A comprehensive survey on the biometric systems based on physiological and behavioural characteristics

被引:49
作者
Abdulrahman S.A. [1 ]
Alhayani B. [2 ]
机构
[1] Department of Computer Engineering Techniques, College of Information Technology, Imam Ja'afar Al-Sadiq University, Baghdad
[2] Department of Electronics and Communication, Yildiz Technical University, Istanbul
来源
Materials Today: Proceedings | 2023年 / 80卷
关键词
Behavioral; Biometrics; Identification; Physiological; Techniques;
D O I
10.1016/j.matpr.2021.07.005
中图分类号
学科分类号
摘要
With the fast increasing of the electronic crimes and their related issues, deploying a reliable user authentication system became a significant task for both of access control and securing user's private data. Human biometric characteristics such as voice, finger, iris scanning, face, signature and other features provide a dependable security level for both of the personal and the public use. Many biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master role in degrading imposters’ attacks. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper aims to briefly address the psychological biometric authentication techniques and a brief summary to the advantages, disadvantages of each method. Main contribution it found that used EEG signals, as biometrics is the best technique compare to with five other techniques. © 2021
引用
收藏
页码:2642 / 2646
页数:4
相关论文
共 27 条
[1]  
Jain A.K., Nandakumar K., Ross A., 50 years of biometric research: Accomplishments, challenges, and opportunities, Pattern Recognit. Lett., 79, pp. 80-105, (2016)
[2]  
Agarwal V., Sahai A., Gupta A., Jain N., Human identification and verification based on signature, fingerprint and iris integration, 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), pp. 456-461, (2017)
[3]  
Sharma A.K., Raghuwanshi A., Sharma V.K., Biometric system-a review, Int. J. Comput. Sci. Inf. Technol., 6, 5, pp. 4616-4619, (2015)
[4]  
Abdulrahman S.A., Khalifa W., Roushdy M., Salem A.-B.-M., Comparative study for 8 computational intelligence algorithms for human identification, Comput. Sci. Rev., 36, (2020)
[5]  
Champod C., Lennard C.J., Margot P., Stoilovic M., Fingerprints and Other Ridge Skin Impressions, (2004)
[6]  
Guo G., Zhang N., pp. 436-442, (2018)
[7]  
Alsaadi I.M., Physiological biometric authentication systems, advantages, disadvantages and future development: a review, Int. J. Sci. Technol. Res., 4, 12, pp. 285-289, (2015)
[8]  
Bapat A., Kanhangad V., Segmentation of hand from cluttered backgrounds for hand geometry biometrics, 2017 IEEE Region 10 Symposium (TENSYMP), pp. 1-4, (2017)
[9]  
Abdulrahman S.A., Khalifa W., Roushdy M., (2019)
[10]  
Angadi S., Hatture S., Hand geometry based user identification using minimal edge connected hand image graph, IET Comput. Vis., 12, 5, pp. 744-752, (2018)