Abstract
Over the past few decades due to the advancement of technology, biometrics has evolved into a key factor of security for societal needs. Biometrics started as a basic ID verification system and has evolved into a major factor of authentication by taking several biological parameters as references. There are certain issues that researchers have yet been facing against hack or overriding. This chapter covers a comparative study of different biometrics and its methods used for safe authentication that improves security management for complicated scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yeung B. A San Francisco Bay area solution provider for IT knowledge management: webcache.googleusercontent.com/search?q=cache:http://www.tns.com/biometrics.asp&gws_rd=cr&ei=btGNWNyCF4rxvgSXmonYCw
Brunelli R, Poggio R (1993) Face recognition: templates versus features. IEEE Trans Pattern Anal Mach Intell 15(10)
Jain AK, Prabhakar S, Chen S (1999) Combining multiple matchers for a high-security fingerprint verification system. Pattern Recogn Lett 20(11–13)
Ma L, Tan T, Wang Y (2002) Iris recognition using circular symmetric filters. In: Proceedings of the16th international conference on pattern recognition, vol 2, pp 414–417
Cofta P, Furnell S (2008) Use of biometric data. In: Understanding public perceptions: trust and engagement in ICT-mediated services. International Engineering Consortium, p 153
Nixon M (2010) A novel ray analogy for enrolment of ear biometrics, IEEE
Iannarelli A (1989) Ear identification. Paramount Publishing Company, Freemont, California
Mallat SG (1991) Zero-crossing of a wavelet transform. IEEE Trans Inf Theory 37(14):1019–1033
Meraayan A (2003) Proximity authentication. Sans Institute
Rutty GN, Abbas A, Crossing D (2005) Could earprint identification be computerised? an illustrated proof of concept paper. Int J Legal Med 6:335–343
Bhatia R (2013) Biometrics and face recognition techniques. Int J Adv Res Comput Sci Softw Eng 3(5)
Hiremath PS, Ajit D, Prabhakar CJ (2007) Modelling of uncertainty in representation of facial features for face recognition and detection. Gulbarga University, Gulbarga, JNN College of Engineering, Shimoga & Kuvempu University, Shimoga, India June 2007, pp 189–194
Nanvati S (2002) Biometrics: identity verification in a networked world. Wiley, New York
Ashbaugh, DR (1999) Quantitative-qualitative friction ridge analysis: introduction to basic and advanced ridgeology 27 Oct 1999
Gold S, Rangarajan A (1996) A graduated assessment on algorithm for graph matching. IEEE Trans Pattern Anal Mach Intell 18(4):377–388
Beavan C (2001) Fingerprints: the origins of crime detection and the murder case that launched forensic science. Hyperion, New York
Cowger JC (1992) Friction ridge skin: comparison and identification of fingerprints. CRC Press, Boca Raton, Florida
Scheibert J, Leurent S, Provost A, Debregeas G (2009) The role of fingerprints in the coding of tactile information probed with a biomimetic sensor. Science 323:1503–1506
Marchant Z (2003) Biometrics: fingerprint authentication. Sans Institute
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1)
Quinche N, Margot P (2010) Coulier, Paul-Jean (1824–1890): a precursor in the history of fingerprint detection and their potential use for identifying their source (1863). J Forensic Ident (California) 60 (2):129–134
Tisse C-L, Torres L, Robert M (2002) Person identification technique using human iris recognition. In: Proceedings of the 15th international conference on vision interface
Daugman JG (2001) Statistical richness of visual phase information: update on recognising persons by Iris Patterns. Int J Comput Vis 45(1)
Ashbourn J (2002) Biometrics: advanced identity verification. Springer, London
Leonidou M (2002) Iris recognition: closer than we think? Sans Institute
Jain A et al (2004) Handbook of biometrics. In: Man convicted of murder by ear print is freed. www.timesonline.co.uk/article/0,1-973291,00.html, 22 Jan 2004
Zimmer A, Ling LL (2003) A hybrid on/off-line handwritten signature verification system. In: Seventh international conference on document analysis and recognition, vol 1, Aug 2003, pp 424–428
Hurley DJ, Arbab-Zavar B, Nixon MS (2008) The ear as a biometric: handbook of biometrics. Springer US, pp 131–150. doi:10.1007/978-0-387-71041-9_7
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Martin Sagayam, K., Felix Jacob Edwin, J., Sujith Christopher, J., Reddy, G.V., Bestak, R., Hun, L.C. (2018). Survey on the Classification of Intelligence-Based Biometric Techniques. In: Hemanth, J., Balas , V. (eds) Biologically Rationalized Computing Techniques For Image Processing Applications. Lecture Notes in Computational Vision and Biomechanics, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-319-61316-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-61316-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61315-4
Online ISBN: 978-3-319-61316-1
eBook Packages: EngineeringEngineering (R0)