Online Submission!

Open Journal Systems

SIGNIFICANT APPLICATIONS OF BIOMETRICS

K. Ramya, K. Suganya, A. Rethinavelsubramanan

Abstract


Biometric Technology and its applications have existed longer than people believe. Currently the number of applications instituted around the world is increasing. In 1996 approximately 10,000 biometric devices were in use worldwide. Some estimate the number will grow to 50,000 by year 2000.Bimetric vendors feel that time and attendance is the biggest growth area for biometrics in the near future. The applications in the biometric technology are limitless. Four to five years ago biometric technology will still considered too „fictional‟ for many.

Full Text:

PDF

References


. http://www.cilab.upf.edu/biosecure1/public_docs_Deli/BioSecure_Deliverable_D10-2-3_b3.pdf

. Jain, A. K. (28-30 April 2004), "Biometric recognition: how do I know who you are?", Signal Processing and Communications Applications Conference, 2004. Proceedings of the IEEE 12th: 3 - 5

. Jain, A. K.; Ross, A. & Pankanti, S. (June 2006), "Biometrics: A Tool for Information Security", IEEE Transactions On Information Forensics And Security 1st (2)

. P. J. Philips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone, Face Recognition Vendor Test 2002: Overview and Summary (Online) [1]

. C. Wilson, A. R. Hicklin, H. Korves, B. Ulery, M. Zoepfl, M. Bone, P. Grother, R. J. Micheals, S. Otto, and C. Watson, Fingerprint vendor technology evaluation 2003: summary of results and analysis report, NIST Internal Rep. 7123, Jun. 2004 [Online] [2]

. R. Cappelli, D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, Performance evaluation of fingerprint verification systems, IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 1, pp. 3–18, Jan. 2006

. E. Kukula, S. Elliott, Implementation of Hand Geometry at Purdue University's Recreational Center: An Analysis of User Perspectives and System Performance, IEEE 2005

. International Biometric Group, Independent Testing of Iris Recognition Technology, May 2005 (Online) [3]

. NIST Iris Challenge Evaluation, (Online) [4]

. S. Hocquet, J. Ramel, H. Cardot, Fusion of Methods for Keystroke Dynamic Authentication, Automatic Identification AdvancedTechnologies, 2005. Fourth IEEE Workshop on 17-18 Oct. 2005 Page(s):224 - 229

. D. A. Reynolds, W. Campbell, T. Gleason, C. Quillen, D. Sturim, P. Torres-Carrasquillo, and Adami, The 2004 MIT Lincoln laboratory speaker recognition system, in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing, Philadelphia, PA, Mar. 2005




DOI: http://dx.doi.org/10.6084/ijact.v3i2.258

Refbacks

  • There are currently no refbacks.




Copyright (c) 2015 COMPUSOFT "An International Journal of Advanced Computer Technology"