2013
DOI: 10.7763/lnse.2013.v1.47
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Biometric Approach Using Fingerprint Recognition

Abstract: Abstract-Fingerprint (FP) serves to identify that the person authenticating is who he/she claims to be. FP identification is popular biometric technique due to easiness in acquiring, availability of plenty sources (i.e. ten fingers) for collecting data and their established use. This paper summarizes the research work carried out in FP matching techniques, recognition methods and their performance analysis.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…In fact, this method presents a Speed Rate (SR) that is comparable to some of biometric state-of-the-art techniques, such for example Hand Geometry Recognition [26–28] or Iris Recognition [21, 29, 30] (please see Table 1), which are much more computationally demanding, and better than more mature methods of literature, such as Fingerprint Recognition [16, 31, 32]. Additionally, it is able to provide liveness detection, on contrary of state-of-the-art techniques (e.g., Facial Recognition [19, 22]; Signature Recognition [20] or Fingerprint Recognition [16, 31, 32]), ensuring similar performance values in comparison with the latter. Lastly, the performance achieved by this method in terms of the FRR/FAR ratio places the Beat-ID in a very competitive position relatively to the majority of the remaining techniques, which present a highly variable FAR versus FRR performance behavior (e.g., Fingerprint, Voice or Vein Pattern Recognition).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, this method presents a Speed Rate (SR) that is comparable to some of biometric state-of-the-art techniques, such for example Hand Geometry Recognition [26–28] or Iris Recognition [21, 29, 30] (please see Table 1), which are much more computationally demanding, and better than more mature methods of literature, such as Fingerprint Recognition [16, 31, 32]. Additionally, it is able to provide liveness detection, on contrary of state-of-the-art techniques (e.g., Facial Recognition [19, 22]; Signature Recognition [20] or Fingerprint Recognition [16, 31, 32]), ensuring similar performance values in comparison with the latter. Lastly, the performance achieved by this method in terms of the FRR/FAR ratio places the Beat-ID in a very competitive position relatively to the majority of the remaining techniques, which present a highly variable FAR versus FRR performance behavior (e.g., Fingerprint, Voice or Vein Pattern Recognition).…”
Section: Resultsmentioning
confidence: 99%
“…To the best of our knowledge, no other study has led to the proposal of such a high-accuracy method capable of identifying a person using fewer heartbeats, or using as few features with such low computational complexity as the method proposed here. In fact, this method presents a Speed Rate (SR) that is comparable to some of biometric state-of-the-art techniques, such for example Hand Geometry Recognition [ 26 – 28 ] or Iris Recognition [ 21 , 29 , 30 ] (please see Table 1 ), which are much more computationally demanding, and better than more mature methods of literature, such as Fingerprint Recognition [ 16 , 31 , 32 ]. Additionally, it is able to provide liveness detection, on contrary of state-of-the-art techniques (e.g., Facial Recognition [ 19 , 22 ]; Signature Recognition [ 20 ] or Fingerprint Recognition [ 16 , 31 , 32 ]), ensuring similar performance values in comparison with the latter.…”
Section: Discussionmentioning
confidence: 99%
“…The performance evaluation is done on surveys works with different parameters and existing methods. Biometrics presents obvious advantages over password and token-based security [2].…”
Section: Literature Viewmentioning
confidence: 99%
“…Though different techniques exist, it still poses a security related issues where hackers and attackers came up with different spoofing techniques thereby facilitating violation of ethics. Subban Ravi [1] mentioned that Everybody effectively distinguished and acknowledged may procure certain benefits. In the claim, the recognizable proof is imperative as the best confirmation.…”
Section: Introductionmentioning
confidence: 99%