Four-Level Biometric Security System to Protect the Crucial Information from Unauthorized Access
Abhishek Sharma1, Sandeep Kumar Gupta2, Abhishek Pandey3, Giridhari Paul4, Biplab Kumar Sarkar5, Ram Gopal6
1Abhishek Sharma, Assistant Professor, Department of Computer Science and Engineering, ABES Engineering College, Ghaziabad (U.P), India.
2Sandeep Kumar Gupta, Ph.D, Professor, Sharda University, Greater Noida (U.P), India.
3Abhishek Pandey, Student, Bachelor of Technology, Department of Information Technology, KCC Institute of Technology and Management, Greater Noida (U.P), India.
4Giridhari Paul, Student, Bachelor of Technology, Department of Information Technology, KCC Institute of Technology and Management, Greater Noida (U.P), India.
5Biplab Kumar Sarkar, International National Project Director, Technical Trainer, TCS Pune, (Maharashtra), India.
6Ram Gopal, National Institute of Technology, Patna (Bihar), India.
Manuscript received on 19 February 2019 | Revised Manuscript received on 10 March 2019 | Manuscript Published on 08 June 2019 | PP: 767-772 | Volume-7 Issue-5S4, February 2019 | Retrieval Number: E11590275S419/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: As the time is changing day by day our world is getting developed in the field of digital technology. We all are connected nowadays on social networking sites such as Facebook, twitter, Instagram, and so on. Other than these networking sites we visit multiple sites on our laptops/Personal computers/Tablet or any other types of devices such as smartphones etc. So actually, we are surrounded by a huge amount of data around the world, and among those data most of the data are our personal data which is so crucial for our identity and security purposes too. With the developing technologies, threats to those important data is also increase as the there are many peoples who are trying to snoop in your important drafts or file to fetch those important data and use them to blackmail you, earn money, use you for their special purposes and even something worst which we can’t imagine. In the Indian scenario, the Indian public is less secure than the other developed countries. India has the maximum no. of Internet Data user and also many of them are not aware that how to protect their crucial Data from Snooping. While defending the data from hacking is another field of invention but in this device, we are providing security to those data or collection of Data which is stored in a specific device. By using this device, we can also protect our data from hacking threats because by giving 4 parameters of Protection in which two of them are biological database makes all the devices of the theft useless. Also, this device does not need any Internet connectivity which is a major of hackers for hacking any device hence they also helpless in hacking of this device.
Keywords: FBS System, DNA Fingerprinting, Biometric Impressions, Retina/Iris, Voice Recognition, Pin Hold.
Scope of the Article: Community Information Systems