We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Biometrics: An Overview of the Technology, Issues and Applications

by S. Asha, C. Chellappan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 10
Year of Publication: 2012
Authors: S. Asha, C. Chellappan
10.5120/4859-7134

S. Asha, C. Chellappan . Biometrics: An Overview of the Technology, Issues and Applications. International Journal of Computer Applications. 39, 10 ( February 2012), 35-52. DOI=10.5120/4859-7134

@article{ 10.5120/4859-7134,
author = { S. Asha, C. Chellappan },
title = { Biometrics: An Overview of the Technology, Issues and Applications },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 10 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 35-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number10/4859-7134/ },
doi = { 10.5120/4859-7134 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:06.928690+05:30
%A S. Asha
%A C. Chellappan
%T Biometrics: An Overview of the Technology, Issues and Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 10
%P 35-52
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Biometric identification refers to identifying an individual based on his/her distinguishing physiological and/or behavioral characteristics. As these characteristics are distinctive to each and every person, biometric identification is more reliable and capable than the traditional token based and knowledge based technologies differentiating between an authorized and a fraudulent person. This article discusses the various biometric technologies, the advantages and disadvantages of biometric technologies, the security issues and finally the applications of various biometric technologies in day today life.

References
  1. A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition, IEEE Transactions on Circuits and Systems for Video Technology 14 (1) (2004) 4–20.
  2. Andrea F. Abate, Michele Nappi, Daniel Riccio, Gabriele Sabatino, "2D and 3D face recognition: A survey", www.elsevier.com, 2007.
  3. Amit Mhatre, Srinivasa Palla, Sharat Chikkerur and Venu Govindaraju, "Efficient search and retrieval in biometric database", SPIE, Defence and Security Symposium, 2005.
  4. Davide Maltoni. Handbook of Fingerprint Recognition. Springer Verlag, 2003.
  5. Edmund Spinella, “Biometric Scanning Technologies: Finger, Facial and Retinal Scanning”, SANS GSEC, Original Submission, San Francisco, CA Dec 2002, 28 May 2003.
  6. N. K. Ratha, J. H. Connell, R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems",IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001, pp 614- 634.
  7. Michael Zimmerman, “Biometrics And User Authentication”.
  8. Patrick A. Wittich, “Biometrics: Are YOU the Key to Security?” Information Security Reading Room, SANS Institute 2003.
  9. Penny Khaw, "Iris Recognition Technology for Improved Authentication", As part of the Information Security Reading Room, SANS Institute 2002.
  10. R.L. Zunkel, Hand geometry based verification, in: A. Jain, R. Bolle, S. Pankanti (Eds.), Biometrics, Kluwer Academic Publishers, Dordrecht, 1999, pp. 87–101.
  11. S. Nanavati, M. Thieme, R. Nanavati, Biometrics: Identity Verification in a Networked World, pp. 123–131, Wiley, New York, 2002.
  12. Struif, Use of biometrics for user verification in electronic signature smartcards, E-smart 2001, Lecture Notes in Computer Science, Vol. 2140, Springer, Berlin, 2001, pp. 220–227.
  13. Tricia Olsson, “Strengthening Authentication with Biometric Technology”, GSEC Practical, August 2003.
  14. Wayne Penny, “Biometrics: A Double Edged Sword - Security and Privacy”, GSEC Certification Practical - Version 1.3.
  15. W.S. Wijesoma, K.W. Yue, K.L. Chien, T.K. Chow, Online Handwritten Signature Verification for Electronic Commerce over the Internet, WI 2001, LNAI 2198, 2001, pp. 227–236.
Index Terms

Computer Science
Information Sciences

Keywords

biometrics security identification applications issues technologies