P Punithavathi, G Subbiah - Biometric Technology Today, 2017 - Elsevier
Biometrics increasingly form the basis of identification and recognition across many sensitive applications. But as the use of biometric systems increases, so do the threats …
Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing …
C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
Conclusion Readers responsible for implementing biometrics as well as those who consult on the topic or are interested in using biometric technologies will find this book helpful …
VM Patel, NK Ratha… - IEEE signal processing …, 2015 - ieeexplore.ieee.org
Recent years have seen an exponential growth in the use of various biometric technologies for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …
L Nanni, A Lumini - Biometrics: Methods, Applications and …, 2010 - researchgate.net
Biometrics is widely used in access control systems, but it has a serious drawback in case of stealing or leakage, therefore, in the recent past, biometric template security has obtained …
W Shen, R Khanna, JD Woodward - Proceedings of the IEEE, 1997 - researchgate.net
Today's “new technological realities” force us to examine, from the law and policy perspectives, what is required to safeguard the public interest and to ensure optimal results …
K Yang, E Yingzi Du - Recent Patents on Electrical & Electronic …, 2011 - ingentaconnect.com
In general, the biometric patterns of an individual are permanently bound with him/her and it is almost impossible to replace. As a result, once stolen or compromised, the biometric data …