A study on the available biometric technologies used in order to control security in physical access

The control of the physical access in automated security systems, like banks, ports, airports and military areas, is essential to guarantee the financial security of the institutions and to prevent to the possibility of accomplishment of terrorist acts. To this, a lot of technologies used in security systems can be used, but the choice of a technology depends on some factors, as the level of security related with the financial value to be protected, the entailed cost to the technology implementation related to the level of offered security, and the physical characteristics to the proper installation. This work aims to present the main characteristics of the biometric technologies used currently in the control of physical access, therefore the biometry is known as the measurement technique more insurance currently in the identification of a person. The susceptibility to fraud, involved costs to implementation and installation of the biometric devices, advantages and disadvantages of each technology will be presented in this work. Some technologies have low costs for the implantation, but its use has low acceptance in some countries. Others have high trustworthiness but the cost becomes the prohibitive equipment. This work presents a relation cost-benefit, so that the choice of the technology can be made taking in account the involved cost and the degree of security of the technology to be used.

[1]  D. Reynolds,et al.  Authentication gets personal with biometrics , 2004, IEEE Signal Processing Magazine.

[2]  Teddy Ko,et al.  Fingerprint and Face Identification for Large User Population , 2003 .

[3]  Ashok A. Ghatol,et al.  Iris recognition: an emerging biometric technology , 2007 .

[4]  M. S. Kumbhar,et al.  An Identity-Authentication System Using Fingerprints , 2012 .

[5]  M.G. Bellanger,et al.  Digital processing of speech signals , 1980, Proceedings of the IEEE.

[6]  G. Bleumer 1 Biometric Authentication and Multilateral Security , 1999 .

[7]  R. Sanchez-Reillo,et al.  Access control system with hand geometry verification and smart cards , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[8]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[9]  Horst Bunke,et al.  Face recognition using range images , 1997, Proceedings. International Conference on Virtual Systems and MultiMedia VSMM '97 (Cat. No.97TB100182).

[10]  Sudeep Sarkar,et al.  Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[11]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[12]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[13]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  Vinayak Ashok Bharadi Biometric Authentication Systems , 2012 .

[15]  Václav Matyás,et al.  Biometric authentication - security and usability , 2002, Communications and Multimedia Security.

[16]  U. Halici,et al.  Intelligent biometric techniques in fingerprint and face recognition , 2000 .

[17]  M. Faundez-Zanuy,et al.  State-of-the-art in speaker recognition , 2005, IEEE Aerospace and Electronic Systems Magazine.

[18]  Marc Parizeau,et al.  Signature verification from position, velocity and acceleration signals: a comparative study , 1988, [1988 Proceedings] 9th International Conference on Pattern Recognition.

[19]  Sudeep Sarkar,et al.  An evaluation of face and ear biometrics , 2002, Object recognition supported by user interaction for service robots.

[20]  Václav Matýǎs,et al.  Biometric Authentication Systems , 2000 .

[21]  Sharath Pankanti,et al.  Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .