Skip to main content

Survey on the Classification of Intelligence-Based Biometric Techniques

  • Chapter
  • First Online:
Biologically Rationalized Computing Techniques For Image Processing Applications

Abstract

Over the past few decades due to the advancement of technology, biometrics has evolved into a key factor of security for societal needs. Biometrics started as a basic ID verification system and has evolved into a major factor of authentication by taking several biological parameters as references. There are certain issues that researchers have yet been facing against hack or overriding. This chapter covers a comparative study of different biometrics and its methods used for safe authentication that improves security management for complicated scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yeung B. A San Francisco Bay area solution provider for IT knowledge management: webcache.googleusercontent.com/search?q=cache:http://www.tns.com/biometrics.asp&gws_rd=cr&ei=btGNWNyCF4rxvgSXmonYCw

  2. Brunelli R, Poggio R (1993) Face recognition: templates versus features. IEEE Trans Pattern Anal Mach Intell 15(10)

    Google Scholar 

  3. Jain AK, Prabhakar S, Chen S (1999) Combining multiple matchers for a high-security fingerprint verification system. Pattern Recogn Lett 20(11–13)

    Google Scholar 

  4. Ma L, Tan T, Wang Y (2002) Iris recognition using circular symmetric filters. In: Proceedings of the16th international conference on pattern recognition, vol 2, pp 414–417

    Google Scholar 

  5. Cofta P, Furnell S (2008) Use of biometric data. In: Understanding public perceptions: trust and engagement in ICT-mediated services. International Engineering Consortium, p 153

    Google Scholar 

  6. Nixon M (2010) A novel ray analogy for enrolment of ear biometrics, IEEE

    Google Scholar 

  7. Iannarelli A (1989) Ear identification. Paramount Publishing Company, Freemont, California

    Google Scholar 

  8. Mallat SG (1991) Zero-crossing of a wavelet transform. IEEE Trans Inf Theory 37(14):1019–1033

    Article  MathSciNet  Google Scholar 

  9. Meraayan A (2003) Proximity authentication. Sans Institute

    Google Scholar 

  10. Rutty GN, Abbas A, Crossing D (2005) Could earprint identification be computerised? an illustrated proof of concept paper. Int J Legal Med 6:335–343

    Google Scholar 

  11. http://biometrics.sabanciuniv.edu/susig.html

  12. Bhatia R (2013) Biometrics and face recognition techniques. Int J Adv Res Comput Sci Softw Eng 3(5)

    Google Scholar 

  13. Hiremath PS, Ajit D, Prabhakar CJ (2007) Modelling of uncertainty in representation of facial features for face recognition and detection. Gulbarga University, Gulbarga, JNN College of Engineering, Shimoga & Kuvempu University, Shimoga, India June 2007, pp 189–194

    Google Scholar 

  14. Nanvati S (2002) Biometrics: identity verification in a networked world. Wiley, New York

    Google Scholar 

  15. Ashbaugh, DR (1999) Quantitative-qualitative friction ridge analysis: introduction to basic and advanced ridgeology 27 Oct 1999

    Google Scholar 

  16. Gold S, Rangarajan A (1996) A graduated assessment on algorithm for graph matching. IEEE Trans Pattern Anal Mach Intell 18(4):377–388

    Article  Google Scholar 

  17. Beavan C (2001) Fingerprints: the origins of crime detection and the murder case that launched forensic science. Hyperion, New York

    Google Scholar 

  18. Cowger JC (1992) Friction ridge skin: comparison and identification of fingerprints. CRC Press, Boca Raton, Florida

    Google Scholar 

  19. Scheibert J, Leurent S, Provost A, Debregeas G (2009) The role of fingerprints in the coding of tactile information probed with a biomimetic sensor. Science 323:1503–1506

    Google Scholar 

  20. Marchant Z (2003) Biometrics: fingerprint authentication. Sans Institute

    Google Scholar 

  21. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1)

    Google Scholar 

  22. Quinche N, Margot P (2010) Coulier, Paul-Jean (1824–1890): a precursor in the history of fingerprint detection and their potential use for identifying their source (1863). J Forensic Ident (California) 60 (2):129–134

    Google Scholar 

  23. Tisse C-L, Torres L, Robert M (2002) Person identification technique using human iris recognition. In: Proceedings of the 15th international conference on vision interface

    Google Scholar 

  24. Daugman JG (2001) Statistical richness of visual phase information: update on recognising persons by Iris Patterns. Int J Comput Vis 45(1)

    Google Scholar 

  25. Ashbourn J (2002) Biometrics: advanced identity verification. Springer, London

    Google Scholar 

  26. Leonidou M (2002) Iris recognition: closer than we think? Sans Institute

    Google Scholar 

  27. Jain A et al (2004) Handbook of biometrics. In: Man convicted of murder by ear print is freed. www.timesonline.co.uk/article/0,1-973291,00.html, 22 Jan 2004

  28. Zimmer A, Ling LL (2003) A hybrid on/off-line handwritten signature verification system. In: Seventh international conference on document analysis and recognition, vol 1, Aug 2003, pp 424–428

    Google Scholar 

  29. Hurley DJ, Arbab-Zavar B, Nixon MS (2008) The ear as a biometric: handbook of biometrics. Springer US, pp 131–150. doi:10.1007/978-0-387-71041-9_7

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to K. Martin Sagayam or Robert Bestak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Martin Sagayam, K., Felix Jacob Edwin, J., Sujith Christopher, J., Reddy, G.V., Bestak, R., Hun, L.C. (2018). Survey on the Classification of Intelligence-Based Biometric Techniques. In: Hemanth, J., Balas , V. (eds) Biologically Rationalized Computing Techniques For Image Processing Applications. Lecture Notes in Computational Vision and Biomechanics, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-319-61316-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61316-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61315-4

  • Online ISBN: 978-3-319-61316-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics