List of Journals    /    Call For Papers    /    Subscriptions    /    Login
By Author By Title
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 Call For Papers CFP
 Special Issue CFP
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 Reviewer Guidelines
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 Browse CSC Library
 Open Access Policy
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Subscriptions Agents
 Order Form
Protecting Identity using Biometrics Protection Systems
Full text
International Journal of Biometrics and Bioinformatics (IJBB)
Table of Contents
Download Complete Issue    PDF(1.42MB)
Volume:  4    Issue:  3
Pages:  100-135
Publication Date:   July 2010
ISSN (Online): 1985-2347
125 - 135
Fathimath Sabena - India
Ali Dehghantanha - Malaysia
Andy Seddon - Malaysia
Published Date   
CSC Journals, Kuala Lumpur, Malaysia
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
KEYWORDS:   Biometrics, Identity Management, Biometric Systems 
This Manuscript is indexed in the following databases/websites:-
1. Directory of Open Access Journals (DOAJ)
2. Docstoc
3. Scribd
5. WorldCat
6. Google Scholar
7. Academic Index
8. Bielefeld Academic Search Engine (BASE)
9. refSeek
10. iSEEK
11. Socol@r
12. Academic Journals Database
13. Libsearch
14. slideshare
Biometrics Identity Management (BIdM) is a newly rising and developing discipline which could be expressed as the study of verification and validation methods for the next generation. The two key terms enclosed in the title of this paper are– “Biometrics Vulnerabilities” and “Identity Management”. Every one of us has an identity. By utilizing this identity along with distinctive characteristics we distinguish ourselves from one another. By cross referencing the data from both sources, a guideline that would adapt the best practices to maintain the sequence of BIdM and identity theft integrity was designed. Based on the findings a guideline is proposed to the experts and end-users to use. A walk through with the BIdM consultant was done to identify areas of improvement to fine tune the artifact. For proper identity management this guideline can be used as the processes in data collection and data maintenance procedures are included. The procedures include extracting the data from data collection for proofs, data matching and handling the data in an appropriate way. The guideline will have its proper BIdM techniques by having the best practices of tackling its vulnerabilities. Databases having biometric data are themselves a threat to privacy. While distinguishing gaps in BIdM and discovering new approaches to tackle the vulnerabilities, issues and protect such databases and increasing the awareness programs, this research can be further extended. 
1 Gordon, A., Loeb, M., Lucyshyn, W., Richardson, R., 2006, Computer Crime and Security Survey, [Online], Computer Security Institute & FBI, [Online] Available from: [Accessed on 19th July 2009]
2 Roberts, C., 2006, Biometric Technologies – Fingerprints, [Online] Available from: pdf [Accessed on 22nd July 2009]
3 Managing Australia's Borders, “The Department of Immigration and Citizenship (DIAC) [Online], Available from: systems/identity.htm [Accessed on 12th September 2009]
4 Patentdocs, 2009, Systems and Methods for Accessing a Tamperproof Storage Device in a Wireless Communication Device Using Biometric Data [Online], Available from: [Accessed on 10st October 2009]
5 Home Office – Identity and passport service, “Identity cards for airside workers”, [Online], Available from: [Accessed on 30th September 2009]
1 TechRepublic
2 yasni
3 123people
Fathimath Sabena : Colleagues
Ali Dehghantanha : Colleagues
Andy Seddon : Colleagues  
  Untitled Document
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.