A practical guide to biometric security technology

S Liu, M Silverman - IT Professional, 2001 - ieeexplore.ieee.org
As organizations search for more secure authentication methods for user access, e-
commerce. and other security applications, biometrics is gaining increasing attention. But …

Biometric recognition: Security and privacy concerns

S Prabhakar, S Pankanti, AK Jain - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Biometrics offers greater security and convenience than traditional methods of personal
recognition. In some applications, biometrics can replace or supplement the existing …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

[图书][B] Implementing biometric security

J Chirillo, S Blaul - 2003 - dl.acm.org
From the Publisher: Get the specific guidelines, applications, and procedures for
implementing a biometric security system-straight from the experts As threats to vital data …

[图书][B] Biometric technologies and verification systems

JR Vacca - 2007 - books.google.com
Biometric Technologies and Verification Systems is organized into nine parts composed of
30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Understanding user perspectives on biometric technology

AP Pons, P Polak - Communications of the ACM, 2008 - dl.acm.org
Biometric technology, mainly used today in security sensitive organizations like
governments and financial institutions, is soon expected to play an increasing role in all …

[PDF][PDF] Biometric authentication: System security and user privacy.

AK Jain, K Nandakumar - Computer, 2012 - biometrics.cse.msu.edu
US Federal Trade Commission reports that ID theft affects millions of innocent victims each
year and is the most common consumer complaint (www. ftc. gov/opa/reporter/idtheft/index …

[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Biometric technology and ethics: Beyond security applications

A North-Samardzic - Journal of Business Ethics, 2020 - Springer
Biometric technology was once the purview of security, with face recognition and fingerprint
scans used for identification and law enforcement. This is no longer the case; biometrics is …