The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Access control and security within higher education institutions are of paramount importance in safeguarding sensitive information and resources. Conventional authentication methods, such as passwords and identification cards, have proven susceptible to security breaches and identity theft. To address these vulnerabilities, this paper presents a novel biometric authentication scheme tailored to the unique needs of higher education institutions. Deploying a trustworthy user authentication system became a key responsibility for both access control and securing user's private data with the rapid rise of electronic crimes and their connected difficulties. For both private and public use, human biometric features including voice, finger, iris scanning, face, signature, and other features offer a solid security level. This paper provides a comprehensive overview of the biometric authentication scheme, outlining its architecture, functionality, and security measures. We also present the results of a pilot implementation within a higher education institution, demonstrating improved access security and user satisfaction. Ethical considerations and privacy safeguards are discussed to ensure responsible biometric data handling. For a long time, numerous biometric authentication solutions have been considered. owing to the distinctiveness of human biometrics, which was important in thwarting imposters' attacks. Only a few of the key issues endangering system integrity and impeding effective service delivery include identity theft, spoofing, and the reliability of authentication systems in higher education institutions. From the experiment the total number of tests was 15, as the threshold was one attempt. While fingerprint authentication typically took 2.67 seconds, palm vein authentication often took 9.15 seconds. Therefore, the palm vein was slower than the fingerprint in terms of speed. The structure of the hand and the distance between the palm and the scanner were the determining elements in pal's slow authentication speed. The palm vein system has a 93.33% accuracy rate compared to the fingerprint system's 60% accuracy rate, making it the preferable model to use in a higher education setting. A biometric system's success or failure is influenced by a variety of variables and application domains. The purpose of this work is to discuss an appropriate biometric authentication model that may be used to improve the reliability of biometric systems in institutions of higher learning. The proposed biometric authentication scheme offers a forward-looking solution to the access integrity challenges faced by higher education institutions. By adopting this technology, institutions can bolster their security posture, protect sensitive data, and provide a more convenient and secure access experience for students, faculty, and staff.

Keywords

Authentication, Integrity, attacks, accuracy, security
User
Notifications
Font Size