2005
DOI: 10.17705/1cais.01648
|View full text |Cite
|
Sign up to set email alerts
|

Future Security Approaches and Biometrics

Abstract: Threats to information security are proliferating rapidly, placing demanding requirements on protecting tangible and intangible business and individual assets. Biometrics can improve security by replacing or complementing traditional security technologies. This tutorial discusses the strengths and weaknesses of biometrics and traditional security approaches, current and future applications of biometrics, performance evaluation measures of biometric systems, and privacy issues surrounding the new technology.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…Zviran and Haga [1999] studied the characteristics of user-selected passwords such as number of characters, frequency of changing passwords, and method of choosing passwords. Boukhonine et al [2005] provided a tutorial on how biometric technologies can be used to improve security.…”
Section: Identity Proofingmentioning
confidence: 99%
“…Zviran and Haga [1999] studied the characteristics of user-selected passwords such as number of characters, frequency of changing passwords, and method of choosing passwords. Boukhonine et al [2005] provided a tutorial on how biometric technologies can be used to improve security.…”
Section: Identity Proofingmentioning
confidence: 99%
“…A common 3-factor authentication mechanism may include verification of password, OTP, and the user's finger print. Other types of biometric technologies can include face recognition, hand geometry, iris scanning, retina scanning, and voice recognition, among others [Boukhonine et al 2005]. This mechanism is suitable for those highly confidential transactions that require highest level of authentication.…”
Section: Personal Certificatementioning
confidence: 99%
“…As a result we achieved a balanced prediction accuracy of 97.2 percent just based on the facial expressions. When we combine the biometric capture with a PIN request, which is a rule in access validation systems [2,3], we reached a very good false positive rate of only 7.633284e-06 (over 99.999 percent specificity).…”
Section: Introductionmentioning
confidence: 97%
“…Robust user identification is a precondition of modern human-computer interaction systems, in particular of autonomous robots, not only for issues of security but also for convenience [1,2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation