Biometric recognition: Security and privacy concerns

S Prabhakar, S Pankanti, AK Jain - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Biometrics offers greater security and convenience than traditional methods of personal
recognition. In some applications, biometrics can replace or supplement the existing …

Biometrics: Privacy's foe or privacy's friend?

JD Woodward - Proceedings of the IEEE, 1997 - ieeexplore.ieee.org
From the INS to ATM's, both the public and private sectors are making extensive use of
biometrics for human recognition. As this technology becomes more economically viable …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

A practical guide to biometric security technology

S Liu, M Silverman - IT Professional, 2001 - ieeexplore.ieee.org
As organizations search for more secure authentication methods for user access, e-
commerce. and other security applications, biometrics is gaining increasing attention. But …

[图书][B] Biometric technologies and verification systems

JR Vacca - 2007 - books.google.com
Biometric Technologies and Verification Systems is organized into nine parts composed of
30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

Secure biometrics: Concepts, authentication architectures, and challenges

S Rane, Y Wang, SC Draper… - IEEE Signal Processing …, 2013 - ieeexplore.ieee.org
Biometrics are an important and widely used class of methods for identity verification and
access control. Biometrics are attractive because they are inherent properties of an …

[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Enhancing security and privacy in biometrics-based authentication systems

NK Ratha, JH Connell, RM Bolle - IBM systems Journal, 2001 - ieeexplore.ieee.org
Because biometrics-based authentication offers several advantages over other
authentication methods, there has been a significant surge in the use of biometrics for user …