Academia.eduAcademia.edu

Outline

A Review on Biometric Security Systems

2016

Abstract

Two of the most popular biometric security systems work on the model of either fingerprint recognition or palm vein technology. The first type of biometric security device uses the fingerprint recognition technique where a highly sensitive camera captures the thumb prints of the individuals. The person has to place his thumb over the scanner, which then captures the fingerprint and matches it with existing records. The biometric device is mostly used for fingerprint recognition, fingerprint verification, fingerprint authentication, fingerprint scanning and fingerprint matching applications. The device is so designed that it is able to capture dry, wet and blurred images as well. The other kind of biometric security device with palm vein technology uses an infrared sensor that identifies an individual's vein pattern. This method works on a very sensitive model of authentication technique. This type of biometric security system does not require being touched; the user has to place...

Key takeaways
sparkles

AI

  1. Biometric security systems utilize unique physiological traits for authentication, enhancing security over traditional methods.
  2. Fingerprint and palm vein technologies are the most prevalent biometric security systems in use today.
  3. Biometric authentication involves a three-step process: Capture, Process, and Enroll, followed by verification or identification.
  4. The accuracy of biometric systems is largely dependent on the quality of data capture and processing methods.
  5. Research indicates that contactless palm vein authentication offers high accuracy and hygiene advantages for public use.

References (14)

  1. Lye Wi Liam, Ali Chekima, Liau Chung Fan and Jamal Ahmad Dargham, -Iris Recognition using Self-Organizing Neural Network‖, IEEE 2002 Student Conference on Research and Development Proceedings, Shah Alam, Malaysia, pp. 169-172.
  2. Eric Sung, Xilin Chen, Jie Zhu and Jie Yang, -Towards non-cooperative iris recognition systems‖, Seventh international Conference on Control, Automation, Robotics and Vision (ICARCV'02), Singapore, Dec. 2002. pp. 990-995.
  3. Jiali Cui, Yunhong Wang, JunZhou Huang, Tieniu Tan and Zhenan Sun, -An Iris Image Synthesis Method Based on PCA and Super-resolution‖, IEEE CS Proceedings of the 17th International Conference on Pattern Recognition (ICPR'04), Cambridge, UK, 23-26 August 2004; 4: 471-474.
  4. Hyung Gu Lee, Seungin Noh, Kwanghyuk Bae, Kang-Ryoung Park and Jaihie Kim, -Invariant biometric code extraction‖, IEEE Intelligent Signal Processing and Communication Systems (ISPACS 2004), Seoul, Korea, 18-19 November, 2004; pp. 181-184.
  5. Zhenan Sun, Yunhong Wang, Tieniu Tan and Jiali Cui, -Improving Iris Recognition Accuracy via Cascaded Classifiers‖, IEEE Transactions on Systems, MAN, and CYBERNETICS -Part C: Applications and Reviews, August 2005; 35(3): 435-441.
  6. R. Sanches-Reillo, C. Sanchez-Avila, and A. Gonzalez-Marcos, -Biometric Identification through Hand Geometry Measurements,‖ IEEE Transactions of Pattern Analysis and Machine Intelligence, October 2000; 22(10.
  7. Ajeet Singh, BK Singh and Manish Verma), -Comparison of Different Algorithms of Face Recognition, VSRD-IJEECE, 2012; 2(5): 272-278.
  8. Samir K Bandyopadhyay, Debnath Bhattacharyya and Anindya Jyoti Pal, -Secure Delivery of Handwritten Signature‖, ACM Ubiquity, October 16, 2006; 7(40).
  9. Weiki Yuan, Zhonghua Lin and Lu Xu, -A Rapid Iris Location Method Based on the Structure of Human Eyes‖, Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference Shanghai, China, 1-4 September, 2005; pp. 3020-3023.
  10. Christopher Boyce, Arun Ross, Matthew Monaco, Lawrence Hornak and Xin Li, -Multispectral Iris Analysis: A Preliminary Study‖, Proceedings of the 2006 Conference www.wjert.org 45 Samir et al. World Journal of Engineering Research and Technology on Computer Vision and Pattern Recognition Workshop (CVPRW'06), June 2006, New York, USA.
  11. R. Dhamija and Perrig, "Deja Vu: a user study images for authentication", 9th USENIX Secwity Symposium, 2000.
  12. Martin de La Gorce*, Nikos Paragios -A variational approach to monocular hand-pose estimation‖ Computer Vision and Image Understanding, 2010; 114: 363-372.
  13. Kaushik Subramanian -Pointing Based Object Localization‖ Robotics and Computer Vision, ECE 472 April 16th, 2009.
  14. CenkerÖden, AytülErçil, VedatTaylanYıldız, Hikmet Kırmızıta, and Burak Büke -Hand Recognition Using Implicit Polynomials and Geometric Features‖ Bo aziçi University, Alper Atalay BUPAM Laboratory 80815, Istanbul Turkey.