The term biometrics has been hard to escape recently, with numerous articles being published discussing the advantages and disadvantages of the technology. Much of this …
Conclusion Readers responsible for implementing biometrics as well as those who consult on the topic or are interested in using biometric technologies will find this book helpful …
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses …
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society …
S Furnell - Biometric Technology Today, 2021 - Elsevier
For years biometrics were touted as the solution to the challenge of user authentication–but until relatively recently, they were something that more people had heard about than actually …
AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications …
A Esposito - arXiv preprint arXiv:1203.0333, 2012 - arxiv.org
Biometric authentication systems are presented as the best way to reach high security levels in controlling access to IT systems or sensitive infrastructures. But several issues are often …
E Bowman - Identix Corporation, 2000 - biometrie-online.net
Chances are this is not your first exposure to the field of biometric identification. After all, the first modern biometric device was introduced on a commercial basis over 25 years ago …
AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications …