Algorithms for efficient biometric systems to mitigate the integrity of a distributed database

Segundo Moises Toapanta Toapanta, Alvaro Andres Coca Cruz, Luis Enrique Mafla Gallegos, Jose Antonio Orizaga Trejo

Research output: Contribution to conferencePaper

3 Scopus citations

Abstract

The problems of information security are persistent in the business environment and public and private institutions for this reason, in this research biometric algorithms are considered as an alternative to mitigate the security of information; through biometric authentication used for the identification and verification of users based on the physical characteristics of the individual such as fingerprint, face, iris and voice. The objective is to perform the analysis of efficient biometric algorithms to mitigate the integrity of a distributed database. The deductive method was used to analyze the information of the articles related to this investigation. It resulted from this research an alternative of modified algorithm that can be applied in different types of authentication by biometrics, but not in all functions efficiently. It was concluded that, depending on the type of authentication that will be implemented; fingerprint, facial recognition, iris, voice, an efficient algorithm of the analyzed was used; with the objective of mitigating the integrity of the information in a distributed database without relying on the technological infrastructure.

Original languageEnglish
DOIs
StatePublished - 17 Aug 2018
Externally publishedYes
EventCITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems - Colmar, France
Duration: 11 Jul 201813 Jul 2018

Conference

ConferenceCITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems
Abbreviated titleCITS 2018
Country/TerritoryFrance
CityColmar
Period11/07/1813/07/18

Keywords

  • DTW
  • HMM
  • ORB
  • SIFT
  • SURF
  • algorithm
  • biometric
  • integrity

Fingerprint

Dive into the research topics of 'Algorithms for efficient biometric systems to mitigate the integrity of a distributed database'. Together they form a unique fingerprint.

Cite this