Open Access Open Access  Restricted Access Subscription or Fee Access

Biometric Access and Security Integration

Deepti Pande Rana, Vaibhav Srivastava

Abstract


Biometric access and security integration involves the use of biometric technology, such as fingerprint recognition, facial recognition, iris recognition, or voice recognition, to authenticate and grant access to secure areas, devices, or systems. Integration of biometric technology into security systems enhances the accuracy and reliability of access control compared to traditional methods like passwords or access cards, as biometric traits are unique to individuals and difficult to forge. This paper proposes a conceptual framework for integrating biometric access and security systems within the interior design of jewelry stores, aimed at enhancing both customer experience and asset protection. With jewelry retail environments increasingly adopting advanced security measures, the synergy between biometric technology and interior design becomes crucial. Through a multidisciplinary approach encompassing principles of interior design, biometrics, and security management, this framework optimizes the seamless integration of biometric access control systems into the aesthetic and functional aspects of jewelry store interiors. Factors such as user experience, spatial configuration, aesthetic cohesion, and security effectiveness are considered to prioritize the security of valuable assets while elevating the overall ambiance and customer satisfaction. The significance of biometric access and security integration in jewelry store design, offering a guide for designers, security professionals, and stakeholders involved in creating holistic, secure, and aesthetically pleasing retail spaces.


Keywords


Biometric access, jewelry stores, customer experience, asset protection, multidisciplinary approach, security effectiveness.

Full Text:

PDF

References


Ashbourn J. Biometrics: advanced identity verification: the complete guide. Springer; 2014 Jan 13.

Catherwood PA, Finlay DD, McLaughlin JA. Subcutaneous body area networks: A SWOT analysis. In2015 IEEE International Symposium on Technology and Society (ISTAS) 2015 Nov 11 (pp. 1-8). IEEE.

Alwahaishi S, Zdrálek J. Biometric authentication security: an overview. In2020 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) 2020 Nov 6 (pp. 87-91). IEEE.

Mitra S, Wen B, Gofman M. Overview of biometric authentication. Biometrics in a data driven World: Trends, Technologies, and Challenges. 2016 Dec 1;1.

Jain AK, Kumar A. Biometric recognition: an overview. Second generation biometrics: The ethical, legal and social context. 2012 Mar 6:49-79.

Uludag U, Pankanti S, Prabhakar S, Jain AK. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE. 2004 May 18;92(6):948-60.

Alizadeh M, Abolfazli S, Zamani M, Baharun S, Sakurai K. Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications. 2016 Feb 1;61:59-80.

Fan CI, Lin YH. Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Transactions on Information Forensics and Security. 2009 Sep 15;4(4):933-45.

Sadikan SF, Ramli AA, Fudzee MF. A survey paper on keystroke dynamics authentication for current applications. InAIP Conference Proceedings 2019 Nov 11 (Vol. 2173, No. 1). AIP Publishing.

Karim N, Kanaker H, Abdulraheem W, Ghaith M, Alhroob E, Alali A. Choosing the right MFA method for online systems: A comparative analysis. International Journal of Data and Network Science. 2024;8(1):201-1




DOI: https://doi.org/10.37591/joma.v10i3.7743

Refbacks

  • There are currently no refbacks.