ANALYSIS OF USING BIOMETRIC AUTHENTICATION SYSTEM IN KATSINA STATE INSTITUTE OF TECHNOLOGY AND MANAGEMENT (KSTIM) LIBRARY

Authors

Keywords:

Biometrics, Authentication, Security, Password

Abstract

This research investigates the feasibility and benefits of implementing biometric authentication in the Katsina State Institute of Technology and Management (KSITM) Library, emphasizing its potential to enhance security and safeguard sensitive information. Traditional methods, like passwords and tokens, are vulnerable as they can be easily shared or compromised, often leading to security lapses. Biometrics, however, provide a more secure solution by using unique physical characteristics, such as fingerprints, hand geometry, palm veins, retina and iris patterns, facial recognition, signature, and voice analysis, to accurately verify individual identities. The study reviews these biometric methods, assessing their usability, advantages, and potential drawbacks. A questionnaire-based approach was used to gauge the satisfaction and receptiveness of KSITM’s staff and students toward biometric systems. Findings show that 85% of respondents consider biometric authentication an essential improvement for the library, demonstrating a strong preference for it over traditional methods. Respondents showed the highest preference for fingerprint recognition, favoring its balance of convenience, security, and reliability. This feedback suggests that implementing a biometric system could enhance the library’s security infrastructure and reduce the risks associated with traditional access methods. Overall, the positive response indicates that biometric authentication is both a viable and beneficial security measure for KSITM, fostering a more secure and controlled environment for students and staff.

Dimensions

Albalawi, S., Alshahrani, L., Albalawi, N., Kilabi, R., & Alhakamy, A. (2022). A Comprehensive Overview on Biometric Authentication Systems using Artificial Intelligence Techniques. International Journal of Advanced Computer Science and Applications, 13(4), 782–791. https://doi.org/10.14569/IJACSA.2022.0130491

Byron, C. D., Kiefer, A. M., Thomas, J., Patel, S., Jenkins, A., Fratino, A. L., & Anderson, T. (2021). The authentication and repatriation of a ceremonial tsantsa to its country of origin (Ecuador). Heritage Science, 9(1), 1–13. https://doi.org/10.1186/s40494-021-00518-z

Israa M. Alsaadi. (2012). Physiological Biometric Authentication Systems, Advantages, Disadvantages and Future Development : A Review. International Journal Of Scientific & Technology Research, 1(1).

Kamble, P., Jadhav, H., Raste, D., Bhange, T., & More, S. S. (2024). International Journal of Research Publication and Reviews Biometric Authentication : Security , Development and Future work. 5, 4882–4889.

Majeed Alsaadi, I. (2021). Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: a review. International Journal of Scientific & Technology Research, 10(January), 1. https://www.researchgate.net/publication/348662448

Phadke, S. (2013). The Importance of a Biometric Authentication System. The SIJ Transactions on Computer Science Engineering & Its Applications (CSEA), 01(04), 18–22. https://doi.org/10.9756/sijcsea/v1i4/0104550402

Pujari, V., Patil, R., & Sutar, S. (2021). Research paper on biometrics security. Contemporary Research in India, June.

Weaver, A. C. (2006). Biometric authentication. Computer, 39(2), 96–97. https://doi.org/10.1109/MC.2006.47

Hand Geometry

Published

20-11-2025

How to Cite

Sani, M., & Abba, U. (2025). ANALYSIS OF USING BIOMETRIC AUTHENTICATION SYSTEM IN KATSINA STATE INSTITUTE OF TECHNOLOGY AND MANAGEMENT (KSTIM) LIBRARY. FUDMA JOURNAL OF SCIENCES, 9(12), 131-137. https://doi.org/10.33003/fjs-2025-0911-4244

How to Cite

Sani, M., & Abba, U. (2025). ANALYSIS OF USING BIOMETRIC AUTHENTICATION SYSTEM IN KATSINA STATE INSTITUTE OF TECHNOLOGY AND MANAGEMENT (KSTIM) LIBRARY. FUDMA JOURNAL OF SCIENCES, 9(12), 131-137. https://doi.org/10.33003/fjs-2025-0911-4244