ANALYSIS OF USING BIOMETRIC AUTHENTICATION SYSTEM IN KATSINA STATE INSTITUTE OF TECHNOLOGY AND MANAGEMENT (KSTIM) LIBRARY
DOI:
https://doi.org/10.33003/fjs-2025-0912-4244Keywords:
Biometrics, Authentication, Security, PasswordAbstract
This research investigates the feasibility and benefits of implementing biometric authentication in the Katsina State Institute of Technology and Management (KSITM) Library, emphasizing its potential to enhance security and safeguard sensitive information. Traditional methods, like passwords and tokens, are vulnerable as they can be easily shared or compromised, often leading to security lapses. Biometrics, however, provide a more secure solution by using unique physical characteristics, such as fingerprints, hand geometry, palm veins, retina and iris patterns, facial recognition, signature, and voice analysis, to accurately verify individual identities. The study reviews these biometric methods, assessing their usability, advantages, and potential drawbacks. A questionnaire-based approach was used to gauge the satisfaction and receptiveness of KSITM’s staff and students toward biometric systems. Findings show that 85% of respondents consider biometric authentication an essential improvement for the library, demonstrating a strong preference for it over traditional methods. Respondents showed the highest preference for fingerprint recognition, favoring its balance of convenience, security, and reliability. This feedback suggests that implementing a biometric system could enhance the library’s security infrastructure and reduce the risks associated with traditional access methods. Overall, the positive response indicates that biometric authentication is both a viable and beneficial security measure for KSITM, fostering a more secure and controlled environment for students and staff.
References
Albalawi, S., Alshahrani, L., Albalawi, N., Kilabi, R., & Alhakamy, A. (2022). A Comprehensive Overview on Biometric Authentication Systems using Artificial Intelligence Techniques. International Journal of Advanced Computer Science and Applications, 13(4), 782–791. https://doi.org/10.14569/IJACSA.2022.0130491
Byron, C. D., Kiefer, A. M., Thomas, J., Patel, S., Jenkins, A., Fratino, A. L., & Anderson, T. (2021). The authentication and repatriation of a ceremonial tsantsa to its country of origin (Ecuador). Heritage Science, 9(1), 1–13. https://doi.org/10.1186/s40494-021-00518-z
Israa M. Alsaadi. (2012). Physiological Biometric Authentication Systems, Advantages, Disadvantages and Future Development : A Review. International Journal Of Scientific & Technology Research, 1(1).
Kamble, P., Jadhav, H., Raste, D., Bhange, T., & More, S. S. (2024). International Journal of Research Publication and Reviews Biometric Authentication : Security , Development and Future work. 5, 4882–4889.
Majeed Alsaadi, I. (2021). Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: a review. International Journal of Scientific & Technology Research, 10(January), 1. https://www.researchgate.net/publication/348662448
Phadke, S. (2013). The Importance of a Biometric Authentication System. The SIJ Transactions on Computer Science Engineering & Its Applications (CSEA), 01(04), 18–22. https://doi.org/10.9756/sijcsea/v1i4/0104550402
Pujari, V., Patil, R., & Sutar, S. (2021). Research paper on biometrics security. Contemporary Research in India, June.
Weaver, A. C. (2006). Biometric authentication. Computer, 39(2), 96–97. https://doi.org/10.1109/MC.2006.47
Downloads
Published
Issue
Section
Categories
License
Copyright (c) 2025 Maryam Sani, Umar

This work is licensed under a Creative Commons Attribution 4.0 International License.