Skip to Main Content
In this paper, identity management is discussed. Identification and authentication of individuals accessing computer systems have always been components of cybersecurity. This paper reviews the technical details of biometric identification and verification. It covers the major approaches (for example, fingerprints and irises) with respect to acquisition of biometric data, matching techniques, antispoofing techniques, and current standards. And also covers biometrics' uses and limitations.