Get 20M+ Full-Text Papers For Less Than $1.50/day. Subscribe now for You or Your Team.

Learn More →

Biometric security system: a rigorous review of unimodal and multimodal biometrics techniques

Biometric security system: a rigorous review of unimodal and multimodal biometrics techniques Biometric-based system is used for authentication of an individual and to counter the possible threats used for security purpose. A wide variety of systems require reliable personal authentication schemes to either confirm or determine the identity of individuals requesting their services. Typical scenarios are access control and authentication transaction. Examples of such systems are automatic teller machines (ATMs), criminal verification, national unique identifications, border crossing, airports, cellular phones, etc. In the absence of robust authentication schemes, these systems are vulnerable to the wiles of an impostor. The purpose of such schemes is to ensure that the rendered services are accessed by the legitimate user, and not anyone else. Many researchers developed biometric-based system despite that each system has its own limitations. The main aim of this paper is to give a qualitative and computational analysis of existing biometric-based system and describes various unimodal and multimodal systems. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Biometrics Inderscience Publishers

Biometric security system: a rigorous review of unimodal and multimodal biometrics techniques

Loading next page...
 
/lp/inderscience-publishers/biometric-security-system-a-rigorous-review-of-unimodal-and-multimodal-Sj3mXEA0hv

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd
ISSN
1755-8301
eISSN
1755-831X
DOI
10.1504/IJBM.2018.091629
Publisher site
See Article on Publisher Site

Abstract

Biometric-based system is used for authentication of an individual and to counter the possible threats used for security purpose. A wide variety of systems require reliable personal authentication schemes to either confirm or determine the identity of individuals requesting their services. Typical scenarios are access control and authentication transaction. Examples of such systems are automatic teller machines (ATMs), criminal verification, national unique identifications, border crossing, airports, cellular phones, etc. In the absence of robust authentication schemes, these systems are vulnerable to the wiles of an impostor. The purpose of such schemes is to ensure that the rendered services are accessed by the legitimate user, and not anyone else. Many researchers developed biometric-based system despite that each system has its own limitations. The main aim of this paper is to give a qualitative and computational analysis of existing biometric-based system and describes various unimodal and multimodal systems.

Journal

International Journal of BiometricsInderscience Publishers

Published: Jan 1, 2018

There are no references for this article.