Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Biometric Authentication System: Finger-Vein, Hand Writing, Brain ID, Voice, Retinal

M. Gowtham

Abstract


As the biometric verification is expanding there is interest for the high security for ensuring private data and access control with expanded speed and exactness. In biometrics, a person should be recognized in view of some trademark physiological parameters.

Verification is a critical thought while securing information or any sort of data framework. Verification that depends on Biometrics characteristics is more secure for some, applications like cryptosystems. In spite of the fact that current methodologies for verification are easy to use, they have vulnerabilities, for example, the likelihood and criminally undermining a client. The examination is finished utilizing the different parameters from which the kurtosis, go demonstrates expansive variety from individual to individual. In any case, the current biometric frameworks are not appropriate in high security and are exceptionally perplexing regarding time or space or both. This paper exhibits an audit on the biometric validation systems and some future potential outcomes in this field. In biometrics, a person should be distinguished in view of some trademark physiological parameters.


Keywords


Isometric, Pattern, IRIS, EEG Based Brain ID, Finger Vein Database Biometric Voice Authentication.

Full Text:

PDF

References


Smart Cart Alliance Identity Council (2007): Identity and Smart Card Technology and Application Glossary, http://www.smartcardalliance.org, as visited on 25/10/2008.

Jain, A. K.; Ross, A. & Pankanti, S., "Biometrics: A Tool for Information Security", IEEE Transactions on Information Forensics And Security, Volume 1, issue 2, Jun. 2006, pp 125 – 144.

R. Cappelli, D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, “Performance evaluation of fingerprint verification systems”, IEEE Trans. Pattern Anal. Mach. Intell., Volume 28, issue 1, Jan. 2006, pp. 3–18.

A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technology, Special Issue Image- and Video-Based Biomet., Volume 14, Issue 1, Jan. 2004, pp. 4–20.

R. Sanchez-Reillo, C. Sanchez-Avila, and A. Gonzales-Marcos, “Biometric identification through hand geometry measurements,”, IEEE Trans. Pattern Anal. Mach. Intell., Volume 22, Issue. 10, Oct. 2000, pp. 1168–1171. International Journal of u- and e- Service, Science and Technology Vol. 2, No. 3, September, 2009 26

M. A. Dabbah, W. L. Woo, and S. S. Dlay, "Secure Authentication for Face Recognition," In Proc. of IEEE Symposium on Computational Intelligence in Image and Signal Processing, Apr. 2007. USA, pp. 121 - 126.

Sanjay R. Ganorkar, Ashok A. Ghatol, “Iris Recognition: An Emerging Biometric Technology”, In Proc. of the 6th WSEAS International Conference on Signal Processing, Robotics and Automation, Greece, Feb. 2007, pp. 91 – 96.

E. Kukula, S. Elliott, “Implementation of Hand Geometry at Purdue University's Recreational Center: An Analysis of User Perspectives and System Performance”, In Proc. of 35th Annual International Carnahan Conference on Security Technology, UK, Oct. 2001, pp. 83 – 88.

C. Marin˜ o Æ M. G. Penedo Æ M. Penas Æ M. J. Carreira F. Gonzalez, “Personal authentication using digital retinal images”, Journal of Pattern Analysis and Application, Springer, Volume 9, Issue 1, May. 2006, pp. 21– 33.

Kar, B. Kartik, B. Dutta, P.K. “Speech and Face Biometric for Person Authentication”, In Proc. of IEEE International Conference on Industrial Technology, India, Dec.2006, pp. 391 - 396.

Samir K. Bandopadhaya, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, Poulumi Das, “Statistical Approach for Offline Handwritten Signature Verification”, Journal of Computer Science, Science Publication, Volume 4, Issues 3, May. 2008, pp. 181 – 185.

S. Hocquet, J. Ramel, H. Cardot, “Fusion of Methods for Keystroke Dynamic Authentication”, In Proc. of 4th IEEE Workshop on Automatic Identification Advanced Technologies, USA, Oct. 2005, pp. 224 – 229.

M. Paulini , C. Rathgeb, A. Nautsch, H. Reichau , H. Reininger ,C. Busch," Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection," Odyssey 2016, June 21-24, 2016, Bilbao,Spain

Marino, C., Penedo, M.G., Penas, M., et al.: ‘Personal authentication using digital retinal images’, Pattern Anal. Appl., 2006, 9, pp. 21–33

C. Marin˜ o Æ M. G. Penedo Æ M. Penas Æ M. J. Carreira F. Gonzalez, “Personal authentication using digital retinal images”, Journal of Pattern Analysis and Application, Springer, Volume 9, Issue 1, May. 2006, pp. 21–33.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.