A Comparison Based Study on Biometrics for Human Recognition

A biometric system provides automatic recognition of an individual based on a unique feature or characteristic possessed by the individual. These biometric characteristic may physiological or behavioral. Unlike other identification methods such as id proof, tokens and password, the distinct aspect of biometric recognition comes into light from randomly distributed features in human being. In this paper, I describe the novel comparison based upon various aspects to make easy selection for biometric device deployment in specific environment. This paper proposes a comparison among all kind of biometric system available in the society. The existing computer security systems used at various places like banking, passport, credit cards, smart cards, PIN , access control and network security are using username and passwords for person identification. Biometric systems also introduce an aspect of user convenience; it means one can be authorized by representing himself or herself. In this paper, the main focus is on working principal of biometric technique, the various biometrics systems and their comparisons.

[1]  Ashok A. Ghatol,et al.  Iris recognition: an emerging biometric technology , 2007 .

[2]  Padma Comparative and Analysis of Biometric Systems , 2011 .

[3]  David Zhang,et al.  Two novel characteristics in palmprint verification: datum point invariance and line feature matching , 1999, Pattern Recognit..

[4]  W.L. Woo,et al.  Secure Authentication for Face Recognition , 2007, 2007 IEEE Symposium on Computational Intelligence in Image and Signal Processing.

[5]  S. Elliott,et al.  Implementation of hand geometry at Purdue University's Recreational Center: an analysis of user perspectives and system performance , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.

[6]  Debnath Bhattacharyya,et al.  Biometric Authentication: A Review , 2009 .

[7]  Himanshu Srivastava Personal Identification Using Iris Recognition System, a Review , 2013 .

[8]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[9]  Paul Reid,et al.  Biometrics for Network Security , 2003 .

[10]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[11]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Ben Edgington Your quest for the ideal biometric : is it in vain ? Introducing Hitachi ’ s Finger Vein Technology , 2007 .

[13]  S. Liu,et al.  A practical guide to biometric security technology , 2001 .

[14]  D. Reynolds,et al.  Authentication gets personal with biometrics , 2004, IEEE Signal Processing Magazine.

[15]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[16]  Tilo Burghardt,et al.  A Brief Review of Biometric Identification , 2012 .

[17]  J. Choudhary Survey of Different Biometrics Techniques , 2012 .

[18]  K P Tripathi,et al.  A Comparative Study of Biometric Technologies with Reference to Human Interface , 2011 .

[19]  Arun Ross,et al.  A deformable model for fingerprint matching , 2005, Pattern Recognit..