11Analysis of Data Anonymization Techniques in Biometric Authentication System
Harini S.1*, Dharshini R.2, Agalya N.2, Priya R. L.3 and Ajay Nair3
1Department of Artificial Intelligence and Data Science, Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu, India
2Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam, Erode, Tamil Nadu, India
3Department of Computer Engineering, VESIT College, Maharashtra, India
Abstract
In today’s smart era, recent advances in digital world technologies paved a way to sneak, access, and analyze sensitive personal data like bank transfer details, medical records, and social media activities. This may result in data breach and privacy violations. As a result, the protection of data and privacy management nowadays has become a hard challenge. Many solutions for securing data have been offered as of today, such as biometric authentication systems that use the palm vein throughout the authentication process. Furthermore, by adopting data anonymization techniques, the database records can be rendered anonymous, ensuring that the data is properly protected. It does not, however, provide the essential capacity for data protection against attackers. There is a risk of data/ information being leaked to the unauthenticated population. Attackers can manipulate the user’s unique authentication identity for stealing data. To overcome this risk, this paper proposes a biometric authentication system by means ...
Get Automated Secure Computing for Next-Generation Systems now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.