Downloads: 3 | Monthly Hits: ⮙1
Research Paper | Information Technology | India | Volume 10 Issue 5, May 2021
Android Notes using Finger Print Authentication
Vaibhav Garg, Siddharth Yadav, Rishabh Kamal
Abstract: Android devices apps are secured using various mechanisms like pattern, pin, and password. Finger print Authentication technology accepted by various android apps manufactures for better security and with change in technology. Android Fingerprint APIs are bringing user authentication to a whole new level, making it fast and secure. Unlocking an app with a single touch is one of the favourite features in android devices. This application uses the fingerprint technology for authentication in which capacitive fingerprint scanners generate an image of the ridges and valleys that make up a fingerprint. But instead of sensing the print using light, the capacitors use electrical current. The sensor is made up of one or more semiconductor chips containing an array of tiny cells and that helps in the security of the data stored in these apps.
Keywords: Android, Biometrics, Authentication, Security, Privacy, digital fingerprint processing, mobile integration, fingerprint recognition on Android platform
Edition: Volume 10 Issue 5, May 2021,
Pages: 174 - 178
How to Cite this Article?
Vaibhav Garg, Siddharth Yadav, Rishabh Kamal, "Android Notes using Finger Print Authentication", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SR21405101230, Volume 10 Issue 5, May 2021, 174 - 178
How to Share this Article?
Similar Articles with Keyword 'Android'
Android Security, An Overview
Raj Singh Gaur
Cloud Compiler Based on Android
Vijay R. Sonawane, Guruprasad S. Iyer, Dilip K. Jaiswal
Similar Articles with Keyword 'Biometrics'
A Survey Based on Fingerprint Recognition - Minutiae
Annapoorani. D, Caroline Viola Stella Mery. M
A Survey on Authentication Techniques and User Recognition
Vyanktesh Dorlikar, Anjali Chandavale
Similar Articles with Keyword 'Authentication'
Introduction to Cryptography
A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes
Mokal P. H., Devikar R. N.
Similar Articles with Keyword 'Security'
Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study
Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor
Determinants for the Adoption of an Online Program Recommender System for High School Learners
Emeritha Gabriel, Jude Osakwe
Similar Articles with Keyword 'Privacy'
A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud
Dilipprasad.E, Ajay.R, K. Durairaj
CCTV Cameras Hacking and Prevention Techniques