Biometric Solutions 2002
DOI: 10.1007/978-1-4615-1053-6_1
|View full text |Cite
|
Sign up to set email alerts
|

Biometrics Applications in an E-World

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0
1

Year Published

2004
2004
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 39 publications
0
12
0
1
Order By: Relevance
“…In practice, a significant amount of captured fingerprint images are of poor quality [4]. Therefore, preprocessing is often applied to fingerprint images in order to enhance fingerprint features, thereby increasing the robustness of the feature extraction process.…”
Section: Fingerprint Recognitionmentioning
confidence: 99%
“…In practice, a significant amount of captured fingerprint images are of poor quality [4]. Therefore, preprocessing is often applied to fingerprint images in order to enhance fingerprint features, thereby increasing the robustness of the feature extraction process.…”
Section: Fingerprint Recognitionmentioning
confidence: 99%
“…The process of automatically associating an identity with an individual by means of some inherent personal characteristic is called biometric recognition [15], [31], [39], [52]. Traditionally, person authentication has been accomplished by associating to the person's identity something that he/she possesses (e.g., a key, a card, etc.)…”
Section: Personal Authentication Through Biometricsmentioning
confidence: 99%
“…Beyond sheer accuracy, there are many other factors to consider when examining a biometric solution for an application [15], [52], such as vulnerability to fraud, the degree of distinctiveness or uniqueness of the biometric, the intrinsic short-and long-term variability associated with the biometric, the intrusiveness of the system to collect the biometric sample (and the required user cooperativeness), the ease of user enrollment/recognition, and the long-term support required (database management, re-enrollment, template updating). Moreover, biometric authentication cannot be considered as producing error-free verification decisions under any application condition, making multilayered security a general condition for most applications.…”
Section: Personal Authentication Through Biometricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Although no single biometrics is expected to effectively satisfy the requirements of all identification purposes, the use of such unique, reliable, and stable personal features has invoked increasing interest in the development of biometrics-based identification systems for various civilian, military and forensic applications. Currently, a number of biometrics-based technologies have been commercially available, and many others are being proposed, researched, and evaluated [1]- [3], [14], [16]. It is known that each biometric technology has its strength and limitation in different applications.…”
Section: Introductionmentioning
confidence: 99%