Open Access   Article Go Back

Survey on Recent Trends in Bio Metrics as Authentication

D. Vinitha1 , P.V Ramesh2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 150-153, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.150153

Online published on Mar 20, 2019

Copyright © D. Vinitha, P.V Ramesh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Vinitha, P.V Ramesh, “Survey on Recent Trends in Bio Metrics as Authentication,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.150-153, 2019.

MLA Style Citation: D. Vinitha, P.V Ramesh "Survey on Recent Trends in Bio Metrics as Authentication." International Journal of Computer Sciences and Engineering 07.06 (2019): 150-153.

APA Style Citation: D. Vinitha, P.V Ramesh, (2019). Survey on Recent Trends in Bio Metrics as Authentication. International Journal of Computer Sciences and Engineering, 07(06), 150-153.

BibTex Style Citation:
@article{Vinitha_2019,
author = {D. Vinitha, P.V Ramesh},
title = {Survey on Recent Trends in Bio Metrics as Authentication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {150-153},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=888},
doi = {https://doi.org/10.26438/ijcse/v7i6.150153}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.150153}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=888
TI - Survey on Recent Trends in Bio Metrics as Authentication
T2 - International Journal of Computer Sciences and Engineering
AU - D. Vinitha, P.V Ramesh
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 150-153
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

In this paper, With the raise of rapid innovation in current biometric technology field, new uses are appearing to make the process of authentication more convenient and secure. These innovative and useful processes of human identification are increasing in frequency with every year. As these users are increasing enormously, they are also creating some trends or ways and restructuring the way we identify humans. Passwords can’t be used that much extensively as they are easily guessed and prone to guess attacks or brute force attacks. Of all the trends we see in the field of biometric technology, most are focused on finding a better and more efficient way of authenticating a person based on “Who they are.” Of course, there are still the traditional ways of identifying a person including personal identification numbers (PINs), ID cards, and passwords but these methods identify a person based on “what they have” or “what they know.” Two Factor Security or Multi factor security measures are quite applicable to some of the domains / ideas. None of them identifies a person with the most important factor, which is “Who they are.” As biometric traits are personal and unique, this is perhaps the most accurate way of identifying a person.

Key-Words / Index Term

Biometrics, Two Factor Security, Authentication, Iris Scan, Palm Vein Technologies

References

[1] R. Clarke “Human identification in information systems: management challenges and public information issues”. December 1994. Available in http://www.anu.edu.au/people/Roger.Clarke/DV/HumanID.html
[2] S. Furui Digital Speech Processing, synthesis, and recognition., Marcel Dekker, 1989.
[3] A. Martin, G. Doddington, T. Kamm, M. Ordowski, and M. Przybocki, “The DET curve in assessment of detection performance”, V. 4, pp.1895-1898, European speech Processing Conference Eurospeech 1997
[4] A. J. Mansfield, J. L. Wayman, “Best Practices in Testing and Reporting Performance of Biometric Devices”. Version 2.01. National Physical Laboratory Report CMSC 14/02. August 2002.
[5] M. Faundez-Zanuy “Door-opening system using a low-cost fingerprint scanner and a PC”. IEEE Aerospace and Electronic Systems Magazine. Vol. 19 nº 8, pp.23-26. August 2004
[6] M. Faundez-Zanuy y Joan Fabregas “Testing report of a fingerprint-based door-opening system”. IEEE Aerospace and Electronic Systems Magazine Vol.20 nº 6, pp 18-20, ISSN: 0885-8985. June 2005..
[7] D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar “Handbook of Fingerprint Recognition” Springer professional computing. 2003
[8] M. Faundez-Zanuy “Technological evaluation of two AFIS systems” IEEE Aerospace and Electronic Systems Magazine Vol.20 nº 4, pp13-17, ISSN: 0885-8985. April 2005.
[9] M. Faundez-Zanuy “Are Inkless fingerprint sensors suitable for mobile use? IEEE Aerospace and Electronic Systems Magazine, pp.17-21, April 2004
[10] S. Prabhakar, S. Pankanti, A. K. Jain ”Biometric recognition: security and privacy concerns” IEEE Security
and Privacy, pp. 33-42, March/April 2003
[11] M. Faundez-Zanuy “On the vulnerability of biometric security systems” IEEE Aerospace and Electronic Systems Magazine Vol.19 nº 6, pp.3-8, June 2004
[12] M. Faundez-Zanuy “Data fusion in biometrics”. IEEE Aerospace and Electronic Systems Magazine. Vol. 20 nº 1, pp.34-38, January 2005
[13] http://www.faceblind.org/research
[14] http://www.rarediseases.org
[15] S.K. Zhou “Face recognition using more than one still image: what is more?. Lecture Notes In Computer Science LNCS 3338, pp.212-223, A. Z. Li et al. Ed., Sinobiometrics. Springer Verlag 2004
[16] M. Faundez-Zanuy, V. Espinosa-Duró, J. A. Ortega-Redondo “Face verification by means of a single Neural Network classifier”. Enviado a IWANN’05. Lecture Notes In Computer Science 2005
[17] M. Faundez-Zanuy, E. Monte-Moreno “State-of-the-art in speaker recognition”. IEEE Aerospace and Electronic Systems Magazine. Vol.20 nº 5, pp 7-12, ISSN: 0885-8985. May 2005
[18] Marcos Faundez-Zanuy, G. Mar Navarro-Mérida “Biometric identification by means of hand geometry and a neural net classifier” “IWANN’05 Lecture Notes In Computer Science 2005
[19] P. W. Hallian “Recognizing human eyes” Geometric methods computer vision, vol. 1570, pp. 214-216, 1991.
[20] M. Faundez-Zanuy “Signature recognition state-of-the-art”. IEEE Aerospace and Electronic Systems
Magazine. 2005. Vol.20 nº 7, pp 28-32, ISSN: 0885-8985. July 2005.
[21] P. J. Phillips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone “FRVT 2002: Evaluation report”, available online: http://www.frvt.org/DLs/FRVT_2002_Evaluation_Report.pdf, March 2003
[22] T. Mansfield, G. Kelly, D. Chandler, and J. Kane (2001, Mar.) biometric product testing final report.
[23] D. Maio, D. Maltoni, R. Capelli, J. L. Wayman, and A. K. Jain ”FVC2000: fingerprint verification competition”. IEEE Trans. Pattern analysis Machine Intelligence, Vol. 24, pp. 402-412, march 2002
[24] A. Martin and M. Przybocki, “The NIST 1999 speaker recognition evaluation: An overview”. Digital signal processing Vol. 10, no.1-3, pp.1-18, 2000.
[25] D. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto and G. Rigoll “SVC2004: First international signature verification competition”. Lecture Notes on Computer Science LNCS-3072, Springer Verlag pp.16-22, 2004.
[26] L. O’Gorman “Comparing passwords, tokens and biometrics for user authentication”. Proceedings of the IEEE, Vol. 91, No. 12, pp.2021-2040, December 2003.
[27] M. Faundez-Zanuy “Biometric recognition: why not massively adopted yet?”. IEEE Aerospace and Electronic Systems Magazine. Vol.20 nº 8, pp.25-28, ISSN: 0885-8985. August 2005.
[28] M. Faundez-Zanuy “Privacy issues on biometric systems”. IEEE Aerospace and Electronic Systems Magazine. Vol. 20 nº 2, pp13-15, February 2005.