2011
DOI: 10.1007/978-0-387-77326-1
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to Biometrics

Abstract: The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, to proprietary rights.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
290
1
3

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 584 publications
(294 citation statements)
references
References 51 publications
0
290
1
3
Order By: Relevance
“…Matcher or classifier component could be subject for software modification or final decision substitution at locations G and H respectively. These security breaches are categorized, according to (Jain, Ross, & Nandakumar, 2011), into attacks related to the user interface, attacks on modules, on the interconnection between modules and, on template database. …”
Section: Biometric System Vulnerability Pointsmentioning
confidence: 99%
“…Matcher or classifier component could be subject for software modification or final decision substitution at locations G and H respectively. These security breaches are categorized, according to (Jain, Ross, & Nandakumar, 2011), into attacks related to the user interface, attacks on modules, on the interconnection between modules and, on template database. …”
Section: Biometric System Vulnerability Pointsmentioning
confidence: 99%
“…Participants were also inquired about the possibility of participating in future data acquisition sessions, and primary contact information was collected for this purpose. 1 Demographic information was also requested for statistics and sample characterization purposes, 1 It is important to further reinforce that contact information is stored separately from the data and that the database is anonymized. and a space for additional notes or comments regarding the experiments was also added.…”
Section: Overviewmentioning
confidence: 99%
“…A research field that has seen a recent trend towards the use of biosignals is biometrics, which focuses on identity recognition based on physiological or behavioral properties of an individual [1]. Electrocardiographic (ECG) data is one of the novel biometric traits where a growing interest is evident within the reference literature [2][3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…Biometric authentication is centered on the acquisition of individual human physical qualities, used to compose a template (feature vector) for further biometric identification (Woodward et al, 2002;Jain et al, 2011). …”
Section: Introduction To Hylemetrymentioning
confidence: 99%