Research Article

Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

Table 1

Comparison between biometrics recognition and cryptography authentication.

ā€‰Cryptography authenticationBiometrics recognition

Authentication methodDigitalAnalog
Authentication ruleWithout error toleranceWith error tolerance
Data processingData is disorderedData is processed but not disordered
Adoption of cryptography techniqueData can be encrypted and signedData cannot be encrypted or signed