Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2018, International Journal of Advanced Research in Computer Science and Software Engineering
…
4 pages
1 file
Biometric Technology has turned out to be a popular area of research in computer vision and one of the most successful applications for identifying humans by capturing and analysing the sole feature or characteristic of individual which is possessed by them and involves their Physical and Behavioral characteristics. For the individual validation and authentication the biometric system has this responsibility. Biometric Technology started from the fingerprints recognition and later on improvements were done in it to make it more secure which involves the face recognition and iris Recognition. Almost both of them are available and regarded as the accurate and reliable technology for biometric validation system. This review paper is all about Face recognition techniques in biometric locking system and Iris recognition technique of identification and the ways of making locking systems ways more efficient, full of ease, more secure, and far better than before so as to make locking or security stronger. It discusses about face recognition technique, its working and its application in different sector along with iris recognition, its working, its application.
EPH - International Journal of Science And Engineering
Human Biometrics is a rising technology, which has been broadly used in forensics, safe access and top-security prison. A biometric system is primarily a pattern recognition system that recognizes a person by determining the verification by using his different biological features i.e. Fingerprint, retina-scan, iris scan, hand geometry, and face recognition are important physiological biometrics and behavioral trait are Voice recognition, keystroke-scan, and signature-scan. In this paper different biometrics techniques such as Iris scan, retina scan and face recognition techniques are discussed.
2017
Biometrics refers to innovations for measuring and investigating a person's physiological or behavioral qualities which are remarkable to people subsequently can be utilized to recognize a man. Biometrics is a developing technology which is utilized as a part of different fields like legal sciences, security system and secured territory. These are utilized as a part of different applications like mobiles, protectedentreein a building and ATM.Biometrics are intended to upgrade the safety and diminish defenselessness. The undertaken study aims to present the distinctive biometrics techniques i.e. Fingerprint recognition, Hand geometry recognition, Iris recognition,Face Recognition and Voice recognition which are accessible to implement a biometric system.This study will be helpful for the scholars, researchers and academicians
Biometrics is a rising technology, which has been broadly used in forensics, protected access and prison security. This biometric system is basically a type of pattern recognition system that identifies a person by defining the authentication through using his distinctive biological characteristics i.e. Thumb impression, retina-scan, iris scan, palm geometry, and face recognition are top physiological biometrics and behavioral traits are Speech recognition, keystroke-scan, and signature-scan. In this paper different types of biometric techniques such as Iris scan, retina scans and face recognition techniques are being discussed.
A. M. Bojamma, B. Nithya & Prasad. C. N, 2013
The term biometric comes from the Greek words bios (life) and metrikos (measure).Humans have used body characteristics such as face, voice, gait, etc. for thousands of years to recognize each other. With the proliferation of computers networks in our day to day life, the increased number of applications making use of such networks leads to a problem of identity theft [7] .A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual. Biometric technology is more convenient and efficient than any other protection technologies used for identity authentication. Biometric technology plays a key role in recognizing humans based on their body Characteristics .The purpose of such schemes is to make sure that the rendered services are accessed only by a legitimate user, and not by anyone else. Hence Biometrics plays a vital role in securing one’s privacy using various Biometrics techniques through which fraudulence can be avoided. Biometric technology is considered one of the best protection methods of user information and data[8].
The Biometrics are become the most popular technique now a day due to its liability and security. Earlier method of establishing a person's Authenticate includes knowledge based like password or token base like ID cards. These identities may be lost stolen or shared by any person. It prevents fraud usage of ATMs, mobiles, PCs, smart cards etc. Another feature of biometric is its efficiency. It is very easy to use and handle. Biometric uses fingerprint, eye patterns (IRIS recognition), hand geometric, facial expression, voice recognition, and signature analysis etc which are detailed explained in this paper. With the use of unique characteristics of person; various biometrics authentication devices have been developed and in use which are also reviewed in this paper.
2019
In recent years, there has been a growing interest in the field of biometrics as a powerful identification technology. Various biometric technologies are based on behavioral and physiological analysis; therefore they must be reliable, robust, simple and cheap. In this paper, we have investigated an analytical comparison of different biometric systems namely: fingerprint, iris, face, voice, keystroke dynamics, signature, retina, etc. and we have classified these methods based on several criteria such as: universality, uniqueness, permanency, intrusiveness, effort, cost, and reliability, as well as the most used biometric systems requested in the market and those that are of greater interest in the current research work, and for each criteria we gave synthetic discussions. Furthermore, we provided a brief overview of biometric methods, then we have described the modes used in a biometric system such as enrollment, verification and identification and we have presented the possible appl...
2015
Now a day the Biometric is becomes the most popular technique due to its liability. Because of need of high security systems we are also using the biometrics broadly. Another feature of biometric is its efficiency. It is very easy to use and handle. In this paper the review of Biometric System is provided. The main steps involve in biometrics is: Image Formation, Image Processing and Image Matching.
2008 Congress on Image and Signal Processing, 2008
Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. Biometrics is gaining increasing attention in these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. The use of fingerprints, facial characteristics and other biometrics for identification is becoming more common. This paper overview best of Biometric application for security management. The acquisition of biometric data introduces human research and privacy concerns that must be addressed by the organizations. This paper focus Iris is the best Biometric feature for identity Management.
Iris identification, a biometric method for individual recognition, provides one of the most confined methods of authentication and identification. Iris identification systems capture an image of an individuals' eye. The iris in the image is then planned for segmentation and normalizes for feature extraction process. The presentation of iris identification system tremendously depends on the segmentation process. Segmentation is used for the localization of the correct iris district in an eye and it should be done exactly to have a very low false getting and elimination rates. This makes the skill very precious in areas such as information safety, physical access defense, ATMs and landing field security. In this paper work performance of a variety of feature removal method is analyze for iris identification.
The pressures on today's system administrators to have secure systems are ever increasing. One area where security can be improved is in authentication. Face, retina, iris and sclera recognition, biometrics, provide one of the most secure methods of authentication and identification. These technologies are very useful in areas such as information security, physical access security, ATMs and airport security. These technologies are more or less accurate, easy to use, non-intrusive, and difficult to forge and, despite what people may think, are actually quite fast systems once initial enrolment has taken place. However, they do require the cooperation of the subject: need specific hardware and software to operate. These recognition technologies do provide a good method of authentication to replace the current methods of passwords, token cards or PINs and if used in conjunction with something the user knows in a two-factor authentication system then the authentication becomes even stronger.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
NIU International Journal of Human Rights, 2021
International Journal of Applied Information Systems, 2014
International Journal of Computer Applications, 2015
International Journal of Recent Trends in Engineering and Research, 2018
IEEE Aerospace and Electronic Systems Magazine, 2006
International Journal for Research in Applied Science and Engineering Technology IJRASET, 2020