Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems
IEEE Security and Privacy
Multimodal biometrics using geometry preserving projections
Pattern Recognition
Unobtrusive multimodal biometric authentication: the HUMABIO project concept
EURASIP Journal on Advances in Signal Processing
EURASIP Journal on Advances in Signal Processing
Privacy-preserving multimodal person and object identification
Proceedings of the 10th ACM workshop on Multimedia and security
Multimodal authentication based on random projections and source coding
Proceedings of the 10th ACM workshop on Multimedia and security
Artificial Neural Network Based Automatic Face Model Generation System from Only One Fingerprint
ANNPR '08 Proceedings of the 3rd IAPR workshop on Artificial Neural Networks in Pattern Recognition
Biometric user verification using haptics and fuzzy logic
MM '08 Proceedings of the 16th ACM international conference on Multimedia
Image and Vision Computing
Direct Attacks Using Fake Images in Iris Verification
Biometrics and Identity Management
Novel Approaches for Exclusive and Continuous Fingerprint Classification
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
A Dental Radiograph Recognition System Using Phase-Only Correlation for Human Identification
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Bimodal personal recognition using hand images
Proceedings of the International Conference on Advances in Computing, Communication and Control
On estimating performance indices for biometric identification
Pattern Recognition
Combining different biometric traits with one-class classification
Signal Processing
Use of random time-intervals (RTIs) generation for biometric verification
Pattern Recognition
ICIAR '09 Proceedings of the 6th International Conference on Image Analysis and Recognition
User identification by means of sketched stroke features
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 3
Approach to designing bribery-free and coercion-free electronic voting scheme
Journal of Systems and Software
Low-complexity iris coding and recognition based on directionlets
IEEE Transactions on Information Forensics and Security
Multimodal biometric system using rank-level fusion approach
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on cybernetics and cognitive informatics
On the vulnerability of face verification systems to hill-climbing attacks
Pattern Recognition
Real time security management using RFID, biometric and smart messages
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Multibiometric cryptosystem: model structure and performance analysis
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
An evaluation of direct attacks using fake fingers generated from ISO templates
Pattern Recognition Letters
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Biometric recognition: overview and recent advances
CIARP'07 Proceedings of the Congress on pattern recognition 12th Iberoamerican conference on Progress in pattern recognition, image analysis and applications
An intelligent automatic face contour prediction system
Canadian AI'08 Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence
Improving e-banking security with biometrics: modelling user attitudes and acceptance
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
One-time key based phase scrambling for phase-only correlation between visually protected images
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
Identification of JPEG 2000 images in encrypted domain for digital cinema
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Fusion of static image and dynamic information for signature verification
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Assessing the uniqueness and permanence of facial actions for use in biometric applications
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Phase-only correlation based matching in scrambled domain for preventing illegal matching
Transactions on data hiding and multimedia security V
Improving individual identification in security check with an EEG based biometric solution
BI'10 Proceedings of the 2010 international conference on Brain informatics
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
Interacting with Computers
Data acquisition and processing of 3-D fingerprints
IEEE Transactions on Information Forensics and Security
Soft biometric traits for continuous user authentication
IEEE Transactions on Information Forensics and Security
Quality-based conditional processing in multi-biometrics: application to sensor interoperability
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Scale invariant gabor descriptor-based noncooperative iris recognition
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Fighting coercion attacks in key generation using skin conductance
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
A key binding system based on n-nearest minutiae structure of fingerprint
Pattern Recognition Letters
Biometrics for non-repudiation: security and legal aspect
International Journal of Biometrics
Increasing error tolerance in biometric systems
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
A case study on discrimination of identical twins in India
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
Efficient Detection and Recognition of 3D Ears
International Journal of Computer Vision
Energy Efficient Distributed Face Recognition in Wireless Sensor Network
Wireless Personal Communications: An International Journal
Some issues of biometrics: technology intelligence, progress and challenges
International Journal of Information Technology and Management
Synthetic on-line signature generation. Part I: Methodology and algorithms
Pattern Recognition
An adaptive classification system for video-based face recognition
Information Sciences: an International Journal
The west pomeranian university of technology ear database – a tool for testing biometric algorithms
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
Application of wave atoms decomposition and extreme learning machine for fingerprint classification
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
A review of recent advances in 3D ear- and expression-invariant face biometrics
ACM Computing Surveys (CSUR)
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A high performance fingerprint liveness detection method based on quality related features
Future Generation Computer Systems
A Filter Bank Based Approach for Rotation Invariant Fingerprint Recognition
Journal of Signal Processing Systems
Fusion of biometric systems using Boolean combination: an application to iris-based authentication
International Journal of Biometrics
Proceedings of the CUBE International Information Technology Conference
Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform
Future Generation Computer Systems
SIRIS: secure IRIS authentication system
Proceedings of the Fifth International Conference on Security of Information and Networks
Bayesian hill-climbing attack and its application to signature verification
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
On some performance indices for biometric identification system
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric hashing based on genetic selection and its application to on-line signatures
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Implementation of biometrics based security system with integrated techniques
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
On Biometrics and Profiling: A Challenge for Privacy and Democracy?
International Journal of Technoethics
MRI-based knee image for personal identification
International Journal of Biometrics
Dynamic multi-objective evolution of classifier ensembles for video face recognition
Applied Soft Computing
Biometric encryption using enhanced finger print image and elliptic curve
International Journal of Electronic Security and Digital Forensics
Computer Vision and Image Understanding
Proceedings of the 2013 workshop on New security paradigms workshop
Pattern Recognition Letters
A bio-cryptographic system based on offline signature images
Information Sciences: an International Journal
A novel hand reconstruction approach and its application to vulnerability assessment
Information Sciences: an International Journal
Hi-index | 0.00 |
Establishing identity is becoming critical in our vastly interconnected society. Questions such as "Is she really who she claims to be?," "Is this person authorized to use this facility?," or "Is he in the watchlist posted by the government?" are routinely being posed in a variety of scenarios ranging from issuing a driver's license to gaining entry into a country. The need for reliable user authentication techniques has increased in the wake of heightened concerns about security and rapid advancements in networking, communication, and mobility. Biometrics, described as the science of recognizing an individual based on his or her physical or behavioral traits, is beginning to gain acceptance as a legitimate method for determining an individual's identity. Biometric systems have now been deployed in various commercial, civilian, and forensic applications as a means of establishing identity. In this paper, we provide an overview of biometrics and discuss some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security. The primary contribution of this overview includes: 1) examining applications where biometric scan solve issues pertaining to information security; 2) enumerating the fundamental challenges encountered by biometric systems in real-world applications; and 3) discussing solutions to address the problems of scalability and security in large-scale authentication systems.