APPLICATIONS OF BIOMETRIC AUTHENTICATION: AN ANALYSIS AND COMPARISON
Keywords:
Biometric Authentication System, Analysis, Applications, ComparisonAbstract
Biometrics authentication is a growing technology which has been used in huge areas like forensics, telecommunication, government, traffic and health care services. A biometric authentication system provides recognition of an each and every person based on physiological or behavioral characteristics. In this paper the main focus is an comparison of various biometric systems such as iris, retina, DNA, face, ear, voice, heartbeat, gait etc. and simply define their advantages, disadvantages, feature and application. The comparison criteria are accuracy, cost, performance, acceptability etc.
References
I. D. Bhattacharya, R. Ranjan, F. Alisherov. and C. Minkyu., Biometric Authentication: A Review, International Journal of u-and e-Service, Science and Technology IJUES, Vol. 2(3), pp.13-28, 2009.
II. S. Singh , A Review on Biometrics and Ear Recognition Technique, IJARCSSE, Vol. 3(6), pp.1624-1630, 2009.
III. S. R. Kodituwakku, Biometric Authentication: A Review, International Journal of Trend in Research and Development, Vol. 2(4), pp.2394-9333, 2015.
IV. S. Gaur, V. A. Shah and M. Thakker, Biometric Recognition Techniques: A Review, IJAREEIE , Vol. 1(4), pp.282-290, 2012.
V. H. Srivastava., A Comparison Based Study on Biometrics for Human Recognition, IOSR-JCE, Vol. 15(1), pp.22-29, 2013.
VI. S. Tiwari, J.N. Chaurasia and V.S Chaurasia, A Review of Advancements in Biometric Systems, IJIRAE, Vol. 2(1), pp. 187-204, 2015.
VII. B. Kaschte, Biometric Authentication System Today and In The Future, IEEE, Vol. 2(4) , pp. 1-13, 2005.
VIII. A.K. Jain, A. Ross and S. R. Prabhakar, An Introduction to Biometric Recognition, IEEE, Vol. 14(1),pp. 1-29, 2004.
IX. BTAM, Biometric Technology Application Manual: Applying Biometrics, National Biometric Security Project, Vol. 2, pp. 3-176, 2008.
X. R. Saini and N. Rana, Comparison of Various Biometric Method, IJAST, Vol. 2(1), pp.24-30, 2014.
XI. Website[http://lonewlf176.blogspot.in/2010/10/facial-recognition-advantages-and.html] [Browsing date:23-02-2017].
XII. Weblink[http://www.cl.cam.ac.uk/~jgd1000/addisadvans.html][Browsing date: 30/02/2017].
XIII. Weblink[http://www.globalsecurity.org/security/systems/biometricseye_scan.htm][ Browsing date :20/04/2017].
XIV. Website [http://resources.infosecinstitute.com] [Browsing date: 03-01-2017].
XV. Weblink[http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies] [Browsing date: 07-01-2017].
XVI. I. M. Alsaadi, Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vol. 4(12), pp.285-289, 2015.
XVII. A. Babich, Biometric authentication Types of biometric identifiers, Bachelor’s Thesis, Haaga-Helia University of applied science, 2012.
XVIII. M. M. Sawant, Y. Nagargoje., S. Selki, D. Bora and Y. Borate, Keystroke Dynamics: Review Paper, IJARCCE, 2(10)4018-4020, 2013.
XIX. Weblink[http://www.ijstr.org/final-print/dec2015/Physiological-Biometric-Authentication-Systems-Advantages-Disadvantages-And-Future-Development-A-Review.pdf][ Browsing date:22/03/2017].
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 International Education and Research Journal (IERJ)

This work is licensed under a Creative Commons Attribution 4.0 International License.