Who's Who? Challenges in Biometric Authentication

AK Jain - Joint Pattern Recognition Symposium, 2003 - Springer
A wide variety of systems require reliable personal recognition schemes to either confirm or
determine the identity of an individual requesting their services. The purpose of such …

Biometric applications related to human beings: there is life beyond security

M Faundez-Zanuy, A Hussain, J Mekyska… - Cognitive …, 2013 - Springer
The use of biometrics has been successfully applied to security applications for some time.
However, the extension of other potential applications with the use of biometric information …

[PDF][PDF] The historical development of biometric authentication techniques: A recent overview

RD Chaudhari, AA Pawar, RS Deore - International Journal of …, 2013 - academia.edu
Computer Interaction has been established whose products are likely to create a large
business in the near future. It has been called 'Biometrics'. Biometrics is seen by many as a …

Biometrics databases

PJ Flynn - Handbook of Biometrics, 2008 - Springer
Biometric recognition systems are beginning to see broad deployment. The general trend in
system use includes an increase in number of subjects sensed and an increase in number …

Achieving cost reductions through biometrics

J Groves - Computer Fraud & Security, 2002 - Elsevier
Introduction It often frustrates me that some of our European neighbours are far more
advanced in establishing large-scale biometric deployments than UK enterprises. How can …

[PDF][PDF] Introduction to the special issue on recent advances in biometric systems [guest editorial]

KW Boyer, V Govindaraju, NK Ratha - IEEE Transactions on …, 2007 - cubs.buffalo.edu
A total of 78 papers were submitted for consideration for the special issue. Those that
appear in this special issue result from a careful review process and consideration of timing …

Biometric recognition: Security and privacy concerns

S Prabhakar, S Pankanti, AK Jain - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Biometrics offers greater security and convenience than traditional methods of personal
recognition. In some applications, biometrics can replace or supplement the existing …

[图书][B] Biometric technologies and verification systems

JR Vacca - 2007 - books.google.com
Biometric Technologies and Verification Systems is organized into nine parts composed of
30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses …

Where does biometrics sit in today's security ecosystem?

A Storey - Biometric Technology Today, 2020 - magonlinelibrary.com
Not so long ago, biometric technology was a thing of science fiction. But as costs fell and
more innovations became commercially viable, biometric security systems have been rolled …

[引用][C] How secure is your biometric solution?

M Pettersson, Ä Obrink - Precise Biometrics White Paper, http://www. ibia. org, 2002