Abstract
Introduction/purpose: Nowadays, user identification systems play a very important role in modern society. Complex security requirements have led experts to explore ways in which biometric data can be used to identify user identities. This paper presents an overview of biometric standards and methods which can be used to identify users in biometric systems, and therefore to protect information and communication systems. Methods: This paper deals with the problem of standardization in the field of biometrics. The first part of the paper presents concrete examples of the most widely used biometric standards. The second part of the paper gives an overview of the most used biometric methods. Results: The obtained results show that the development of biometric systems and biometric sensors contributes to better protection of identity from misuse, because biometric technologies have great potential for improving the security and accuracy of system operation. Biometric systems improve the security of users and also provide much greater precision in establishing identity. Conclusion: The development of biometric standards should focus on their interconnectivity, as well as on increasing connectivity with other IT standards.
Publisher
Centre for Evaluation in Education and Science (CEON/CEES)
Reference23 articles.
1. Al-Maadeed, S., Bourif, M., Bouridane, A. & Jiang, R. 2016. Low-quality facial biometric verification via dictionary-based random pooling. Pattern Recognition, 52, pp.238-248. Available at: https://doi.org/10.1016/j.patcog.2015.09.031;
2. Belcher, C. & Du, Y. 2008. A Selective Feature Information Approach for Iris Image-Quality Measure. IEEE Transactions on Information Forensics and Security, 3(3), pp.572-577. Available at: https://doi.org/10.1109/TIFS.2008.924606;
3. Bhardwaj, I., Londhe, N.D. & Kopparapu, S.K. 2017. A spoof resistant multibiometric system based on the physiological and behavioral characteristics of fingerprint. Pattern Recognition, 62, pp.214-224. Available at: https://doi.org/10.1016/j.patcog.2016.09.003;
4. Chen, Y., Atnafu, A.D., Schlattner, I., Weldtsadik, W.T., Roh, M.C., Kim, H.J., Lee, S.W., Blankertz, B. & Fazli, S. 2016. A High-Security EEG-Based Login System with RSVP Stimuli and Dry Electrodes. IEEE Transactions on Information Forensics and Security, 11(12), pp.2635-2647. Available at: https://doi.org/10.1109/TIFS.2016.2577551;
5. Chun, S.Y. 2016. Single pulse ECG-based small scale user authentication using guided filtering. In: International Conference on Biometrics (ICB), Halmstad, Sweden, pp.1-7, June 13-16. Available at: https://doi.org/10.1109/ICB.2016.7550065;
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献