{"id":"https:\/\/openalex.org\/W2157298821","doi":"https:\/\/doi.org\/10.1109\/tifs.2006.873653","title":"Biometrics: A Tool for Information Security","display_name":"Biometrics: A Tool for Information Security","publication_year":2006,"publication_date":"2006-05-25","ids":{"openalex":"https:\/\/openalex.org\/W2157298821","doi":"https:\/\/doi.org\/10.1109\/tifs.2006.873653","mag":"2157298821"},"language":"en","primary_location":{"id":"doi:10.1109\/tifs.2006.873653","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/tifs.2006.873653","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https:\/\/openalex.org\/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5100613677","display_name":"Anil K. Jain","orcid":"https:\/\/orcid.org\/0000-0002-6369-6995"},"institutions":[{"id":"https:\/\/openalex.org\/I87216513","display_name":"Michigan State University","ror":"https:\/\/ror.org\/05hs6h993","country_code":"US","type":"education","lineage":["https:\/\/openalex.org\/I87216513"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"A.K. Jain","raw_affiliation_strings":["Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","institution_ids":["https:\/\/openalex.org\/I87216513"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5061834795","display_name":"Arun Ross","orcid":"https:\/\/orcid.org\/0000-0001-8850-3013"},"institutions":[{"id":"https:\/\/openalex.org\/I12097938","display_name":"West Virginia University","ror":"https:\/\/ror.org\/011vxgd24","country_code":"US","type":"education","lineage":["https:\/\/openalex.org\/I12097938"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Ross","raw_affiliation_strings":["Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA"],"affiliations":[{"raw_affiliation_string":"Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA","institution_ids":["https:\/\/openalex.org\/I12097938"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5078542580","display_name":"Sharath Pankanti","orcid":"https:\/\/orcid.org\/0000-0001-6770-9899"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Pankanti","raw_affiliation_strings":["T.J. Watson Research Center, IBM, Yorktown Heights, NY, USA"],"affiliations":[{"raw_affiliation_string":"T.J. Watson Research Center, IBM, Yorktown Heights, NY, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https:\/\/openalex.org\/A5100613677"],"corresponding_institution_ids":["https:\/\/openalex.org\/I87216513"],"apc_list":null,"apc_paid":null,"fwci":47.0729,"has_fulltext":false,"cited_by_count":1094,"citation_normalized_percentile":{"value":0.99978155,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"1","issue":"2","first_page":"125","last_page":"143"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10828","display_name":"Biometric Identification and Security","score":1,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1711","display_name":"Signal Processing"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10828","display_name":"Biometric Identification and Security","score":1,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1711","display_name":"Signal Processing"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9871000051498413,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/biometrics","display_name":"Biometrics","score":0.8145713806152344},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.7649253606796265},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.7641550302505493},{"id":"https:\/\/openalex.org\/keywords\/authentication","display_name":"Authentication (law)","score":0.5738542675971985},{"id":"https:\/\/openalex.org\/keywords\/variety","display_name":"Variety (cybernetics)","score":0.5508503913879395},{"id":"https:\/\/openalex.org\/keywords\/internet-privacy","display_name":"Internet privacy","score":0.5050423741340637},{"id":"https:\/\/openalex.org\/keywords\/identity","display_name":"Identity (music)","score":0.48651283979415894},{"id":"https:\/\/openalex.org\/keywords\/identity-theft","display_name":"Identity theft","score":0.4599015712738037},{"id":"https:\/\/openalex.org\/keywords\/scalability","display_name":"Scalability","score":0.45217186212539673},{"id":"https:\/\/openalex.org\/keywords\/information-security","display_name":"Information security","score":0.441652774810791},{"id":"https:\/\/openalex.org\/keywords\/license","display_name":"License","score":0.42439964413642883},{"id":"https:\/\/openalex.org\/keywords\/data-science","display_name":"Data science","score":0.3279765844345093},{"id":"https:\/\/openalex.org\/keywords\/artificial-intelligence","display_name":"Artificial intelligence","score":0.12412470579147339}],"concepts":[{"id":"https:\/\/openalex.org\/C184297639","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q177765","display_name":"Biometrics","level":2,"score":0.8145713806152344},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.7649253606796265},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.7641550302505493},{"id":"https:\/\/openalex.org\/C148417208","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5738542675971985},{"id":"https:\/\/openalex.org\/C136197465","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5508503913879395},{"id":"https:\/\/openalex.org\/C108827166","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q175975","display_name":"Internet privacy","level":1,"score":0.5050423741340637},{"id":"https:\/\/openalex.org\/C2778355321","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q17079427","display_name":"Identity (music)","level":2,"score":0.48651283979415894},{"id":"https:\/\/openalex.org\/C522325796","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q471880","display_name":"Identity theft","level":2,"score":0.4599015712738037},{"id":"https:\/\/openalex.org\/C48044578","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q727490","display_name":"Scalability","level":2,"score":0.45217186212539673},{"id":"https:\/\/openalex.org\/C527648132","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q189900","display_name":"Information security","level":2,"score":0.441652774810791},{"id":"https:\/\/openalex.org\/C2780560020","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q79719","display_name":"License","level":2,"score":0.42439964413642883},{"id":"https:\/\/openalex.org\/C2522767166","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2374463","display_name":"Data science","level":1,"score":0.3279765844345093},{"id":"https:\/\/openalex.org\/C154945302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12412470579147339},{"id":"https:\/\/openalex.org\/C121332964","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q413","display_name":"Physics","level":0,"score":0},{"id":"https:\/\/openalex.org\/C111919701","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9135","display_name":"Operating system","level":1,"score":0},{"id":"https:\/\/openalex.org\/C77088390","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8513","display_name":"Database","level":1,"score":0},{"id":"https:\/\/openalex.org\/C24890656","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q82811","display_name":"Acoustics","level":1,"score":0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109\/tifs.2006.873653","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/tifs.2006.873653","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https:\/\/openalex.org\/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.65.4001","is_oa":false,"landing_page_url":"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.65.4001","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http:\/\/biometrics.cse.msu.edu\/Publications\/GeneralBiometrics\/JainRossPankanti_BiometricsInfoSec_TIFS06.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https:\/\/metadata.un.org\/sdg\/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":79,"referenced_works":["https:\/\/openalex.org\/W5057334","https:\/\/openalex.org\/W61148521","https:\/\/openalex.org\/W117975506","https:\/\/openalex.org\/W1490299937","https:\/\/openalex.org\/W1492526923","https:\/\/openalex.org\/W1505010935","https:\/\/openalex.org\/W1512114279","https:\/\/openalex.org\/W1519435346","https:\/\/openalex.org\/W1542290855","https:\/\/openalex.org\/W1556049012","https:\/\/openalex.org\/W1576817603","https:\/\/openalex.org\/W1577532209","https:\/\/openalex.org\/W1585588639","https:\/\/openalex.org\/W1589647164","https:\/\/openalex.org\/W1598554978","https:\/\/openalex.org\/W1606443045","https:\/\/openalex.org\/W1639795441","https:\/\/openalex.org\/W1958747242","https:\/\/openalex.org\/W1985194351","https:\/\/openalex.org\/W1990009902","https:\/\/openalex.org\/W2005262108","https:\/\/openalex.org\/W2008338741","https:\/\/openalex.org\/W2024677982","https:\/\/openalex.org\/W2034473161","https:\/\/openalex.org\/W2041942569","https:\/\/openalex.org\/W2061272711","https:\/\/openalex.org\/W2061805355","https:\/\/openalex.org\/W2068723942","https:\/\/openalex.org\/W2075609405","https:\/\/openalex.org\/W2083122891","https:\/\/openalex.org\/W2083358597","https:\/\/openalex.org\/W2092988036","https:\/\/openalex.org\/W2094214226","https:\/\/openalex.org\/W2102734279","https:\/\/openalex.org\/W2106256730","https:\/\/openalex.org\/W2107772619","https:\/\/openalex.org\/W2111303254","https:\/\/openalex.org\/W2114024372","https:\/\/openalex.org\/W2119332272","https:\/\/openalex.org\/W2119970915","https:\/\/openalex.org\/W2121292316","https:\/\/openalex.org\/W2122027310","https:\/\/openalex.org\/W2122851694","https:\/\/openalex.org\/W2129244720","https:\/\/openalex.org\/W2130520294","https:\/\/openalex.org\/W2130817593","https:\/\/openalex.org\/W2132918094","https:\/\/openalex.org\/W2140959843","https:\/\/openalex.org\/W2143366165","https:\/\/openalex.org\/W2144596760","https:\/\/openalex.org\/W2145611910","https:\/\/openalex.org\/W2146722262","https:\/\/openalex.org\/W2148660279","https:\/\/openalex.org\/W2148680321","https:\/\/openalex.org\/W2150010995","https:\/\/openalex.org\/W2152535543","https:\/\/openalex.org\/W2154691736","https:\/\/openalex.org\/W2157616159","https:\/\/openalex.org\/W2157664611","https:\/\/openalex.org\/W2158275940","https:\/\/openalex.org\/W2159322247","https:\/\/openalex.org\/W2165216297","https:\/\/openalex.org\/W2167239635","https:\/\/openalex.org\/W2167652145","https:\/\/openalex.org\/W2171759622","https:\/\/openalex.org\/W2184323348","https:\/\/openalex.org\/W2313351254","https:\/\/openalex.org\/W2799959166","https:\/\/openalex.org\/W2995675184","https:\/\/openalex.org\/W3160027900","https:\/\/openalex.org\/W4237606750","https:\/\/openalex.org\/W4251423627","https:\/\/openalex.org\/W4255558128","https:\/\/openalex.org\/W6600217948","https:\/\/openalex.org\/W6630155293","https:\/\/openalex.org\/W6631147972","https:\/\/openalex.org\/W6671586040","https:\/\/openalex.org\/W6681398611","https:\/\/openalex.org\/W6683198648"],"related_works":["https:\/\/openalex.org\/W2606446052","https:\/\/openalex.org\/W2036021480","https:\/\/openalex.org\/W3195777957","https:\/\/openalex.org\/W2382668227","https:\/\/openalex.org\/W2348482143","https:\/\/openalex.org\/W2024584030","https:\/\/openalex.org\/W2137048368","https:\/\/openalex.org\/W1603675680","https:\/\/openalex.org\/W1983660090","https:\/\/openalex.org\/W2123843216"],"abstract_inverted_index":{"Establishing":[0],"identity":[1],"is":[2,103],"becoming":[3],"critical":[4],"in":[5,32,43,69,80,123,197,212],"our":[6],"vastly":[7],"interconnected":[8],"society.":[9],"Questions":[10],"such":[11],"as":[12,87,108,130],"\"Is":[13,21,30],"she":[14,17],"really":[15],"who":[16],"claims":[18],"to":[19,25,54,105,155,185,204],"be?,\"":[20],"this":[22,27,137,173],"person":[23],"authorized":[24],"use":[26],"facility?,\"":[28],"or":[29,97,100],"he":[31],"the":[33,37,70,88,149,190,206],"watchlist":[34],"posted":[35],"by":[36,194],"government?\"":[38],"are":[39],"routinely":[40],"being":[41],"posed":[42],"a":[44,51,58,109,131],"variety":[45],"of":[46,72,90,133,143,148,172,208],"scenarios":[47],"ranging":[48],"from":[49],"issuing":[50],"driver's":[52],"license":[53],"gaining":[55],"entry":[56],"into":[57],"country.":[59],"The":[60,169],"need":[61,154],"for":[62,112,158,165],"reliable":[63],"user":[64],"authentication":[65,214],"techniques":[66],"has":[67],"increased":[68],"wake":[71],"heightened":[73],"concerns":[74],"about":[75],"security":[76,211],"and":[77,83,127,145,200,210],"rapid":[78],"advancements":[79],"networking,":[81],"communication,":[82],"mobility.":[84],"Biometrics,":[85],"described":[86],"science":[89],"recognizing":[91],"an":[92,114,141,162],"individual":[93],"based":[94],"on":[95],"his":[96],"her":[98],"physical":[99],"behavioral":[101],"traits,":[102],"beginning":[104],"gain":[106],"acceptance":[107],"legitimate":[110],"method":[111],"determining":[113],"individual's":[115],"identity.":[116,135],"Biometric":[117],"systems":[118,196],"have":[119],"now":[120],"been":[121],"deployed":[122],"various":[124],"commercial,":[125],"civilian,":[126],"forensic":[128],"applications":[129,178],"means":[132],"establishing":[134],"In":[136],"paper,":[138],"we":[139],"provide":[140],"overview":[142,174],"biometrics":[144],"discuss":[146],"some":[147],"salient":[150],"research":[151],"issues":[152,183],"that":[153],"be":[156],"addressed":[157],"making":[159],"biometric":[160,180,195],"technology":[161],"effective":[163],"tool":[164],"providing":[166],"information":[167,186],"security.":[168],"primary":[170],"contribution":[171],"includes:":[175],"1)":[176],"examining":[177],"where":[179],"scan":[181],"solve":[182],"pertaining":[184],"security;":[187],"2)":[188],"enumerating":[189],"fundamental":[191],"challenges":[192],"encountered":[193],"real-world":[198],"applications;":[199],"3)":[201],"discussing":[202],"solutions":[203],"address":[205],"problems":[207],"scalability":[209],"large-scale":[213],"systems.":[215]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":31},{"year":2024,"cited_by_count":40},{"year":2023,"cited_by_count":51},{"year":2022,"cited_by_count":48},{"year":2021,"cited_by_count":57},{"year":2020,"cited_by_count":50},{"year":2019,"cited_by_count":62},{"year":2018,"cited_by_count":51},{"year":2017,"cited_by_count":81},{"year":2016,"cited_by_count":64},{"year":2015,"cited_by_count":61},{"year":2014,"cited_by_count":83},{"year":2013,"cited_by_count":80},{"year":2012,"cited_by_count":52}],"updated_date":"2026-04-20T07:46:08.049788","created_date":"2025-10-10T00:00:00"}