CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

Human Recognition Methods based on Biometric Technologies

by Annu Sharma, Praveena Chaturvedi, Shwetank Arya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 17
Year of Publication: 2015
Authors: Annu Sharma, Praveena Chaturvedi, Shwetank Arya

Annu Sharma, Praveena Chaturvedi, Shwetank Arya . Human Recognition Methods based on Biometric Technologies. International Journal of Computer Applications. 120, 17 ( June 2015), 1-7. DOI=10.5120/21316-4312

@article{ 10.5120/21316-4312,
author = { Annu Sharma, Praveena Chaturvedi, Shwetank Arya },
title = { Human Recognition Methods based on Biometric Technologies },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 17 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { },
doi = { 10.5120/21316-4312 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:06:26.336943+05:30
%A Annu Sharma
%A Praveena Chaturvedi
%A Shwetank Arya
%T Human Recognition Methods based on Biometric Technologies
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 17
%P 1-7
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

Biometric has revolutionized the Human Recognition Technology . The base and reach of human recognition system has been expanded by the innovative uses of Biometric devices . Human recognition have becomes one of the most well-off fields in the past ten years. Biometrics is the science of establishing the identity of an individual based on physical, chemical or behavioural attributes of the person; it deals with the automated recognition of individuals based on biological and behavioural characteristics. Biometrics spread its wings in a wide range of applications and found itself as a reliable source in fields such as electronic data security, ecommerce, internet access, physical access control, PDA, Government applications such as national ID card, social security, welfare-disbursement, border control, military surveillance, etc As the application areas are emerging, the implementation of biometric systems in both commercial and government sectors is increasing and therefore leading to enormous security breaches in the installed systems. Currently, the most effective means of Human Recognition is to use biometric system. So while designing biometric system, security of the system is one of the factors which have to be considered along with the increasing performance at reasonable costs. The objective of this paper is to explore the potential of fast developing Biometric systems such as fingerprints, face recognition, iris recognition for human identification. This paper discusses the main features of the biometric system: architecture, evaluation methodology used in these system and also various issues related to security of the biometric system.

  1. R. Bolle, J. Connell, S. Pankanti, N. Ratha and A. Senior, "Guide to Biometrics", Springer, 2004
  2. J. Wayman, A. Jain, D. Maltoni, and D. Maio, Eds. "Biometric Systems Technology, Design and Performance Evaluation", Springer, 2005.
  3. National Science and Technology Council Subcommittee on Biometrics, "Biometrics Glossary", September 2006. http://www. biometrics. gov/Documents/Glossary. pdf.
  4. Anil K. Jain, Arun Ross, "Introduction to Biometrics", Springer, 2011.
  5. Bori Toth, "Face Biometric liveness Detection, Information Security Bulletin", October 2005, Volume 10.
  6. Maio, D. , Maltoni, D. , Cappelli, R. , Wayman, J. L. , Jain A. K. : FVC2002: "Second Fingerprint Verification Competition", Proc. Int. Conf. on Pattern Recognition (16th), vol. 3(2002) 811?814.
  7. Hong, L. , Wan, Y. , Jain, "A. K. : Fingerprint Image Enhancement: Algorithms and Performance Evaluation", IEEE Transactions on Pattern Analysis and Machine Intelligence,vol. 20, no. 8 (1998) 777?789.
  8. Bazen, A. M. , Gerez, S. H. "Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 7 (2002) 905?919.
  9. Maltoni, D. , Maio, D. , Jain, A. K. , Prabhakar, S. , "Handbook of Fingerprint Recognition", Springer, New York (2003).
  10. Lam, L. , Lee, S. W. , Suen, C. Y. "Thinning Methodologies: A Comprehensive Survey", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 14, no. 9 (1992) 869?885.
  11. Marios Savvides, Jingu heo and Sung Won Park, "Face Recognition", "Dept. of electrical and computer engineering Carnegie Mellon University, Pittsburgh, pennysylvania,USA.
  12. Barbara Westmorel, Michael Lemo,and Richard snell,"cinical anatomy of eye 2nd ed Oxford" ;Blackwell Science Inc. ,1998.
  13. J. Daugman. "High confidence visual recognition of persons by a test of statistical independence", IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(11):1148{1161, 1993.
  14. J. Daugman. "The Importance of Being Random: Statistical Principles of Iris Recognition", IEEE Transactions on Pattern Analysis and Machine Intelligence, 36(2):279{291, 2003.
  15. J. Daugman. "How Iris Recognition Works" IEEE Transactions on Circuits and Systems for Video Technology, 14(1):21{30, 2004.
  16. J. Daugman. "New Methods in Iris Recognition", IEEE Transactions on Systems, Man, and Cyernetics, 37(5):1167{1175, 2007.
  17. Government of India. Unique Identification Authority of India, February 2011. http://uidai. gov. in/.
  18. Ferdinando Samaria and Steve Young. "HMM-based architecture for face identification. Image and Vision Computing", 12(8):537{543, 1994.
  19. W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld. "Face recognition: A literature survey. ACM Comput. Surv", 35:399{458, December 2003.
  20. Jain, A. K. , Nandakumar, K. , and Nagar, "A. Biometric template security". EURASIP J. Adv. SignalProcess 2008 (January 2008), 113:1{113:17.
  21. B. toth, "Biometric ID card Debates, Newsletter 'Biometrie", of ISACA chapter Switzerland, Germany and Austria, June 2005
  22. Egan J. P. : Signal "Detection Theory and ROC Analysis", Academic Press (1975)
  23. Wayman J. L. : "Fundamentals of Biometric Authentication Technologies". National Biometric Test Center Collected Works 1997-2000, San Jose University Press (2000)
  24. Putte, Keuning2000: T. Putteand J. Keuning, "Biometrical fingerprint recognition: don't get your fingers burned", Proc. IFIP TC8/WG8. 8, Fourth Working Conf. Smart Card Research and Adv. App. , pp. 289-303, 2000.
  25. Matsumoto et al. 2002: T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems", Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275-289, 2002.
  26. Uludag, Jain 2004 (1): U. Uludagand A. K. Jain, "Attacks on biometric systems: a case study in fingerprints", Proc. SPIE-EI 2004, Security, Steganographyand Watermarking of Multimedia Contents VI, vol. 5306, pp. 622-633.
  27. Cholet G. : "Automatic Speaker Recognition: Technologies, Evaluations and Possible Future", Presentation during 1st BioSec and Biometric Technologies Workshop, Barcelona (2004)
  28. Ord T. , Furnell S. M. : "User authentication for keypad-based devices using keystroke analysis". Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK (2000)
  29. James S. Doyle, Jr, Patrick J. Flynn, Director, "QUALITY METRICS FOR BIOMETRICS", thesis of Graduate Program in Computer Science and Engineering Notre Dame, Indiana April 2011
Index Terms

Computer Science
Information Sciences


Biometric Face Recognition Iris Recognitions template matching