IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 4 - Issue 12, December 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review

[Full Text]

 

AUTHOR(S)

Israa M. Alsaadi

 

KEYWORDS

Index Terms: Biometrics; authentication methods; face recognition; distinguishing of human characteristics; automatic verification of identities.

 

ABSTRACT

Abstract: With the fast increasing of the electronic crimes and their related issues, deploying a reliable user authentication system became a significant task for both of access control and securing userís private data. Human biometric characteristics such as face, finger, iris scanning ,voice, signature and other features provide a dependable security level for both of the personal and the public use. Many biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master role in degrading impostersí attacks. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper aims to briefly address the psychological biometric authentication techniques. Also a brief summary to the advantages, disadvantages and future developments of each method is provided in this paper.

 

REFERENCES

[1] Yanushkevich, S.N., "Synthetic Biometrics: A Survey," in Neural Networks, 2006. IJCNN '06. International Joint Conference on , vol., no., pp.676-683, 0-0 0

[2] Eng, A.; Wahsheh, L.A., "Look into My Eyes: A Survey of Biometric Security," in Information Technology: New Generations (ITNG), 2013 Tenth International Conference on , vol., no., pp.422-427, 15-17 April 2013

[3] Kataria, A.N.; Adhyaru, D.M.; Sharma, A.K.; Zaveri, T.H., "A survey of automated biometric authentication techniques," in Engineering (NUiCONE), 2013 Nirma University International Conference on , vol., no., pp.1-6, 28-30 Nov. 2013

[4] Weizhi Meng; Wong, D.S.; Furnell, S.; Jianying Zhou, "Surveying the Development of Biometric User Authentication on Mobile Phones," in Communications Surveys & Tutorials, IEEE , vol.17, no.3, pp.1268-1293, thirdquarter 2015

[5] Pahuja, G.; Nagabhushan, T.N., "Biometric authentication & identification through behavioral biometrics: A survey," in Cognitive Computing and Information Processing (CCIP), 2015 International Conference on , vol., no., pp.1-7, 3-4 March 2015

[6] Lifeng Lai; Siu-Wai Ho; Poor, H.V., "Privacy-security tradeoffs in biometric security systems," in Communication, Control, and Computing, 2008 46th Annual Allerton Conference on , vol., no., pp.268-273, 23-26 Sept. 2008

[7] Xiao, Q. (2007). Technology review-biometrics-technology, application, challenge, and computational intelligence solutions. Computational Intelligence Magazine, IEEE, 2(2), 5-25.

[8] Dharavath, K.; Talukdar, F.A.; Laskar, R.H., "Study on biometric authentication systems, challenges and future trends: A review," in Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on , vol., no., pp.1-7, 26-28 Dec. 2013

[9] Ye Wang; Rane, S.; Draper, S.C.; Ishwar, P., "A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems," in Information Forensics and Security, IEEE Transactions on , vol.7, no.6, pp.1825-1840, Dec. 2012

[10] Deutschmann, I., Nordstrom, P., & Nilsson, L. (2013). Continuous authentication using behavioral biometrics. IT Professional, 15(4), 12-15

[11] Zaeri, N. (2011). Minutiae-based fingerprint extraction and recognition. INTECH Open Access Publisher.

[12] Faundez-Zanuy, M., "Biometric security technology," in Aerospace and Electronic Systems Magazine, IEEE , vol.21, no.6, pp.15-26, June 2006

[13] Narhar, U.K.; Joshi, R.B., "Highly Secure Authentication Scheme," in Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on , vol., no., pp.270-274, 26-27 Feb. 2015

[14] Jain, A.K.; Ross, A.; Prabhakar, S., "An introduction to biometric recognition," in Circuits and Systems for Video Technology, IEEE Transactions on , vol.14, no.1, pp.4-20, Jan. 2004

[15] Liu, Simon; Silverman, M., "A practical guide to biometric security technology," in IT Professional , vol.3, no.1, pp.27-32, Jan/Feb 2001

[16] Delac, K.; Grgic, M., "A survey of biometric recognition methods," in Electronics in Marine, 2004. Proceedings Elmar 2004. 46th International Symposium , vol., no., pp.184-193, 18-18 June 2004