Significant Applications of Biometrics
Keywords:
FMR, ROC, DET, FTC, PINAbstract
Biometric Technology and its applications have existed longer than people believe. Currently the number of applications instituted around the world is increasing. In 1996 approximately 10,000 biometric devices were in use worldwide. Some estimate the number will grow to 50,000 by year 2000. Bimetric vendors feel that time and attendance is the biggest growth area for biometrics in the near future. The applications in the biometric technology are limitless. Four to five years ago biometric technology will still considered too „fictional‟ for many.
References
. http://www.cilab.upf.edu/biosecure1/public_docs_Deli/BioSecure_Deliverable_D10-2-3_b3.pdf
. Jain, A. K. (28-30 April 2004), " Biometric recognition: how do I know who you are?", Signal Processing and Communications Applications Conference, 2004. Proceedings of the IEEE 12th:3 - 5
. Jain, A. K.; Ross, A. & Pankanti, S. (June 2006), "Biometrics: A Tool for Informat ion Security", IEEE Transactions On Information Forensics And Security 1st (2)
. P. J. Philips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone, Face Recognition Vendor Test 2002: Overview and Summary (Online) [1]
. C. Wilson, A. R. Hicklin, H. Korves, B. Ulery, M.Zoepfl, M. Bone, P. Grother, R. J. Micheals, S. Otto, and C. Watson, Fingerprint vendor
technology evaluation 2003: summary of results and analysis report, NIST Internal Rep. 7123, Jun. 2004 [Online] [2]
. R. Cappelli, D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, Performance evaluation of fingerprint verification systems, IEEE Trans.
Pattern Anal. Mach. Intell., vol. 28, no. 1, pp. 3–18, Jan. 2006
. E. Kukula, S. Elliott, Implementation of Hand Geometry at Purdue University's Recreational Center: An Analysis of User Perspectives and System Performance, IEEE 2005
. International Biometric Group, Independent Testing of Iris Recognition Technology, May 2005 (Online) [3]
. NIST Iris Challenge Evaluation, (Online) [4]
. S. Hocquet, J. Ramel, H. Cardot, Fusion of Methods for Keystroke Dynamic Authentication, Automatic Identification Advanced Technologies, 2005. Fourth IEEE Workshop on 17-18 Oct. 2005 Page(s):224 - 229
. D. A. Reynolds, W. Campbell, T. Gleason, C. Quillen, D. Sturim, P. Torres-Carrasquillo, and Adami, The 2004 MIT Lincoln laboratory speaker recognition system, in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing, Philadelphia, PA, Mar. 2005
. Video of the Mythbusters episode on how to hack fingerprint scanners [5]
. BBC News: Malaysia car thieves steal finger [6] Some other reports, giving more credence to the story: [7][8]
. N. K. Ratha, J. H. Connell, and R. M. Bolle,"Enhancing security and privacy
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.