A Biometric Authentication Scheme to Enhance Access Integrity of Higher Education Institutions


  • Boniface Mwangi Wambui School of Computing and Informatics Mount Kenya University, Thika, Kenya School of ICT,Media & Engineering Zetech University, Ruiru,Kenya




Authentication, Integrity, attacks, accuracy, security


Access control and security within higher education institutions are of paramount importance in safeguarding sensitive information and resources. Conventional authentication methods, such as passwords and identification cards, have proven susceptible to security breaches and identity theft. To address these vulnerabilities, this paper presents a novel biometric authentication scheme tailored to the unique needs of higher education institutions. Deploying a trustworthy user authentication system became a key responsibility for both access control and securing user's private data with the rapid rise of electronic crimes and their connected difficulties. For both private and public use, human biometric features including voice, finger, iris scanning, face, signature, and other features offer a solid security level. This paper provides a comprehensive overview of the biometric authentication scheme, outlining its architecture, functionality, and security measures. We also present the results of a pilot implementation within a higher education institution, demonstrating improved access security and user satisfaction. Ethical considerations and privacy safeguards are discussed to ensure responsible biometric data handling. For a long time, numerous biometric authentication solutions have been considered. owing to the distinctiveness of human biometrics, which was important in thwarting imposters' attacks. Only a few of the key issues endangering system integrity and impeding effective service delivery include identity theft, spoofing, and the reliability of authentication systems in higher education institutions. From the experiment the total number of tests was 15, as the threshold was one attempt. While fingerprint authentication typically took 2.67 seconds, palm vein authentication often took 9.15 seconds. Therefore, the palm vein was slower than the fingerprint in terms of speed. The structure of the hand and the distance between the palm and the scanner were the determining elements in pal's slow authentication speed. The palm vein system has a 93.33% accuracy rate compared to the fingerprint system's 60% accuracy rate, making it the preferable model to use in a higher education setting. A biometric system's success or failure is influenced by a variety of variables and application domains. The purpose of this work is to discuss an appropriate biometric authentication model that may be used to improve the reliability of biometric systems in institutions of higher learning. The proposed biometric authentication scheme offers a forward-looking solution to the access integrity challenges faced by higher education institutions. By adopting this technology, institutions can bolster their security posture, protect sensitive data, and provide a more convenient and secure access experience for students, faculty, and staff.


Abdulrahman, S. A., & Alhayani, B. (2023). A comprehensive survey on the biometric systems based on physiological and behavioural characteristics. Materials Today: Proceedings, 80, 2642-2646.

Chen, X., Chen, L., & Wu, D. (2018). Factors that influence employees’ security policy compliance: an awareness-motivation-capability perspective. Journal of Computer Information Systems, 58(4), 312-324.

Cook, C. M., Howard, J. J., Sirotin, Y. B., Tipton, J. L., & Vemury, A. R. (2019). Demographic effects in facial recognition and their dependence on image acquisition: An evaluation of eleven commercial systems. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1(1), 32-41.

Furnell, Steven, and Ismini Vasileiou. "Security education and awareness: just let them burn?." Network Security 2017, no. 12 (2017): 5-9.

Parihar, R. S., & Jain, D. S. (2019). Palm vein recognition system for human authentication: A review. International Journal for Research in Applied Science and Engineering Technology, 7(2), 472-477.

Onifade, O. F., Olayemi, K. B., & Isinkaye, F. O. (2020). A Fingerprint template protection scheme using Arnold transform and bio-hashing. Int J Image Graph Signal Process, 12, 28-36.

Phadke, S. (2013). The importance of a biometric authentication system. The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), 1(4), 128-132.

Wambui, B. M., Gikandi, J. W., & Wambugu, G. M. (2022). A Suvery of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University.

Wambui, B. M., Gikandi, J. W., & Wambugu, G. M. (2022). A Framework for Verification in Contactless Secure Physical Access Control and Authentication Systems.

Wambui, B. M., Nyambura, H., & Muriuki, N. (2022). An Analysis on the Effectiveness of ICT Integration In Learning in Higher Education Institutions in Covid-19 Era.

Yang, W., Wang, S., Hu, J., Zheng, G., & Valli, C. (2018). A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognition, 78, 242-251.

Zang, W. L. (2014). Research of information security quantitative evaluation method. Applied Mechanics and Materials, 513, 369–372




How to Cite

Wambui, B. M. . (2023). A Biometric Authentication Scheme to Enhance Access Integrity of Higher Education Institutions. International Journal of Computer and Information Technology(2279-0764), 12(3). https://doi.org/10.24203/ijcit.v12i3.366