The problems of information security are persistent in the business environment and public and private institutions for this reason, in this research biometric algorithms are considered as an alternative to mitigate the security of information; through biometric authentication used for the identification and verification of users based on the physical characteristics of the individual such as fingerprint, face, iris and voice. The objective is to perform the analysis of efficient biometric algorithms to mitigate the integrity of a distributed database. The deductive method was used to analyze the information of the articles related to this investigation. It resulted from this research an alternative of modified algorithm that can be applied in different types of authentication by biometrics, but not in all functions efficiently. It was concluded that, depending on the type of authentication that will be implemented; fingerprint, facial recognition, iris, voice, an efficient algorithm of the analyzed was used; with the objective of mitigating the integrity of the information in a distributed database without relying on the technological infrastructure.
|State||Published - 17 Aug 2018|
|Event||CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems - Colmar, France|
Duration: 11 Jul 2018 → 13 Jul 2018
|Conference||CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems|
|Abbreviated title||CITS 2018|
|Period||11/07/18 → 13/07/18|