CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Article:A Survey of Emerging Biometric Technologies

by Olufemi Sunday Adeoye
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 10
Year of Publication: 2010
Authors: Olufemi Sunday Adeoye
10.5120/1424-1659

Olufemi Sunday Adeoye . Article:A Survey of Emerging Biometric Technologies. International Journal of Computer Applications. 9, 10 ( November 2010), 1-5. DOI=10.5120/1424-1659

@article{ 10.5120/1424-1659,
author = { Olufemi Sunday Adeoye },
title = { Article:A Survey of Emerging Biometric Technologies },
journal = { International Journal of Computer Applications },
issue_date = { November 2010 },
volume = { 9 },
number = { 10 },
month = { November },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume9/number10/1424-1659/ },
doi = { 10.5120/1424-1659 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:58:12.125713+05:30
%A Olufemi Sunday Adeoye
%T Article:A Survey of Emerging Biometric Technologies
%J International Journal of Computer Applications
%@ 0975-8887
%V 9
%N 10
%P 1-5
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Computer Security System / technology have passed through several changes. The trends have been from what you know (e.g. password, PIN, etc) to what you have (ATM card, Driving License, etc) and presently to who you are (Biometry) or combinations of two or more of the trios. This technology (biometry) has come to solve the problems identified with knowledge-based and token-based authentication systems. It is possible to forget your password and what you have can as well be stolen. The security of determining who you are is referred to as BIOMETRIC. Biometric, in a nutshell, is the use of your body as password. This paper explores the various methods of biometric identification that have evolved over the years and the features used for each modality.

References
  1. Army Biometric Applications. www.biteproject.org/documents/rand-report-biometric.pdf.
  2. Biometric Consortium Web Site: http://www. Biometric.org
  3. Carreira-Perpinan (1995), Ear Biometrics, citeseerx.ist.psu.edu/viewdoc/download?doi = 10.1.1.96.6204&rep…
  4. Cavoukian Ann: Privacy and Biometrics, https://www.pcpd.org.hk/english/infocentre/files/cakoukian-paper.doc
  5. Cavoukian, Ann: Biometric and Policing (1999), Comments from a Privacy Perspective.
  6. Daugman J., How Iris Recognition Works, IEEE Trans. On Circuits nd Systems for Video Technology, Vol. 14, No 1, pp 21-30, January, 2004.
  7. Gerrit Bleumer, Biometric Authentication and Multilateral Security; In Gunther Muller, Kai Rannenberg (eds.): Multilateral Security in Communications, Addison Wesley, Munchen 1999, 157– 172 (ISBN 3827313600).
  8. http://www.cam.ac.UK.
  9. http://www.eschoolnews,com/showstory.cfm?ArticleID=2146.eSchoolNewsonline.April26,2001.
  10. Marc Gaudreau (1999), “On the distinction between Biometrics, and Digital Signatures” CIC Enterprise Solutions http://www.cic./enterprise/whitepapers.asp.
  11. Mark S. Nixon and John N. Carter (2005), On gait as a Biometric: Progress and Prospects.
  12. Murray M. P. et al (1964), Walking Patterns of Normal Men, Journal of Bone and Joint Surgery, 46-A(2), pp 335 – 360.
  13. National science and Technology Council (NSTC ) subcommittee on Biometrics “Dynamic Signature” 7 February 2006.
  14. Nixon M. S., et al (1999), Automatic Gait Recognition In: A. K. Jain, et al Eds. Biometric Personal Identification in Networked Society, pp 231-250, Kluwer.
  15. NSTC subcommittee on Biometrics “Biometrics overview” 7 February 2006
  16. NSTC subcommittee on Biometrics “Speaker Recognition” 7 February 2006.
  17. Podio F. L. et al (2000), Common Biometric Exchange File Format(CBEFF), NISTIR 6529.
  18. Santos M. , Queiloscopy – A supplementary Stomatological Means of Identification. International Microform J. Legal Medicine. 1967; 2.
  19. Uma Maheswari T. N., Lip Prints. A dissertation submitted to The Tamil Nadu Dr. M. G. R. Medical University, Chennai. Degree of Master of Dental Surgery, February, 2005. University of Cambridge, http://www.cam.ac.uk
  20. Winter D., The Biomechanics and Motor Control of Human Gait, 2nd Ed., Waterloo, 1991.
  21. Zdenek Riha and Vaclav Matyas (2000), Biometric Authentication Systems, FIMU Report Series.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics minutiae verification distinctiveness measurable features