Biometric Access Control Systems: a review on technologies to improve their efficiency

被引:0
作者
Duarte, Tiago [1 ]
Pimentao, Joao Paulo [1 ]
Sousa, Pedro [1 ]
Onofre, Sergio [2 ]
机构
[1] Univ Nova Lisboa, Fac Sci & Technol, Dept Elect Engn, Caparica, Portugal
[2] Holos SA, Caparica, Portugal
来源
2016 IEEE INTERNATIONAL POWER ELECTRONICS AND MOTION CONTROL CONFERENCE (PEMC) | 2016年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the hot topics of today's world is security. Not only companies spend more and more money in order to protect their valuable assets (physical and digital), regular people also need enhanced forms of security regarding personal sensitive information. Traditional password methods for protection of information are prone to brute force attacks, as computational power increases. The focus has then been shifting towards more advanced forms of authentication that do not rely exclusively on a sequence of symbols. The use of biometric authentication has been added as a security feature to numerous systems. Its use has increased in popularity during the last few years, benefiting from a mass implementation of biometric authentication methods in mobile devices (namely laptops and smartphones), such as fingerprint readers and/or built-in cameras. There are already a few available systems which can offer these advantages, but they are typically closed systems that do not integrate well with existing infrastructures. Therefore, this paper intends to review the use of biometric sensors on a fully open and compatible Access Control System.
引用
收藏
页码:795 / 800
页数:6
相关论文
共 31 条
  • [1] Integrating a wavelet based perspiration liveness check with fingerprint recognition
    Abhyankar, Aditya
    Schuckers, Stephanie
    [J]. PATTERN RECOGNITION, 2009, 42 (03) : 452 - 464
  • [2] [Anonymous], 2011, NIST DEFINITION CLOU
  • [3] [Anonymous], 2012, INT J COMPUT APPL
  • [4] [Anonymous], 2009, An introduction to multiagent systems
  • [5] Atzori L., 2010, COMPUT NETWORKS
  • [6] Bhargava Akansha, 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC), P40, DOI 10.1109/ICESC.2014.98
  • [7] Security evaluation of biometric authentication systems under real spoofing attacks
    Biggio, B.
    Akhtar, Z.
    Fumera, G.
    Marcialis, G. L.
    Roli, F.
    [J]. IET BIOMETRICS, 2012, 1 (01) : 11 - 24
  • [8] Clarke N, 2005, COMPUT FRAUD SECUR, P12, DOI 10.1016/S1361-3723(05)70253-0
  • [9] Daugman J, 2009, ESSENTIAL GUIDE TO IMAGE PROCESSING, 2ND EDITION, P715, DOI 10.1016/B978-0-12-374457-9.00025-1
  • [10] Delac K, 2004, PROCEEDINGS ELMAR-2004: 46TH INTERNATIONAL SYMPOSIUM ELECTRONICS IN MARINE, P184