A Survey of Emerging Biometric Technologies

Computer Security System / technology have passed through several changes. The trends have been from what you know (e.g. password, PIN, etc) to what you have (ATM card, Driving License, etc) and presently to who you are (Biometry) or combinations of two or more of the trios. This technology (biometry) has come to solve the problems identified with knowledge-based and token-based authentication systems. It is possible to forget your password and what you have can as well be stolen. The security of determining who you are is referred to as BIOMETRIC. Biometric, in a nutshell, is the use of your body as password. This paper explores the various methods of biometric identification that have evolved over the years and the features used for each modality.

[1]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  D. O'Shaughnessy,et al.  Speaker recognition , 1986, IEEE ASSP Magazine.

[3]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[4]  Fernando L. Podio,et al.  Common Biometric Exchange File Format (CBEFF) , 2001 .

[5]  R. Brand,et al.  The biomechanics and motor control of human gait: Normal, elderly, and pathological , 1992 .

[6]  Harold Alan Pincus,et al.  Army Biometric Applications , 2001 .

[7]  Jason M. Nash,et al.  Automatic gait recognition , 1999 .

[8]  Sadaoki Furui,et al.  Speaker recognition , 1997, Scholarpedia.

[9]  Mark S. Nixon,et al.  On gait as a biometric: Progress and prospects , 2004, 2004 12th European Signal Processing Conference.

[10]  Václav Matýǎs,et al.  Biometric Authentication Systems , 2000 .

[11]  A. B. Drought,et al.  WALKING PATTERNS OF NORMAL MEN. , 1964, The Journal of bone and joint surgery. American volume.