Biometric technologies and their perception by the common citizen

This article presents the biometric technology and its perception by the common citizen in Portugal. The results of a systematic inquiry about the perception of the Portuguese on the biometric technology are presented, which involved 606 citizens. Through the article, we present the principal biometrics, subdivided in stealth and collaborative, and the main concepts on its evaluation. Following a simple method consisting in a survey by questionnaire, the most relevant conclusions are presented.

[1]  Eiji Okamoto,et al.  A User Identification System Using Signature Written with Mouse , 1998, ACISP.

[2]  Lurdes Faria,et al.  Multimodal cognitive biometrics , 2011, 6th Iberian Conference on Information Systems and Technologies (CISTI 2011).

[3]  Faith-Michael E. Uzoka,et al.  Empirical analysis of biometric technology adoption and acceptance in Botswana , 2009, J. Syst. Softw..

[4]  Paulo Sérgio Tenreiro Magalhães Estudo de viabilidade da utilização de tecnologias biométricas comportamentais na autenticação do cidadão perante os serviços electrónicos do Estado , 2009 .

[5]  Norman Poh,et al.  Hybrid Biometric Person Authentication Using Face and Voice Features , 2001, AVBPA.

[6]  N L Browse,et al.  Transcranial Doppler measurement of middle cerebral artery blood flow velocity: a validation study. , 1986, Stroke.

[7]  G. Aguilar,et al.  Fingerprint Recongnition Using Espatial Minutae Information , 2008, 2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08).

[8]  Praveen Ranjan Srivastava,et al.  An integrated authentication framework based on multi-tier biometrics , 2011, Int. J. Biom..

[9]  Christoph Busch,et al.  Non-Forensic Odontological Biometrics , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[10]  S. Liu,et al.  A practical guide to biometric security technology , 2001 .

[11]  Kenneth Revett,et al.  Keystroke dynamics - stepping forward in authentication , 2006 .

[12]  Steve Drew,et al.  Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia , 2009, I3E.

[13]  Chaouki Kasmi,et al.  Voice Biometrics , 2011, Encyclopedia of Cryptography and Security.

[14]  Yong Haur Tay,et al.  A review of iris recognition algorithms , 2008, 2008 International Symposium on Information Technology.

[15]  Sunil Kumar Singla,et al.  ECG as Biometric in the Automated World , 2010 .

[16]  Rain Ottis,et al.  Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective , 2008 .