Biometric Identification Criminal, Terrorist, and individual Identification System It's a New Wine & Taste

Biometric system used for security purpose. Mostly the biometric system used for individual identification e.g. to scan finger, eye, iris, voice, signature, DNA, and Hand geometry. The main purpose of installing biometric system to minimize crimes and terrorist attack. The methodology of the paper to collect primary data from research, interviews, and human observation case studies. The objective of this research paper to control human theft, and terrorist activity in Pakistan.

[1]  Debnath Bhattacharyya,et al.  Biometric Authentication: A Review , 2009 .

[2]  C. Champod,et al.  Multimodal biometrics for identity documents ( ) , 2007 .

[3]  A. Dhillon,et al.  Review on: Approaches for Finding Correlation Between Fingerprints and Footprints of a Person , 2014 .

[4]  Aboul Ella Hassanien,et al.  Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues , 2014, Bio-inspiring Cyber Security and Cloud Services.

[5]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Ramakant Nevatia,et al.  Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity , 2014, J. Inf. Process. Syst..

[7]  E. Kirubakaran,et al.  A Study on Cyber Crimes and protection , 2011 .

[8]  O. A. Idowu Development of Attendance Management System using Biometrics. , 2012 .

[9]  Anil K. Jain,et al.  Bridging the gap: from biometrics to forensics , 2015, Philosophical Transactions of the Royal Society B: Biological Sciences.

[10]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Rong Wang,et al.  Fingerprint Identification , 2008, Wiley Encyclopedia of Computer Science and Engineering.

[12]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[13]  Helen C. Shen,et al.  Personal Verification Using Palmprint and Hand Geometry Biometric , 2003, AVBPA.

[14]  Chin Seng Chua,et al.  Point Signatures: A New Representation for 3D Object Recognition , 1997, International Journal of Computer Vision.

[15]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[16]  Vishal Shrivastav Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Recognition , 2015 .

[17]  Anil K. Jain,et al.  Biometrics of Next Generation: An Overview , 2010 .

[18]  Anil K. Jain,et al.  A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects , 2013 .

[19]  Raymond N. J. Veldhuis,et al.  Biometric Authentication System on Mobile Personal Devices , 2010, IEEE Transactions on Instrumentation and Measurement.