An introduction to biometric recognition

@article{Jain2004AnIT,
  title={An introduction to biometric recognition},
  author={Anil K. Jain and A. A. Ross and Salil Prabhakar},
  journal={IEEE Transactions on Circuits and Systems for Video Technology},
  year={2004},
  volume={14},
  pages={4-20}
}
A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs. In the absence of robust personal recognition schemes, these systems are vulnerable to the… 
BIOMETRICS BASED IDENTIFICATION TECHNIQUES (BIT)
TLDR
A brief overview of the field of biometrics is given and some biometric identification techniques with their strengths, limitations, and related privacy concerns and comparisons with each other are summarized.
A survey of biometric recognition methods
  • K. Delac, M. Grgic
  • Computer Science
    Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine
  • 2004
TLDR
A brief overview of biometric methods, both unimodal and multimodal, and their advantages and disadvantages, will be presented.
REVIEW OF BIOMETRIC TECHNOLOGIES USED FOR
Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. In order to deal with security,
REVIEW OF BIOMETRIC TECHNOLOGIES USED FOR ATM SECURITY
Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. In order to deal with security,
Biometric Recognition: Overview and Recent Advances
TLDR
An overview of biometrics, its advantages and limitations, state-of-the-art error rates and current research in representation, fusion and security issues is presented.
BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY
TLDR
A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user.
DEVELOPMENT OF EFFICIENT BIOMETRIC RECOGNITION ALGORITHMS BASED ON FINGERPRINT AND FACE
TLDR
The methodology described in this paper is accurate, simple, fast and better than the existing algorithms.
Investigation of Recognition Methods in
Biometric is a very powerful technique used in modern technology for identifying a person. There are numerous traits in this technology, including face, palm, fingerprint, iris retina, hand geometry.
An introduction to biometrics
TLDR
This tutorial is to introduce the fundamentals of biometric technology from a pattern recognition and signal processing perspective by discussing some of the prominent techniques used in the field and to convey the recent advances made in this field especially in the context of security, privacy and forensics.
Biometric Methods - A Secure Survey
TLDR
A brief overview of biometric methods both Unimodal and Multibiometric as well as their advantages and disadvantages are to be presented.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 55 REFERENCES
BioID: A Multimodal Biometric Identification System
TLDR
This article goes into detail about the BioID system functions, explaining the data acquisition and preprocessing techniques for voice, facial, and lip imagery data and the classification principles used for optical features and the sensor fusion options.
SESAM: A Biometric Person Identification System Using Sensor Fusion
TLDR
The person authentification system SESAM is described, which combines three different biometric cues to reach robust identification and verification, and does a field test to show that this approach leads to a reliable personauthentification system.
Recognising Persons by Their Iris Patterns
TLDR
The iris recognition algorithms are explained, results of 9.1 million comparisons among eye images from trials in Britain, the USA, Japan, and Korea are presented, and high confidence levels are presented.
Fundamentals of Biometric Authentication Technologies
  • J. Wayman
  • Computer Science
    Int. J. Image Graph.
  • 2001
TLDR
This paper looks at biometric authentication technologies and their applications in general, developing a systematic approach to classifying, analyzing and evaluating them.
Learning user-specific parameters in a multibiometric system
  • Anil K. Jain, A. Ross
  • Computer Science
    Proceedings. International Conference on Image Processing
  • 2002
TLDR
It is demonstrated that the performance of multibiometric systems can be further improved by learning user-specific parameters, and thresholds and weights used to indicate the importance of matching scores output by each biometric trait are considered.
Integrating Faces and Fingerprints for Personal Identification
TLDR
A prototype biometric system which integrates faces and fingerprints is developed which overcomes the limitations of face recognition systems as well as fingerprint verification systems and is more reliable than the identity established by a face recognition system.
Personal Verification Using Palmprint and Hand Geometry Biometric
TLDR
Experimental results on the image dataset from 100 users confirm the utility of hand geometry features with those from palmprints and achieve promising results with a simple image acquisition setup.
Fusion of face and speech data for person identity verification
TLDR
This work proposes to evaluate different binary classification schemes (support vector machine, multilayer perceptron, C4.5 decision tree, Fisher's linear discriminant, Bayesian classifier) to carry on the fusion of experts for taking a final decision on identity authentication.
Impact of artificial "gummy" fingers on fingerprint systems
TLDR
Gummy fingers, namely artificial fingers that are easily made of cheap and readily available gelatin, were accepted by extremely high rates by 11 particular fingerprint devices with optical or capacitive sensors.
On the Error-Reject Trade-Off in Biometric Verification Systems
TLDR
By formulating the optimum Bayesian decision criterion for a verification system and by assuming the data distributions to be multinormals, two statistical expressions are derived for calculating theoretically the false acceptance and false rejection rates.
...
1
2
3
4
5
...