2006
DOI: 10.1109/tifs.2006.873653
|View full text |Cite
|
Sign up to set email alerts
|

Biometrics: A Tool for Information Security

Abstract: Abstract-Establishing identity is becoming critical in our vastly interconnected society. Questions such as "Is she really who she claims to be?," "Is this person authorized to use this facility?," or "Is he in the watchlist posted by the government?" are routinely being posed in a variety of scenarios ranging from issuing a driver's license to gaining entry into a country. The need for reliable user authentication techniques has increased in the wake of heightened concerns about security and rapid advancement… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
408
0
3

Year Published

2009
2009
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 841 publications
(413 citation statements)
references
References 57 publications
0
408
0
3
Order By: Relevance
“…It is more convenient to subtract the global mean from the data before learning the model. Let 1) where N = K i=1 n i is a global zero-order moment (total number of PLDA training vectors). We centralize the data…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is more convenient to subtract the global mean from the data before learning the model. Let 1) where N = K i=1 n i is a global zero-order moment (total number of PLDA training vectors). We centralize the data…”
Section: Resultsmentioning
confidence: 99%
“…Biometric person authentication -recognizing persons from their physiological or behavioral traits -plays an increasingly important role in information security [1]. Face [2] and speaker [3] recognition are particularly attractive due to their unintrusiveness and low costs.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional security technologies required the use of PINs or tokens. Biometrics proposes a change of paradigm, from "what you know" or "what you have" to "who you are": forget about passwords, you are your own key [1].…”
Section: Introductionmentioning
confidence: 99%
“…However, biometric systems are far from perfect [12,13]. For example, in the case of fingerprint verification, it is known that a small fraction of the population may be unsuited for the automatic identification because of genetic factors, or aging, or for occupational reasons.…”
Section: Introductionmentioning
confidence: 99%