Authors :
Merlin Balamurugan; Kumar Shanmugasamy; Saranya Balaguru
Volume/Issue :
Volume 10 - 2025, Issue 12 - December
Google Scholar :
https://tinyurl.com/5n7mc3mc
Scribd :
https://tinyurl.com/wmh2ydyw
DOI :
https://doi.org/10.38124/ijisrt/25dec062
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
Have you ever wondered what happens when your body decides to rewrite its own security code? Our team
cracked open this fascinating puzzle where your biological passwords keep changing without warning. Picture this: your
face, fingerprints, and voice – those unique markers that make you "you" – are quietly shape-shifting through time. We've
engineered three brilliant solutions that turn this identity crisis into a technological triumph. First up, our smart Adaptive
Algorithm (boasting a jaw-dropping 94.25% accuracy) learns your changing features like a best friend who notices your
new haircut. Then there's our Multi-Factor Authentication superhero, nailing it with 97.10% accuracy by combining what
you are with what you do. Our third ace, the Re-Enrollment Trigger, acts like a vigilant bouncer who knows exactly when
to update your VIP pass. We put these systems through their paces using a massive collection of real-world faces – think
13,233 photos of 5,749 different people going about their lives. Our breakthrough approach doesn't just solve the problem;
it turns your evolving identity into your strongest security asset. Whether you're aging gracefully or transforming
dramatically, our system grows with you like a digital chameleon. The results? A security framework that's as dynamic as
life itself, ready for everything from hospital check-ins to high-stakes government operations. We're not just changing the
game; we're rewriting the rules of how technology understands human identity. And the best part? This isn't science fiction
– it's your new reality in the making. Finally, we've mapped out a clear path for the future, showing how biometric security
can keep up with your life's plot twists and turns.
Keywords :
Biometric Security, Biometric Drift, Adaptive Algorithms, Multi-Factor Authentication, Identity Verification.
References :
- Anderson, R., & Smith, J. (2023). "Adaptive Biometric Systems: A Comprehensive Review." IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(3), 1123-1142.
- Bhattacharya, S., et al. (2023). "Deep Learning Approaches in Dynamic Biometric Authentication." Neural Computing and Applications, 35(2), 789-806.
- Chen, X., & Wang, Y. (2022). "The Evolution of Facial Recognition: Challenges and Solutions." Security and Privacy, 5(4), 442-461.
- Das, A. K. (2023). "Multi-Factor Authentication in the Age of Biometric Drift." Journal of Information Security, 14(2), 178-195.
- Garcia, M., et al. (2023). "Temporal Dynamics in Biometric Security Systems." ACM Computing Surveys, 55(4), 1-34.
- Hassan, N., & Kumar, R. (2022). "Privacy-Preserving Biometric Authentication: Current Trends." International Journal of Information Security, 21(5), 623-642.
- Johnson, K. L. (2023). "The Impact of Aging on Biometric Systems." Biometric Technology Today, 12(3), 9-18.
- Kim, S., & Lee, J. (2023). "Adaptive Algorithm Models for Biometric Recognition." Pattern Recognition, 136, 109124.
- Li, W., et al. (2022). "CNN-LSTM Architectures in Biometric Authentication." IEEE Access, 10, 45678-45692.
- Martinez, C. (2023). "Re-enrollment Strategies in Biometric Systems." Journal of Cybersecurity, 9(2), 156-173.
- Patel, V. M. (2023). "Liveness Detection in Modern Biometric Systems." IEEE Security & Privacy, 21(1), 44-53.
- Rodriguez, A., & Thompson, B. (2022). "Medical Conditions and Biometric Authentication." Healthcare Informatics Research, 28(4), 312-327.
- Sato, H. (2023). "Behavioral Biometrics: A Secondary Authentication Layer." International Journal of Biometrics, 15(3), 267-284.
- Singh, R., et al. (2023). "The Future of Adaptive Biometric Systems." Nature Machine Intelligence, 5(6), 489-502.
- Smith, A. B. (2022). "Siamese Networks in Biometric Recognition." Computer Vision and Image Understanding, 217, 103341.
- Taylor, M. (2023). "Ethics and Privacy in Biometric Systems." AI and Ethics, 3(2), 145-162.
- Thompson, R. (2023). "Cross-Platform Biometric Authentication." Digital Security, 4(3), 278-295.
- https://www.spiceworks.com/it-security/identity-access-management/articles/biometrics-practical-applications/
- Wang, L., & Zhang, Y. (2022). "Federated Learning in Biometric Systems." Distributed Computing, 35(4), 567-584.
- Wilson, E. (2023). "Biometric Data Storage and Security." Journal of Data Protection, 6(2), 89-106.
- Xu, Y., et al. (2023). "Transfer Learning in Dynamic Biometric Systems." Machine Learning and Applications, 12(4), 423-440.
- Yang, Z. (2022). "IoT Integration with Biometric Authentication." Internet of Things Journal, 9(5), 678-695.
- Zhang, H., & Liu, Q. (2023). "Homomorphic Encryption in Biometric Systems." Cryptography and Security, 8(3), 234-251.
- Zhou, W. (2023). "Virtual Reality and Biometric Authentication." Virtual Reality, 27(2), 156-173.
Have you ever wondered what happens when your body decides to rewrite its own security code? Our team
cracked open this fascinating puzzle where your biological passwords keep changing without warning. Picture this: your
face, fingerprints, and voice – those unique markers that make you "you" – are quietly shape-shifting through time. We've
engineered three brilliant solutions that turn this identity crisis into a technological triumph. First up, our smart Adaptive
Algorithm (boasting a jaw-dropping 94.25% accuracy) learns your changing features like a best friend who notices your
new haircut. Then there's our Multi-Factor Authentication superhero, nailing it with 97.10% accuracy by combining what
you are with what you do. Our third ace, the Re-Enrollment Trigger, acts like a vigilant bouncer who knows exactly when
to update your VIP pass. We put these systems through their paces using a massive collection of real-world faces – think
13,233 photos of 5,749 different people going about their lives. Our breakthrough approach doesn't just solve the problem;
it turns your evolving identity into your strongest security asset. Whether you're aging gracefully or transforming
dramatically, our system grows with you like a digital chameleon. The results? A security framework that's as dynamic as
life itself, ready for everything from hospital check-ins to high-stakes government operations. We're not just changing the
game; we're rewriting the rules of how technology understands human identity. And the best part? This isn't science fiction
– it's your new reality in the making. Finally, we've mapped out a clear path for the future, showing how biometric security
can keep up with your life's plot twists and turns.
Keywords :
Biometric Security, Biometric Drift, Adaptive Algorithms, Multi-Factor Authentication, Identity Verification.