[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Jain, 2003 - Google Patents

Who's Who? Challenges in Biometric Authentication

Jain, 2003

Document ID
4181795701342491575
Author
Jain A
Publication year
Publication venue
Joint Pattern Recognition Symposium

External Links

Snippet

A wide variety of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that only a legitimate user, and not anyone else, accesses the …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically

Similar Documents

Publication Publication Date Title
Dharavath et al. Study on biometric authentication systems, challenges and future trends: A review
Jain et al. Multibiometric systems
Pankanti et al. Biometrics: The future of identification [guest eeditors' introduction]
Jain et al. A multimodal biometric system using fingerprint, face and speech
JP3356144B2 (en) User authentication device using biometrics and user authentication method used therefor
Tripathi A comparative study of biometric technologies with reference to human interface
JP4546168B2 (en) Biometric authentication system registration method, biometric authentication system and program thereof
Yanikoglu et al. Combining multiple biometrics to protect privacy
KR20090011127U (en) Multimodel biometric identification device
Kaur A study of biometric identification and verification system
Matyáš et al. Biometric authentication systems
Jani et al. A proposed framework for enhancing security in fingerprint and finger-vein multimodal biometric recognition
Stephen et al. Implementation of easy fingerprint image authentication with traditional euclidean and singular value decomposition algorithms
Sharma et al. Human recognition methods based on biometric technologies
Ross et al. Multimodal human recognition systems
Arora et al. Multimodal biometrics for improvised security
Sanches et al. A single sensor hand biometric multimodal system
KR20090113141A (en) Multimodel biometric identification system and Method thereof
Shankar et al. Biometric verification, security concerns and related issues-a comprehensive study
Jain Who’s Who? Challenges in Biometric Authentication
Sivakumar Biometric authentication techniques and its future
Boonkrong et al. Biometric Authentication
Ilugbusi et al. Development of a multi-intance fingerprint based authentication system
Jain Biometric Authentication: How Do I Know Who You Are
Bistarelli et al. Computer algebra for fingerprint matching