Comprehensive survey: Biometric user authentication application, evaluation, and discussion

R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

Biometric-based cybersecurity techniques

PH Griffin - Advances in Human Factors in Cybersecurity …, 2016 - Springer
This paper describes biometric-based methods for achieving strong, low cost mutual and
multi-factor authentication on the Internet of Things (IoT). These methods can leverage …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Biometric technologies: functionality, emerging trends, and vulnerabilities

JV Di Nardo - Journal of Applied Security Research, 2008 - Taylor & Francis
Biometric identification methods are quickly becoming commonplace in security and access
control applications. This article presents a general overview of various biometric …

Biometric-based human recognition systems: an overview

D Palma, PL Montessoro - Recent Advances in Biometrics, 2022 - books.google.com
With the proliferation of automated systems for reliable and highly secure human
authentication and identification, the importance of technological solutions in biometrics is …

[PDF][PDF] A study of biometric security technology acceptance and primary authentication

J Fletcher, P Howard, D Mody, A Vyas… - Proceedings of student …, 2017 - academia.edu
Advances in biometrics present the possibility of providing robust security and authentication
methods compared to traditional password-oriented security measures. Biometric security …

Biometric Authentication: Authentication through human characteristics

D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy… - Advances in User …, 2017 - Springer
This chapter focuses on the biometric authentication process which helps to prevent
unauthorized access to computing resources. This chapter focuses on the biometric …

Biometric authentication security: an overview

S Alwahaishi, J Zdrálek - 2020 IEEE International Conference …, 2020 - ieeexplore.ieee.org
Advances in the field of Information and Communication Technology and the importance of
securing information make identifying and authenticating individuals a corner stone in the …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …