki MS, Sharma DKP, Goswami L, Sikka R, Anand V. Automatic Identification of Temples in Digital Images through Scale Invariant Feature Transform. In: 2020 International Conference on Computer Science, Engineering and Applications, ICCSEA 2020. 2020.
Solanki MS, Goswami L, Sharma KP, Sikka R. Automatic Detection of Temples in consumer Images using histogram of Gradient. In: Proceedings of 2019 International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2019. 2019.
Anand V. Photovoltaic actuated induction motor for driving electric vehicle. Int J Eng Adv Technol. 2019;
Singh D. Robust controlling of thermal mixing procedure by means of sliding type controlling. Int J Eng Adv Technol. 2019;
Lin TH, Lee TF. Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems. J Med Syst. 2014;
Prakash P, Radha, Kumar M, Pundir A, Puri S, Prakash S, et al. Documentation of commonly used ethnoveterinary
medicines from wild plants of the high mountains in shimla district, himachal pradesh, india. Horticulturae. 2021; [11] Catlos EJ, Perez TJ, Lovera OM, Dubey CS, Schmitt AK, Etzel TM. High-Resolution P-T-Time Paths Across Himalayan Faults Exposed Along the Bhagirathi Transect NW India: Implications for the Construction of the Himalayan Orogen and Ongoing Deformation. Geochemistry, Geophys Geosystems. 2020;
Agarwal A, Agarwal S. Morbid Adherent Placenta Score: A Simple and Practical Approach on Application of Placenta Accreta Index. Journal of Ultrasound in Medicine. 2021.
Singh AP, Chandak S, Agarwal A, Malhotra A, Jain A, Khan AA. Utility of High-Resolution Sonography for Evaluation of Knee Joint Pathologies as a Screening Tool. J Diagnostic Med Sonogr. 2021;
Mahat RK, Panda S, Rathore V, Swain S, Yadav L, Sah SP. The dynamics of inflammatory markers in coronavirus disease-2019 (COVID-19) patients: A systematic review and meta-analysis. Clinical Epidemiology and Global Health. 2021.
Wang C, Ma M, Zhao Z. An enhanced authentication protocol for WRANs in TV white space. Secur Commun Networks. 2015;
Makhdoom I, Abolhasan M, Ni W. Blockchain for IoT: The challenges and a way forward. In: ICETE 2018 - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. 2018.
Maini E, Venkateswarlu B, Maini B, Marwaha D. Machine learning–based heart disease prediction system for Indian population: An exploratory study done in South India. Med J Armed Forces India. 2021;
Hussain S, Singh A, Habib A, Hussain MS, Najmi AK. Comment on: “Cost Effectiveness of Dialysis Modalities: A Systematic Review of Economic Evaluations.” Applied Health Economics and Health Policy. 2019.
Aliya S, Kaur H, Garg N, Rishika, Yeluri R. Clinical Measurement of Maximum Mouth Opening in Children Aged 6-12. J Clin Pediatr Dent. 2021;
Kumar N, Singh A, Sharma DK, Kishore K. Novel Target Sites for Drug Screening: A Special Reference to Cancer, Rheumatoid Arthritis and Parkinson’s Disease. Curr Signal Transduct Ther. 2018;
Goswami G, Goswami PK. Artificial Intelligence based PV-Fed Shunt Active Power Filter for IOT Applications. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.
Pal S, Pal U, Blumenstein M. Signature-based biometric authentication. Stud Comput Intell. 2014;
Emmanuel E, Edebatu D, Catherine Ada Ngozi N. Vulnerability of Biometric Authentication System. Int J Innov Res Sci Eng Technol (An ISO Certif Organ. 2016;
Makhdoom I, Abolhasan M, Ni W. Blockchain for IoT: The Challenges and a Way Forward. In 2018.
Siddiqui AT. Biometric Authentications to Control ATM Theft. Asian J Technol Manag Res. 2015;