Open Access Open Access  Restricted Access Subscription or Fee Access

Principles of Bio-Metric Authentication Systems

Runping Yang

Abstract


Verification will be procedure involved in finding out the confirmation belongs to a person will be permitted for gaining access of a system. Biometric verification might be the process involved in providing the protection which depends with exceptional physiological or behavioral physiognomies with respect to a person for confirming the identity of the particular individual. Biometric validation frameworks associate the acquired information, retaining them in storage space, assured the validation of information with in database. Illustrations attained samples will be analogous with already collected and stored information, validation will be established. Characteristically, biometric verification might be utilized for handling permission of utilization of systems.  Biometric frameworks might be involved in delivering Enhanced protection; Value-added client familiarity, No requirement of remembering, Minimized Processing Complexity. Nevertheless biometric verification systems will be encompassing various disadvantages such as environmental factors might impact the verification procedure, developed verification process will not be completely precise, frameworks necessitate utilization of further hardware for acquiring the traits.  Biometric devices which perform the sensing process might be categorized into Physiological features along with observable features.  Physical biometric attributes prominently encompass identification with facial features, fingerprint, hand alignment, Iris along with DNA. Behavioral features include voice recognition, gait identification, signature verification and etc., This paper elaborately discusses various factors involved in biometric authentication system.


Keywords


Biometric Authentication, Physiological Traits, Behavioral Traits, Accuracy

Full Text:

PDF

References


A.K. Jain, A. Ross, S. Prabhakar: An Introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1):4-20, 2004.

G. Parziale: Touchless fingerprinting technology. Advances in biometrics, 25-48, 2008.

See, for instance, S. Murphy, H. Bray: Face recognition devices failed in test at Logan. The Boston Globe, September 2003. http://www.boston.com/news/local/articles/2003/09/03/face_recognition_devices_failed_in_test_at_logan/

National Science and Technology Council: Introduction to biometrics. 2007. http://www.biometrics.gov/documents/biofoundationdocs.pdf

A.K. Jain, A. Ross, S. Prabhakar: Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security, 1(2):125-143, 2006.

J.P. Campbell: Speaker recognition: a tutorial. Proceedings of the IEEE, 85(9):1437-1462, 1997.

J. Ortega-Garcia, J. Bigun, D. Reynolds, J. Gonzalez-Rodriguez: Authentication gets personal with biometrics. IEEE Signal Processing Magazine, 21(2):50-62, 2004.

M. Gifford, N. Edwards: Trial of dynamic signature verification for a real-world identification solution. BT Technology Journal, 23(2):259-266, 2005.

F. Monrose, A.D. Rubin: Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 16(4):351-359, 2000.

D. Bartmann: On the design of an authentication system based on keystroke dynamics using a predefined input text. International Journal of Information Security and Privacy, August 2006.

ISO/IEC: Information technology – Biometrics tutorial. ISO/IEC TR 24741:2007(E). 2007.

Jain et al.: An Introduction to biometric recognition.

J. Daugman: How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology, 14(1):21-30, 2004.

P.J. Phillips et al.: Face Recognition Vendor Tests 2006 and Iris Challenge Evaluation 2006: Large-scale results. 2007. http://frvt.org/FRVT2006/docs/FRVT2006andICE2006LargeScaleReport.pdf

Biometrics faces rosy future says pundits. Biometric Technology Today, 16(9):4-5, 2008.

A. Pfitzmann: Biometrie: wie einsetzen und wie keinesfalls. Informatik-Spektrum, 29(5):353-356, 2006. (German)

Jain et al.: An Introduction to biometric recognition.

N.K. Ratha, J.H. Connell, R.M. Bolle: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614-634, 2001.

N.K. Ratha, J.H. Connell, R.M. Bolle, S. Chikkerur: Cancelable biometrics: a case study in fingerprints. ICPR ’06: Proceedings of the 18th International Conference on Pattern Recognition, 370-373, 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.