Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2014
…
6 pages
1 file
Biometrics is the method of automatic identification of an individual by using their certain measurable physiological or behavioral characteristics like fingerprints, palm prints, hand geometry, iris, retinas, faces, hand veins, facial expressions, signatures, and voiceprints. Biometrics has overcome the problems of traditional verification methods like cards, tokens and Password or PINs. Biometric indicators have an edge over traditional security methods in that these attributes cannot be easily forgotten, stolen or shared; personally they have to go through the system. This paper reviews all biometrics and their various studies that have explored the technical and convenience issues and comparison between all the biometrics with an objective to provide insights on their reliability, performance, security, convenience and acceptance.
2013
Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. In order to deal with security, Authentication plays an important role. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on "who she/he is" rather than "what she/he has" (card, token, key) or "what she/he knows" (password, PIN). We have also outlined opinions about the usability of biometric authentication systems, limitation, comparison between different techniques and their advantages and disadvantages in this paper. Present study deals with new innovative model ...
Numerous applications for personal identification exist and more are emerging daily. Examples of personal identification applications include immigration and border control, physical access control, time and attendance, computer security, and law enforcement. As a result, the area of biometrics will continue to be an area of interest for many researchers. In the past, the identity of an individual was determined based upon a possession or knowledge of a piece of information. These identification methods can be circumvented by unauthorized sharing or misplacement. However, biometric identifiers cannot be shared easily or forgotten because they are based on potentially distinctive physiological characteristics. This property makes biometrics a viable and perhaps superior approach to personal identification.
PIJMT, 2015
In the ever-changing world of global data communications, and fast-paced software development, security is becoming more and more of an issue. No system can ever be completely secure, all one can do is make it increasingly difficult for someone to compromise the system. The more secure the system is, the more intrusive the security becomes. One needs to decide where in this balancing act the system will still be usable and secure for the purposes. Here we have discussed different Biometric tools and related security issues. Identity is to establish the identity of a person, or to ascertain the origin, nature or definitive characteristics of a particular person. To uniquely identify a person different types of information can be used with other sources. This concept is ancient, and has become much more important as information technology and the Internet have made it easier to collect identifiable documents. To identify a person, the recent trend is to use biometric. Different biometric features can distinctively identify a person unless there are identical twins. In case of identical twins many biometrics fail to distinguish them as separate person, but fingerprint still can distinguish. In recent technology more than one biometric feature is also being used in a combination to have more robust indentifying system. Several research projects have shown that multimodal biometrics (e.g. fingerprints and voiceprints combined) can improve the performance and reliability of biometric authentication.
2013
As the world is heading towards paperless communication and transaction, the correct and authentic personal recognition is important to ensure that only legitimate users have access to the rendered services or information. Automatic recognition of individuals on the basis of their physiological or behavioral characteristics known as Biometric recognition or biometrics is now frequently used by service providers to authenticate personal recognition. Biometrics makes it possible to recognize the person on the basis of what he has (characteristics) rather than what he possesses (Id cards etc.) This paper provides an insight into various biometric characteristics their advantages, disadvantages, limitations and strengths. A systematic review of literature is carried out to identify future areas of research.
2010
The term biometrics is derived from the Greek words bio meaning “life” and metrics meaning “ to measure” . Biometrics refers to the identification or verification of a person based on his/her physiological and/or behavioral characteristics. Several verification/identification based biometrics have evolved based on various unique aspects of human body, ease of acquiring the biometric, public acceptance and the degree of security required. This paper presents an overview of various biometrics in use/proposed and their applicability to different activities.
2019
In recent years, there has been a growing interest in the field of biometrics as a powerful identification technology. Various biometric technologies are based on behavioral and physiological analysis; therefore they must be reliable, robust, simple and cheap. In this paper, we have investigated an analytical comparison of different biometric systems namely: fingerprint, iris, face, voice, keystroke dynamics, signature, retina, etc. and we have classified these methods based on several criteria such as: universality, uniqueness, permanency, intrusiveness, effort, cost, and reliability, as well as the most used biometric systems requested in the market and those that are of greater interest in the current research work, and for each criteria we gave synthetic discussions. Furthermore, we provided a brief overview of biometric methods, then we have described the modes used in a biometric system such as enrollment, verification and identification and we have presented the possible appl...
A. M. Bojamma, B. Nithya & Prasad. C. N, 2013
The term biometric comes from the Greek words bios (life) and metrikos (measure).Humans have used body characteristics such as face, voice, gait, etc. for thousands of years to recognize each other. With the proliferation of computers networks in our day to day life, the increased number of applications making use of such networks leads to a problem of identity theft [7] .A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual. Biometric technology is more convenient and efficient than any other protection technologies used for identity authentication. Biometric technology plays a key role in recognizing humans based on their body Characteristics .The purpose of such schemes is to make sure that the rendered services are accessed only by a legitimate user, and not by anyone else. Hence Biometrics plays a vital role in securing one’s privacy using various Biometrics techniques through which fraudulence can be avoided. Biometric technology is considered one of the best protection methods of user information and data[8].
The past few decades have witnessed the rapid progress of technology, engulfing all the aspects of human existence. The assistance of technology in man’s mundane as well as specialized activities has rendered it a part & parcel of his life. With the advancement of technology the professional and personal information is now stored digitally in the memory of IC chips. Such vital information cannot be guarded against frauds through lock & key. In order to ensure denial of access to classified data by unauthorized persons, passwords & secret codes were implemented. But the security tools like smart cards, magnetic stripe cards & physical keys can be lost, stolen or duplicated. Passwords can be forgotten, shared or unintentionally observed by a third party. Instead of guaranteeing a foolproof security system these tools become a nuisance for the users. The most rapidly emerging technology for security system is the BIOMETRIC TECHNOLOGY. Biometric user authentication techniques can be used to protect PCs & Networks from unauthorized access by authenticating users based on a physical feature such as fingerprints, retina, iris, hand or face. Biometrics is a means of using parts of human body as a kind of permanent password. Biometrics turns your face, hand or eye into your badge of identity. We attempt to find the best solution in different situations & compare the pros & cons.
Eye Tracking and New Trends [Working Title]
Nowadays, we are talking more and more about insecurity in various sectors as well as the computer techniques to be implemented to counter this trend: access control to computers, e-commerce, banking, etc. There are two traditional ways of identifying an individual. The first method is a knowledge-based method. It is based on the knowledge of an individual's information such as the PIN code to allow him/her to activate a mobile phone. The second method is based on the possession of token. It can be a piece of identification, a key, a badge, etc. These two methods of identification can be used in a complementary way to obtain increased security like in bank cards. However, they each have their weaknesses. In the first case, the password can be forgotten or guessed by a third party. In the second case, the badge (or ID or key) may be lost or stolen. Biometric features are an alternative solution to the two previous identification modes. The advantage of using the biometric features is that they are all universal, measurable, unique, and permanent. The interest of applications using biometrics can be summed up in two classes: to facilitate the way of life and to avoid fraud.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
NIU International Journal of Human Rights, 2021
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy, 2012
International Journal of Advanced Research in Computer Science, 2016
akram abdul maujood dawood, 2018
International Journal of Computing and ICT Research, 2011
International Journal of Advanced Research in Computer Science and Software Engineering, 2018