AUTHENTICATION TECHNIQUES: A BRIEF OVERVIEW