Significant Applications of Biometrics

Authors

  • Ramya k Asst. Professor and Head, Department of Science and Humanities, Kingston Engineering College Katpadi, Vellore, Tamil Nadu
  • Suganya K Assoc. Professor, Department of Software Engineering & IT, A.V.C College of Engineering, Mannampandal, Mayiladuthurai, Tamil Nadu
  • Rethinavelsubramanan A Asst.Prof and Head, Department of Mechanical Engineering, K.S.K.College of Engineering and Technology, Kumbakonam, Tamil Nadu

Keywords:

FMR, ROC, DET, FTC, PIN

Abstract

Biometric Technology and its applications have existed longer than people believe. Currently the number of applications instituted around the world is increasing. In 1996 approximately 10,000 biometric devices were in use worldwide. Some estimate the number will grow to 50,000 by year 2000. Bimetric vendors feel that time and attendance is the biggest growth area for biometrics in the near future. The applications in the biometric technology are limitless. Four to five years ago biometric technology will still considered too „fictional‟ for many.

References

. http://www.cilab.upf.edu/biosecure1/public_docs_Deli/BioSecure_Deliverable_D10-2-3_b3.pdf

. Jain, A. K. (28-30 April 2004), " Biometric recognition: how do I know who you are?", Signal Processing and Communications Applications Conference, 2004. Proceedings of the IEEE 12th:3 - 5

. Jain, A. K.; Ross, A. & Pankanti, S. (June 2006), "Biometrics: A Tool for Informat ion Security", IEEE Transactions On Information Forensics And Security 1st (2)

. P. J. Philips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone, Face Recognition Vendor Test 2002: Overview and Summary (Online) [1]

. C. Wilson, A. R. Hicklin, H. Korves, B. Ulery, M.Zoepfl, M. Bone, P. Grother, R. J. Micheals, S. Otto, and C. Watson, Fingerprint vendor

technology evaluation 2003: summary of results and analysis report, NIST Internal Rep. 7123, Jun. 2004 [Online] [2]

. R. Cappelli, D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, Performance evaluation of fingerprint verification systems, IEEE Trans.

Pattern Anal. Mach. Intell., vol. 28, no. 1, pp. 3–18, Jan. 2006

. E. Kukula, S. Elliott, Implementation of Hand Geometry at Purdue University's Recreational Center: An Analysis of User Perspectives and System Performance, IEEE 2005

. International Biometric Group, Independent Testing of Iris Recognition Technology, May 2005 (Online) [3]

. NIST Iris Challenge Evaluation, (Online) [4]

. S. Hocquet, J. Ramel, H. Cardot, Fusion of Methods for Keystroke Dynamic Authentication, Automatic Identification Advanced Technologies, 2005. Fourth IEEE Workshop on 17-18 Oct. 2005 Page(s):224 - 229

. D. A. Reynolds, W. Campbell, T. Gleason, C. Quillen, D. Sturim, P. Torres-Carrasquillo, and Adami, The 2004 MIT Lincoln laboratory speaker recognition system, in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing, Philadelphia, PA, Mar. 2005

. Video of the Mythbusters episode on how to hack fingerprint scanners [5]

. BBC News: Malaysia car thieves steal finger [6] Some other reports, giving more credence to the story: [7][8]

. N. K. Ratha, J. H. Connell, and R. M. Bolle,"Enhancing security and privacy

Downloads

Published

2024-02-26

How to Cite

Ramya, K., Suganya, K., & Rethinavelsubramanan, A. (2024). Significant Applications of Biometrics. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(02), 566–571. Retrieved from https://ijact.in/index.php/j/article/view/102

Issue

Section

Review Article