Skip to Main Content
Automated Secure Computing for Next-Generation Systems
book

Automated Secure Computing for Next-Generation Systems

by Amit Kumar Tyagi
December 2023
Intermediate to advanced content levelIntermediate to advanced
480 pages
16h 7m
English
Wiley-Scrivener
Content preview from Automated Secure Computing for Next-Generation Systems

11Analysis of Data Anonymization Techniques in Biometric Authentication System

Harini S.1*, Dharshini R.2, Agalya N.2, Priya R. L.3 and Ajay Nair3

1Department of Artificial Intelligence and Data Science, Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu, India

2Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam, Erode, Tamil Nadu, India

3Department of Computer Engineering, VESIT College, Maharashtra, India

Abstract

In today’s smart era, recent advances in digital world technologies paved a way to sneak, access, and analyze sensitive personal data like bank transfer details, medical records, and social media activities. This may result in data breach and privacy violations. As a result, the protection of data and privacy management nowadays has become a hard challenge. Many solutions for securing data have been offered as of today, such as biometric authentication systems that use the palm vein throughout the authentication process. Furthermore, by adopting data anonymization techniques, the database records can be rendered anonymous, ensuring that the data is properly protected. It does not, however, provide the essential capacity for data protection against attackers. There is a risk of data/ information being leaked to the unauthenticated population. Attackers can manipulate the user’s unique authentication identity for stealing data. To overcome this risk, this paper proposes a biometric authentication system by means ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies

Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies

Carey Parker

Publisher Resources

ISBN: 9781394213597Purchase Link