CFP last date
20 December 2024
Reseach Article

Comparative Study on Secure Biometrics for Human Identification

by Shreya Prakash, Nidhi Sharma, Nitasha Hasteer
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 24
Year of Publication: 2013
Authors: Shreya Prakash, Nidhi Sharma, Nitasha Hasteer
10.5120/11231-6507

Shreya Prakash, Nidhi Sharma, Nitasha Hasteer . Comparative Study on Secure Biometrics for Human Identification. International Journal of Computer Applications. 65, 24 ( March 2013), 9-12. DOI=10.5120/11231-6507

@article{ 10.5120/11231-6507,
author = { Shreya Prakash, Nidhi Sharma, Nitasha Hasteer },
title = { Comparative Study on Secure Biometrics for Human Identification },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 24 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number24/11231-6507/ },
doi = { 10.5120/11231-6507 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:20:45.483852+05:30
%A Shreya Prakash
%A Nidhi Sharma
%A Nitasha Hasteer
%T Comparative Study on Secure Biometrics for Human Identification
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 24
%P 9-12
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a comparative study of biometric security using various techniques is presented. This paper presents the authentication of information using fingerprint and face biometric technique. A detailed comparison between finger-print biometric and face biometric & their pros and cons while using for the devices is presented. Face biometric identification is more beneficial than fingerprint biometric identification. Face recognition provides more authentication and verification for identification in biometric.

References
  1. Miller. B "Vital signs of identity" ,IEEE Spectrum 31, 2 (1994)
  2. Jain, A. K. Bolle, R. and Pankanti S. (Eds. ):"Biometrics: Personal Identification in Networked Society", Kluwer, New York, 1999
  3. "Smart Cart Alliance Identity Council": Identity and Smart Card Technology and Application Glossary, http://www. smartcardalliance. org, 2007.
  4. Johnson I Agbinya et al. ,"Design and Implementation of Multimodal Digital Identify Management System Using Fingerprint Matching and Face Recognition" in Int. Conf. on broadband communication and biomedical applications, Melbourne, Australia, pp. 273, 2011.
  5. Unsang et al. ,"Multimodal Biometric Person Authentication" pp. 54-75,2012
  6. Anil Jain et al . ,"Biometric identification" in communication of Acm, pp 91-98,2000
  7. Mazumdar, Subhra, Dhulipala, Venkata :"Biometric Security Using Finger Print Recognition" ,University of California, San Diego,2008
  8. Report on "Defense Biometric" in Defense Science Board Task Force, Washington, D. C ,,March 2007
  9. N. L. Clarke et al. "Biometric Authentication for Mobile Devices" in Australian Information Warfare & Security Conference,2002
  10. "An Overview of Biometric Recognition": http://biometric. cse. msu. edu/info. html, Dec. 18, 2006.
  11. Anil K. Jain, "Biometric Authentication: How do I know who are you" in The Wall Street Journal, 2004
  12. Atul Gupta et al. "Facial recognition" in White Paper of Infosys, 2011
  13. Ashbourn J, "Biometric Advanced Identify Verification" In The Complete Guide Springer, 2000.
  14. "Biometrics":http://mistral. univavignon. fr/mediawiki/index. php/Biometrics, Feb. 14, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Biometric Authentication Identification Design