[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Second generation biometrics, 2010Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications
such as national ID cards, border crossings, government benefits, and access control. As a
result, biometric recognition, or simply biometrics, which is based on physiological and
behavioural characteristics of a person, is being increasingly adopted and mapped to
rapidly growing person identification applications. Unlike credentials (documents and PIN) …
Abstract
Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications such as national ID cards, border crossings, government benefits, and access control. As a result, biometric recognition, or simply biometrics, which is based on physiological and behavioural characteristics of a person, is being increasingly adopted and mapped to rapidly growing person identification applications. Unlike credentials (documents and PIN), biometric traits (eg, fingerprint, face, and iris) cannot be lost, stolen, or easily forged; they are also considered to be persistent and unique. Use of biometrics is not new; fingerprints have been successfully used for over one hundred years in law enforcement and forensics to identify and apprehend criminals. But, as biometrics permeates our society, this recognition technology faces new challenges. The design and suitability of biometric technology for person identification depends on the application requirements. These requirements are typically specified in terms of identification accuracy, throughput, user acceptance, system security, robustness, and return on investment. The next generation biometric technology must overcome many hurdles and challenges to improve the recognition accuracy. These include ability to handle poor quality and incomplete data, achieve scalability to accommodate hundreds of millions of users, ensure interoperability, and protect user privacy while reducing system cost and enhancing system integrity. This chapter presents an overview of biometrics, some of the emerging biometric technologies and their limitations, and examines future challenges.
Citeseer
以上显示的是最相近的搜索结果。 查看全部搜索结果