Editorial - (2021) Volume 0, Issue 0
Received: 07-Oct-2021
Published:
28-Oct-2021
, DOI: 10.37421/2090-4886.2021.s3.e002
Citation: Mbire, Betty. "Fingerprint: A Strong Security Option
for Securing Smartphone Data." J Sens Netw Data Commun
S3 (2021) : e002.
Copyright: ©2021 Mbire B. This is an open-access article distributed under the terms of the creative commons attribution license which permits unrestricted
use, distribution and reproduction in any medium, provided the original author and source are credited.
Recently, a large number of smartphones are adopting fingerprint confirmation as a technique to verify their users. Fingerprint impression is not only used for unlocking today’s smartphone, but it also acts as a security measure for online payment applications. In this manner, it is crucial to get the fingerprint verification tool for dependable administrations.
Current advances in smartphone technologies empowered users to do different task utilizing their smartphones. These tasks incorporate not just basic ones like playing portable games and browsing the web, yet additionally more crucial ones, specifically, those managing with private data and financial information. With the extension of the Cyber-Physical System (CPS) idea, smartphones have come to establish a competitive stage that associates people and the surrounding physical world. Alongside the communication capacities and mobility of cellular phones, smartphones have different sensors in addition to enormously improved performances and storage space in contrast with the existing cellular phones. A solid mechanism is needed to check the identity of an individual who attempts to utilize the device. Nonetheless, traditional secret information based solutions like passwords, numeric PINs and pattern locks have security issues, for example, password assuming attacks, brute power attacks, and shoulder- surfing attacks. Anyway the "unlock" method of smartphones and the requirement for user passwords while getting to SNSs prove to be great fault in smartphone security. Hence, smartphone security ought to be upgraded through biometrics, which can compensate for the weaknesses of passwords. Additionally, they also have usability issues in light of the fact that a user should remember some information and do an unwieldy task for sign on like typing a password and drawing a pattern. To resolve these issues, fingerprint recognition is currently being utilized for a large number, for example, iPhone 5s, Galaxy S5, Blackberry, etc. Fingerprint recognition is utilized both for unlocking a smartphone and for actuating other security-basic functionalities in the smartphone, for example, for approving transactions in online payment applications.
The minutiae based fingerprint verification strategy is generally utilized fingerprint verification technique. Considering that this technique is exceptionally effective for contrasting fingerprints and the required data size is also little. A verification technique dependent on it can be miniaturized and would be useful for realtime scanning. One of the reason for extensive use of this method. Nonetheless, the minutiae based fingerprint verification technique is tormented by low execution in regions where preregistered and current input fingerprints cross-over or image of the input fingerprint is minute and the particulars extracted are lacking for verification. These issues lead to the event of broken matching, subsequently rejecting authorized user. To keep away from defective matching and further develop verification performance, numerous analysts have explored the pre-processing of fingerprint pictures for further developing fingerprint verification executions, improvement of the enlisted templates' quality, adoption of fingerprint matching process with techniques that can utilize the separated templates successfully, and templates security for defending leaks of registered templates. Many investigations on techniques for overcoming the issues related with the fingerprint matching method with strategy utilizing direction channels (rather than minutiae), phase data and fingerprint images have been done.
The authors are highly appreciative to the Research Project for Young and Middle-Aged Teachers in Uganda Technology and Management University.
The authors declare that there is no conflict of interests regarding the publication of this paper.