Full Paper View Go Back
Security and Privacy in Biometrics: A Review
A.K. Bhatia1 , H. Kaur2
Section:Review Paper, Product Type: Isroset-Journal
Vol.1 ,
Issue.2 , pp.33-35, Mar-2013
Online published on Apr 30, 2013
Copyright © A.K. Bhatia, H. Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: A.K. Bhatia, H. Kaur, “Security and Privacy in Biometrics: A Review,” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.2, pp.33-35, 2013.
MLA Style Citation: A.K. Bhatia, H. Kaur "Security and Privacy in Biometrics: A Review." International Journal of Scientific Research in Computer Science and Engineering 1.2 (2013): 33-35.
APA Style Citation: A.K. Bhatia, H. Kaur, (2013). Security and Privacy in Biometrics: A Review. International Journal of Scientific Research in Computer Science and Engineering, 1(2), 33-35.
BibTex Style Citation:
@article{Bhatia_2013,
author = {A.K. Bhatia, H. Kaur},
title = {Security and Privacy in Biometrics: A Review},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {3 2013},
volume = {1},
Issue = {2},
month = {3},
year = {2013},
issn = {2347-2693},
pages = {33-35},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=37},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=37
TI - Security and Privacy in Biometrics: A Review
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - A.K. Bhatia, H. Kaur
PY - 2013
DA - 2013/04/30
PB - IJCSE, Indore, INDIA
SP - 33-35
IS - 2
VL - 1
SN - 2347-2693
ER -
Abstract :
The term “biometrics” is derived from the Greek words bio (life) and metric (to measure).It refers to the Automated Recognition of Individuals based on their physiological or behavioural traits like fingerprints, hand geometry, face, iris recognition, signature, voice and many more. By using biometrics it is possible to confirm or establish an individual’s identity based on “who she is” ,rather than by “what she possesses” (e.g., an ID card) or “what she remembers” (e.g., a password).In this Paper, we give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns.
Key-Words / Index Term :
Biometrics; Recognition; Verification; identification
References :
Rashmi Singhal and Payal Jain, "BIOMETRICS:ENHANCING SECURITY," Asian Journal of computer science and information technology, pp. 89-92, 2011.
N.K Ratha, J.H Connell, and R.M Bolle, "Enhancing Security and privacy in biometrics based authentication systems," IBM systems journal, pp. 614-634, 2011.
Sampda A Dhole and V.H. Patil, "Person identification using pegfree hand geometry measurement," International journal of engineering science and technology, vol. 4, no. 6, 2012
Biometric Technology Application Manual," in Biometric Basics.: National Biometric Security Project, 2008.
Yaroslav Bulatov, Sachin Jambawalikar, Piyush Kumar, and Saurabh Sethia, "Hand Recognition Using geometric classifiers," ICBA,Hong Kong, pp. 753-759, July 2004.
Pierre Baldi and Yves Chauvin,Neural N etworks for Fingerprint Recognition,Neural Computation 5,pp.402-418,1993
Ayer, J., Lama, K., & Iskandar, B. S. (2009). A Novel Approach to Dynamic Signature Verifi cation Using Sensor-Based Data glove Faculty of Information Science and Technology, Multimedia University, Department of Electrical and Electronic Engineering, Universiti Teknologi PETRONAS, Faculty of Engin. American Journal of Applied Sciences, 6(2), 233-240.
Salil P. Banerjee,"Biometric Authentication and Identification using Keystroke Dynamics: A Survey", journal of Pattern Recognition Reserch 7(2012) 116-139
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.