CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Comparative Study of Biometric Technologies with Reference to Human Interface

by K P Tripathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 14 - Number 5
Year of Publication: 2011
Authors: K P Tripathi
10.5120/1842-2493

K P Tripathi . A Comparative Study of Biometric Technologies with Reference to Human Interface. International Journal of Computer Applications. 14, 5 ( January 2011), 10-15. DOI=10.5120/1842-2493

@article{ 10.5120/1842-2493,
author = { K P Tripathi },
title = { A Comparative Study of Biometric Technologies with Reference to Human Interface },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 14 },
number = { 5 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume14/number5/1842-2493/ },
doi = { 10.5120/1842-2493 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:02:36.470800+05:30
%A K P Tripathi
%T A Comparative Study of Biometric Technologies with Reference to Human Interface
%J International Journal of Computer Applications
%@ 0975-8887
%V 14
%N 5
%P 10-15
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Traditionally the use of biometric devices has improved our ability to provide authenticated access to physical installations. Biometrics is the use of a person’s unique physiological, behavioral, and morphological characteristic to provide positive personal identification. Biometric systems that are currently available today examine fingerprints, handprints, iris and retina patterns, and face. Systems that are close to biometrics but are not classified as such are behavioral systems such as voice, signature and keystroke systems. They test patterns of behavior not parts of the body. Over the next few years, the use of biometrics will continue to grow and become much more commonplace.

References
  1. Arpita Gopal, Chandrani Singh, e-World : Emerging Trends in Information Technology, Excel Publication, New Delhi (2009).
  2. James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio, Biometric Systems: Technology, Design and Performance Evaluation, Springer
  3. Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar, Handbook of Fingerprint Recognition, Springer
  4. John Chirillo, Scott Blaul, Implementing Biometric Security, Wiley Red Books
  5. John Woodward, Nicholas M. Orlans, Peter T. Higgins, Biometrics, Tata McGraw Hill
  6. Lakhmi C. Jain, Intelligent Biometric Techniques in Fingerprint and Face recognition
  7. Nalini K. Ratha, Andrew Senior and Ruud M. Bolle,”Automated Biometrics”. IBM Thomas J. Watson Research Center, PP 1-10
  8. Paul Reid, Biometrics for Network Security, Prentice Hall of India.
  9. Roger Clarke, “Biometrics And Privacy”
  10. Rula Abu Samaa’n,”Biometrics Authentication Systems”, April 2003, PP 1-2.
  11. Vicki Koerper, “Biometrics: A Brief Introduction”, March 10,1998
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Biometric Identification Biometric Testing Biometric Applications