[图书][B] Automated biometrics: Technologies and systems

DD Zhang - 2013 - books.google.com
Biometrics-based authentication and identification are emerging as the most reliable method
to authenticate and identify individuals. Biometrics requires that the person to be identified …

Challenges and constraints to the diffusion of biometrics in information systems

A Chandra, T Calderon - Communications of the ACM, 2005 - dl.acm.org
Challenges and constraints to the diffusion of biometrics in information systems Page 1
COMMUNICATIONS OF THE ACM December 2005/Vol. 48, No. 12 101 Biometrics are a …

A survey of automated biometric authentication techniques

AN Kataria, DM Adhyaru, AK Sharma… - 2013 Nirma university …, 2013 - ieeexplore.ieee.org
Biometric authentication refers to the automatic identification of a person by analyzing their
physiological and/or behavioral characteristics or traits. Since many physiological and …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

50 years of biometric research: Accomplishments, challenges, and opportunities

AK Jain, K Nandakumar, A Ross - Pattern recognition letters, 2016 - Elsevier
Biometric recognition refers to the automated recognition of individuals based on their
biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first …

[图书][B] Biometric-based physical and cybersecurity systems

MS Obaidat, I Traore, I Woungang - 2019 - Springer
Biometrics represents one of the most robust and reliable forms of human identification in
physical and cyber security. The last decade has witnessed tremendous advances in sensor …

Biometric authentication

AC Weaver - Computer, 2006 - ieeexplore.ieee.org
In this age of digital impersonation, biometric techniques are being used increasingly as a
hedge against identity theft. The premise is that a biometric-a measurable physical …

[图书][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …