2016
DOI: 10.1049/iet-bmt.2015.0018
|View full text |Cite
|
Sign up to set email alerts
|

Small fingerprint scanners used in mobile devices: the impact on biometric performance

Abstract: Biometrics has burst into mobile technology. Fingerprint scanners are being embedded in smartphones and tablets supplying these devices with the security and usability provided by biometric authentication mechanisms. However, performance results obtained by biometric systems cannot be extrapolated to mobile devices. The conditions change, especially at capture process, due to the reduced sensing area of the scanners used. The impact of small fingerprint scanners on the quality and biometric performance of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 10 publications
(25 reference statements)
0
16
0
Order By: Relevance
“…al. [19], where the impact of sensor size on the systems performances have been investigated. Roy et.…”
Section: B Evaluation Protocolmentioning
confidence: 99%
“…al. [19], where the impact of sensor size on the systems performances have been investigated. Roy et.…”
Section: B Evaluation Protocolmentioning
confidence: 99%
“…Research studies are beginning to explore these factors [12], [10]. However, there are still limited resources on how the performance of mobile biometrics change in a variety of scenarios and environments requiring further exploration, including the definition of a suitable methodology.…”
Section: Mobile Biometricsmentioning
confidence: 99%
“…In the last years, research has provided ample support for the assertion that biometrics is the future of authentication. There are plenty of works based on fingerprint [8], gait, face, voice, gesture, iris, typing pattern, signature [9] or even electrocardiograms acquired by mobile sensors [10]. All these solutions use an authentication method based on the data about "what user is".…”
Section: Related Workmentioning
confidence: 99%