Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

[图书][B] Biometric technologies and verification systems

JR Vacca - 2007 - books.google.com
Biometric Technologies and Verification Systems is organized into nine parts composed of
30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

[图书][B] Biometrics in identity management: Concepts to applications

SK Modi - 2011 - books.google.com
In todayOCOs digital infrastructure we have to interact with an increasing number of
systems, both in the physical and virtual world. Identity management (IdM)--the process of …

Biometric recognition: Security and privacy concerns

S Prabhakar, S Pankanti, AK Jain - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Biometrics offers greater security and convenience than traditional methods of personal
recognition. In some applications, biometrics can replace or supplement the existing …

[图书][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Biometrics: The future of identification [guest eeditors' introduction]

S Pankanti, RM Bolle, A Jain - Computer, 2000 - ieeexplore.ieee.org
It is too early to predict where, how, and in which form reliable biometric services will
eventually be delivered. But it is certain that there is no way around biometrics-based …

Biometrics, is it a viable proposition for identity authentication and access control?

HJ Kim - Computers & Security, 1995 - Elsevier
In modern society, where a welfare recipient signs up for benefits under six identities, a child
is released to a stranger from a day care centre, a hacker accesses sensitive databases, and …

Biometric authentication

AC Weaver - Computer, 2006 - ieeexplore.ieee.org
In this age of digital impersonation, biometric techniques are being used increasingly as a
hedge against identity theft. The premise is that a biometric-a measurable physical …