Android Notes using Finger Print Authentication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 1

Research Paper | Information Technology | India | Volume 10 Issue 5, May 2021

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Android devices apps are secured using various mechanisms like pattern, pin, and password. Finger print Authentication technology accepted by various android apps manufactures for better security and with change in technology. Android Fingerprint APIs are bringing user authentication to a whole new level, making it fast and secure. Unlocking an app with a single touch is one of the favourite features in android devices. This application uses the fingerprint technology for authentication in which capacitive fingerprint scanners generate an image of the ridges and valleys that make up a fingerprint. But instead of sensing the print using light, the capacitors use electrical current. The sensor is made up of one or more semiconductor chips containing an array of tiny cells and that helps in the security of the data stored in these apps.

Keywords: Android, Biometrics, Authentication, Security, Privacy, digital fingerprint processing, mobile integration, fingerprint recognition on Android platform

Edition: Volume 10 Issue 5, May 2021

Pages: 174 - 178

Share this Article

How to Cite this Article?

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal, "Android Notes using Finger Print Authentication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR21405101230, Volume 10 Issue 5, May 2021, 174 - 178

Enter Your Email Address




Similar Articles with Keyword 'Android'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 101

Informative Article, Information Technology, India, Volume 6 Issue 3, March 2017

Pages: 1283 - 1284

Android Security, An Overview

Raj Singh Gaur

Share this Article

Downloads: 103

Review Papers, Information Technology, India, Volume 3 Issue 9, September 2014

Pages: 2342 - 2346

Cloud Compiler Based on Android

Vijay R. Sonawane, Guruprasad S. Iyer, Dilip K. Jaiswal

Share this Article

Downloads: 105

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2307 - 2309

Development of Android Application for speech Quality Measurement

Laishram Rahul, Vinoth Kumar

Share this Article

Downloads: 106

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2917 - 2919

E Voting Using Android System

Namrata Thakur, Vrushalee Ambavale

Share this Article

Similar Articles with Keyword 'Biometrics'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 102

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Downloads: 105

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Downloads: 114

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 2180 - 2182

Automated Human Identification Using Ear Imaging

Pankti Mehta, Vrudhhi Shah, Mansingh Rathod

Share this Article

Downloads: 133 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 104

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Downloads: 105

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Downloads: 105

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 7 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 369 - 371

Performing Attacks on Radio Frequency and Embedded based Systems

Preeti Rana

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Downloads: 99

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 105

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1654 - 1660

Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN

Smitha Iddalgave, Sumana M

Share this Article



Top