AUTHENTICATION METHODS AND TECHNIQUES: A REVIEW