Open Access Open Access  Restricted Access Subscription Access

Assessment of various Biometric Techniques

Rahul Kaushal

Abstract


In this day and age, information security is a noteworthy issue; there are various strategies to anchor information or forestall unapproved get to biometrics is a quickly developing innovation that is as a rule generally utilized in forensics, security; avoid unapproved access in bank or ATMs. There are various types of biometrics currently being incorporated with innovation stages. As biometric innovation develops there will be an expanding cooperation among the market, innovation, and the applications. This cooperation will be impacted by the additional estimation of the innovation, client acknowledgment, and the validity of the specialist organization. In this paper, we present a short presentation of biometric system applications, and we have contemplated and analyzed five biometric strategies along seven elements.

Cite this Article

Rahul Kaushal. Assessment of Various Biometric Techniques. Journal of Communication Engineering & Systems. 2018; 8(3): 18–23p.


Keywords


Biometric techniques, recognition, verification, identification

Full Text:

PDF

References


Kekre HB, Bharadi VA. Fingerprint orientation field estimation algorithm based on optimized neighborhood averaging. IEEE International Conference ICETE. 2009. India, Dec. 2009, pp. 543–546.

Boles W, Boashash B. A Human identification technique using images of the iris and wavelet transform. IEEE Transaction on Signal Processing. 1998; 46 (4): 1185–1188p.

Bharadi VA, Kekre HB. Off-Line signature recognition systems. International Journal of Computer Applications. Feb 2010; 1 (27): 48–58p.

Koji Kotani, Chen Qiu, Tadahiro Ohmi. Face recognition using vector quantization histogram method. IEEE Conference on Image Processing. Rochester, NY, USA, 2002, pp. II-II. doi: 10.1109/ICIP.2002.1039898.

Jiansheng Chen, Yu Deng, Gaocheng Bai, Guangda Su. Face image quality assessment based on learning to rank. IEEE Signal Processing Letters. January 2015; 22 (1).

Michael Fairhurst, Meryem Erbilek, Marjory Da Costa-Abreu. Selective review and analysis of aging effects in biometric system implementation. IEEE Transactions on Human-machine Systems. June 2015; 45 (3).

Nadia Othman, Bernadette Dorizzi. Impact of quality-based fusion techniques for video-based iris recognition at a distance. IEEE Transactions on Information Forensics and Security. DOI: 10.1109/TIFS.2015.2421314.

Burcu Erkmen, Nihan Kahraman, Revna Acar Vural, Tulay Yildirim. Conic section function neural network circuitry for offline signature recognition. IEEE Transactions on Neural Networks. April 2010; 21 (4).

Miguel A Ferrer, J Francisco Vargas, Aythami Morales, Aarón Ordóñez. Robustness of offline Signature Verification Based on Gray Level Features. IEEE Transactions on Information Forensics and Security. June 2012; 7 (3).

Impedovo D, Pirlo G. Automatic signature verification: The state of the art. IEEE Trans. Syst. Man Cybern.—Part C: Applications Rev. Sep. 2008; 38 (5): 609–635p.

Hou W, Ye X, Wang K. A survey of off-line signature verification. Proc. Int. Conf. Intelligent Mechatronics Automation. Chengdu, China, Aug. 2004, pp. 536–541.

Fierrez-Aguilar J, Alonso-Hermira N, Moreno-Marquez G, Ortega-Garcia J. An off-line signature verification system based on fusion of local and global information. Proc. Workshop Biometric Authentication, Springer LNCS-3087. May 2004, pp. 298–306

Turk MA, Pentland AP. Eigenfaces for recognition. J. Cognitive Neurosci. 1991; 3 (1): 71–86p.

Belhumeur PN, Hespanha JP, Kriegman D. Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 2005; 19 (7): 711–720p.

Ahonen T, Hadid A, Pietikainen M. Face description with local binary patterns: Application to face recognition. IEEE Trans. Pattern Anal. Mach. Intell. Dec. 2006; 28 (12): 2037–2041p.

Fahmy G. Super-resolution construction of iris image low resolution face video. Signal Processing and Its Applications. 2007. ISSPA 2007.

Nguyen K, Fookes C, Sridharan S, Denman S. Quality super resolution for less constr the move. Information Forensics and Security, IEEE Transaction. Dec 2011; 6 (4): 1248–1258p.

Da Costa-Abreu M, Fairhurst MC. Improving forgery detection in off-line forensic signature processing. Proc. 3rd Int. Conf. Imag. Crime Detection Prevention. 2009; pp. 1–6.

Zhang JM, Fan LJ, Yong-Zhao Z, Sheng P. Reconstruction of human face for different age based on the log-gabor wavelet. Proc. Int. Symp. Inform. Sci. Eng. 2008; 2: 354–357p.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Journal of Communication Engineering & Systems