APPLICATIONS OF BIOMETRIC AUTHENTICATION: AN ANALYSIS AND COMPARISON

Authors

  • A. K. Shrivas Dept. Of IT, Dr. C. V. Raman University, Bilaspur (C. G.), India
  • Swati Bareth Dept. Of IT, Dr. C. V. Raman University, Bilaspur (C. G.), India

Keywords:

Biometric Authentication System, Analysis, Applications, Comparison

Abstract

Biometrics authentication is a growing technology which has been used in huge areas like forensics, telecommunication, government, traffic and health care services. A biometric authentication system provides recognition of an each and every person based on physiological or behavioral characteristics. In this paper the main focus is an comparison of various biometric systems such as iris, retina, DNA, face, ear, voice, heartbeat, gait etc. and simply define their advantages, disadvantages, feature and application. The comparison criteria are accuracy, cost, performance, acceptability etc.

References

I. D. Bhattacharya, R. Ranjan, F. Alisherov. and C. Minkyu., Biometric Authentication: A Review, International Journal of u-and e-Service, Science and Technology IJUES, Vol. 2(3), pp.13-28, 2009.

II. S. Singh , A Review on Biometrics and Ear Recognition Technique, IJARCSSE, Vol. 3(6), pp.1624-1630, 2009.

III. S. R. Kodituwakku, Biometric Authentication: A Review, International Journal of Trend in Research and Development, Vol. 2(4), pp.2394-9333, 2015.

IV. S. Gaur, V. A. Shah and M. Thakker, Biometric Recognition Techniques: A Review, IJAREEIE , Vol. 1(4), pp.282-290, 2012.

V. H. Srivastava., A Comparison Based Study on Biometrics for Human Recognition, IOSR-JCE, Vol. 15(1), pp.22-29, 2013.

VI. S. Tiwari, J.N. Chaurasia and V.S Chaurasia, A Review of Advancements in Biometric Systems, IJIRAE, Vol. 2(1), pp. 187-204, 2015.

VII. B. Kaschte, Biometric Authentication System Today and In The Future, IEEE, Vol. 2(4) , pp. 1-13, 2005.

VIII. A.K. Jain, A. Ross and S. R. Prabhakar, An Introduction to Biometric Recognition, IEEE, Vol. 14(1),pp. 1-29, 2004.

IX. BTAM, Biometric Technology Application Manual: Applying Biometrics, National Biometric Security Project, Vol. 2, pp. 3-176, 2008.

X. R. Saini and N. Rana, Comparison of Various Biometric Method, IJAST, Vol. 2(1), pp.24-30, 2014.

XI. Website[http://lonewlf176.blogspot.in/2010/10/facial-recognition-advantages-and.html] [Browsing date:23-02-2017].

XII. Weblink[http://www.cl.cam.ac.uk/~jgd1000/addisadvans.html][Browsing date: 30/02/2017].

XIII. Weblink[http://www.globalsecurity.org/security/systems/biometricseye_scan.htm][ Browsing date :20/04/2017].

XIV. Website [http://resources.infosecinstitute.com] [Browsing date: 03-01-2017].

XV. Weblink[http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies] [Browsing date: 07-01-2017].

XVI. I. M. Alsaadi, Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vol. 4(12), pp.285-289, 2015.

XVII. A. Babich, Biometric authentication Types of biometric identifiers, Bachelor’s Thesis, Haaga-Helia University of applied science, 2012.

XVIII. M. M. Sawant, Y. Nagargoje., S. Selki, D. Bora and Y. Borate, Keystroke Dynamics: Review Paper, IJARCCE, 2(10)4018-4020, 2013.

XIX. Weblink[http://www.ijstr.org/final-print/dec2015/Physiological-Biometric-Authentication-Systems-Advantages-Disadvantages-And-Future-Development-A-Review.pdf][ Browsing date:22/03/2017].

Additional Files

Published

15-05-2017

How to Cite

A. K. Shrivas, & Swati Bareth. (2017). APPLICATIONS OF BIOMETRIC AUTHENTICATION: AN ANALYSIS AND COMPARISON . International Education and Research Journal (IERJ), 3(5). Retrieved from https://ierj.in/journal/index.php/ierj/article/view/842