Traditional automated personal identification techniques, which
use such as Personal Identification Number (PIN), ID card, key,
etc., to verify the identity of a person, are no longer considered
reliable enough to satisfy the security requirements of electronic
transactions[12][13]. The problem amongst all is that these
techniques are not able to differentiate between an authorized
person and an impostor who fraudulently acquires the access