Introduction As cyber threats evolve, traditional security measures like passwords and fingerprint scans are becoming vulnerable to breaches. In response,…