2004
DOI: 10.1109/tcsvt.2003.818349
|View full text |Cite
|
Sign up to set email alerts
|

An Introduction to Biometric Recognition

Abstract: Abstract-A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs. In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles of a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
1,616
1
40

Year Published

2005
2005
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 3,748 publications
(1,751 citation statements)
references
References 26 publications
3
1,616
1
40
Order By: Relevance
“…On radio access networks, physical layer security techniques like Noise-Loop [14] will efficiently provide the required privacy stratum allowing a secure key exchange mechanism with no a priori shared secrets. Biometrics [15] will also provide an easy and reliable identity verification mechanism to remote peers without the need for complex human-machine interactions.…”
Section: Security and Privacymentioning
confidence: 99%
“…On radio access networks, physical layer security techniques like Noise-Loop [14] will efficiently provide the required privacy stratum allowing a secure key exchange mechanism with no a priori shared secrets. Biometrics [15] will also provide an easy and reliable identity verification mechanism to remote peers without the need for complex human-machine interactions.…”
Section: Security and Privacymentioning
confidence: 99%
“…Jain et al 3) summarized what biological measurements qualify to be a biometric trait. They introduced the following requirements to use physiological or behavioral characteristic as a biometric trait:…”
Section: Introductionmentioning
confidence: 99%
“…Biometric techniques to be used in the practical system depend heavily on application requirements. The above seven factors can be used to compare biometric techniques as shown in Table 1, which was derived on the perception of Jain et al 3) . This table provides us good suggestions when we consider which biometric techniques are selected in practice.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to these problems, the desired performance in the real application may not be achieved by the systems. This has motivated researchers in multi-biometric systems [3] to consolidate the evidence obtained from different sources. By using multi-biometric approaches, better performance requirement can be achieved as reported by several researches, for instances in [3]- [8].…”
Section: Introductionmentioning
confidence: 99%