A Study on Image Based Authentication in Automated Security Systems

Title: A Study on Image Based Authentication in Automated Security Systems
Publisher: Guru Nanak Publications
ISSN: 2278-0947
Series: Volume 5 Issue 1
Authors: Kalyanapu Srinivas, Dr. V. Janaki


Organizations like banks, financial institutes etc are the storehouses of personal identifiable information. Such information is secured by using any of the existing techniques like Password, Iris Scan etc. Due to the advancement in technology used for identity theft these organizations must take security of information very seriously. Generally Organizations follow AAA model where Authenticate users-is to make sure they are who they say they are. Authorizationthe process by which a computer system or individual grants access to a user .Accounting- the process of recording access to a resource .The methods in the AAA model ranges from username and password combinations to iris scanning. Security to information is now provided by the introduction of images. In this paper we are presenting a survey report of various methodologies of authenticating a user using images. Organizations must adapt their security systems to effectively combat hackers and thieves by selecting the right technologies. However, knowing what techniques are available in maintaining a secure environment, this paper gives insight into some of the more prevalent and effective securing technologies using images currently being implemented in large organizations today.


Authentication, Automated systems, security, privacy, images

Download Full Text

(For complimentary copy, please contact Chief_editor@innovationjournals.com)