Security features in fingerprint biometric system

Nowadays, embedded systems run in every setting all around the globe. Recent advances in technology have created many sophisticated applications rich with functionality we have never seen. Nonetheless, security and privacy were a common issue for these systems, whether or not sensitive data can be p...

Full description

Bibliographic Details
Main Authors: Panatik, Kamarul Zaman (Author), Kamardin, Kamilia (Author), Maidin, Siti Nurhafizza (Author), Ngu, War Hlaing (Author), Ahmed, Irfanuddin Shafi (Author), Taj, Noureen (Author), Mad Kaidi, Hazilah (Author)
Format: Article
Language:English
Published: Penerbit UTHM, 2020.
Subjects:
Online Access:Get fulltext
LEADER 02200 am a22002053u 4500
001 90569
042 |a dc 
100 1 0 |a Panatik, Kamarul Zaman  |e author 
700 1 0 |a Kamardin, Kamilia  |e author 
700 1 0 |a Maidin, Siti Nurhafizza  |e author 
700 1 0 |a Ngu, War Hlaing  |e author 
700 1 0 |a Ahmed, Irfanuddin Shafi  |e author 
700 1 0 |a Taj, Noureen  |e author 
700 1 0 |a Mad Kaidi, Hazilah  |e author 
245 0 0 |a Security features in fingerprint biometric system 
260 |b Penerbit UTHM,   |c 2020. 
856 |z Get fulltext  |u http://eprints.utm.my/id/eprint/90569/1/KamiliaKamardin2020_SecurityFeaturesinFingerprintBiometricSystem.pdf 
520 |a Nowadays, embedded systems run in every setting all around the globe. Recent advances in technology have created many sophisticated applications rich with functionality we have never seen. Nonetheless, security and privacy were a common issue for these systems, whether or not sensitive data can be protected from malicious attacks. These concerns are justified on the grounds that the past of security breaches and the resulting consequences narrate horrific stories concerning embedded systems. The attacks are now evolving, becoming more complex with technological advancements. Therefore, a new way of implementing security in embedded systems must be pursued. This paper attempts to demonstrate the incorporation of security features in fingerprint biometric system in the requirements analysis phase, ensuring the same throughout the system life cycle of embedded systems based on case study. The comparison of various biometric technologies such as face, fingerprint, iris, palm print, hand geometry gait, signature, and keystroke is presented. The aim of this paper includes analyzing, decomposing and transforming the threats and counter-measures identified during the requirements analysis using the abuse case into more specific safety requirements or functions. Furthermore, we have shown that the incorporation of security features into the biometric fingerprint system by analyzing the requirements of the system and providing the main steps for the protection of the biometric system in this paper. 
546 |a en 
650 0 4 |a T Technology (General)