An overview on biometric identification methods and implementations

被引:0
|
作者
Stroica, Petre [1 ]
Vladescu, Marian [1 ]
机构
[1] SOEL Comun SRL, Bucharest 050912, Romania
来源
ADVANCED TOPICS IN OPTOELECTRONICS, MICROELECTRONICS, AND NANOTECHNOLOGIES V | 2010年 / 7821卷
关键词
biometrics; identification; security;
D O I
10.1117/12.882520
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper presents the three most efficient methods of biometric identification: fingerprint recognition, face recognition and iris recognition. The authors evaluated the performance of each method, based on the concept of error rates. The paper also presents an overview of the biometric identification implementations, highlighting the advantages and disadvantages from a practical point of view, based on a balance between reliability and invasiveness of each method.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Authentication and Identification Methods Used in Keystroke Biometric Systems
    Ali, Md Liakat
    Tappert, Charles C.
    Qiu, Meikang
    Monaco, John V.
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1424 - 1429
  • [2] A survey of biometric recognition methods
    Delac, K
    Grgic, M
    PROCEEDINGS ELMAR-2004: 46TH INTERNATIONAL SYMPOSIUM ELECTRONICS IN MARINE, 2004, : 184 - 193
  • [3] Imagining the Biometric Future: Debates Over National Biometric Identification in Israel
    Spektor, Michelle
    SCIENCE AS CULTURE, 2020, 29 (01) : 100 - 126
  • [4] A comprehensive overview of biometric fusion
    Singh, Maneet
    Singh, Richa
    Ross, Arun
    INFORMATION FUSION, 2019, 52 : 187 - 205
  • [5] Biometric technology overview
    LI Yong-Ping * (Biometrics Laboratory
    NuclearScienceandTechniques, 2006, (02) : 97 - 105
  • [6] Identification with encrypted biometric data
    Bringer, Julien
    Chabanne, Herve
    Kindarji, Bruno
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (05) : 548 - 562
  • [7] An overview of steganography techniques applied to the protection of biometric data
    Mandy Douglas
    Karen Bailey
    Mark Leeney
    Kevin Curran
    Multimedia Tools and Applications, 2018, 77 : 17333 - 17373
  • [8] An overview of steganography techniques applied to the protection of biometric data
    Douglas, Mandy
    Bailey, Karen
    Leeney, Mark
    Curran, Kevin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (13) : 17333 - 17373
  • [9] Biometric Identification: Are We Ethically Ready?
    Renaud, Karen
    Hoskins, Andrew
    von Solms, Rossouw
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [10] RELIABILITY OF SELECTED BIOMETRIC IDENTIFICATION SYSTEMS
    Stekerova, Veronika
    PROCEEDING OF 7TH INTERNATIONAL CONFERENCE ON TRENDS IN AGRICULTURAL ENGINEERING 2019, 2019, : 534 - 539