Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications
ISSN: 2320-7248 Impact Factor:1.8 Volume:2 Issue:1 Year: 05 May,2015 Pages:143-152
Information Security has also made by advances in the field of Information Technology. Verification plays an important role in the process of Information security. The password method is the cheapest and simplest technology, because it only requires simple software resources. In the case of traditional password based verification systems if a password is discovered by an unauthorized user it can be easily hacked. Hence biometric recognition system is used. Various researchers have proposed a number of biometric techniques for personal verification. Biometric techniques include such type of software which one does not need to remember or carry a token. For recognition purpose Biometric based personal authentication systems use physiological or behavioural factors of a person. This paper is review on the biometric authentication techniques and some future possibilities in this field.
Biometrics, Biometric Technology, System Performance, Classification
[1] C.B. Tatepamulwar, V.P. Pawar, H.S. Fadewarr, “Biometric Recognition”, NCI2TM: 2014 [2] Shweta Gaur, V.A. Shah, Manish Thakker, “BiometricRecognition Techniques”, International Journal ofAdvancedin Electrical, Electronics and Instrumentation Engineering,Vol. 1, issue 4, October 2012. [3] K P Tripathi, “A comparative Study of Biometric Technologies with Reference to Human Interface”,International Journal of Computer Applications, Volume 14- No.5, January 2011. [4] Anil K. Jain, Arun Ross and SalilPrabhakar,” An Introduction to Biometric Recognition” Appeared inIEEE Transactions on Circuits and Systems for Video Technology,Special Issue on Image- and Video-BaseBiometrics, Vol. 14,No. 1, January 2004. [5]Anil K. Jain, Arun Ross and SalilPrabhakar (2004), “AnIntroduction to Biometric Recognition.” [6]Comparisons of Various Biometric Technologies, www.biometricvision.com [7]AlinaKlokova, “Comparison of Various BiometricMethods”. [8] RabiaJarfi and Hamid R. Arabina, “A Survey of FaceRecognition Techniques”, Journal of Information ProcessingSystems, Vol.5, No.2, June 2009. [9]Jain, A.K.; Ross, A.; Pankanti, S, “Biometrics: a tool forinformation security” Information Forensics and Security,IEEE Transactions on Volume: 1, Issue: 2 Digital ObjectIdentifier: 10.1109/ TIFS.2006.873653 Publication Year:2006, Page(s): 125 –143 [10]Y. Zhu, T. Tan and Yusag, “Biometric PersonalIdentification based on Iris Patterns, pattern Recognition”,15th Internal Configuration, vol. 2, pp 801-804, 2004. [11]John Daugman, “How Iris Recognition Works,” IEEE Conference on ICIP, 2002, pp. I–33– I–36 [12]PrateekVermaetl,”Feature Extraction Algorithm ofFingerprint Recognition”, International Journal ofAdvanced Research in computer science and software Engineering,Volume-2, Issue 10 October 2012. [13] L. Hong and A. K. Jain, “Integrating faces and fingerprintsfor personal identification”, IEEE Trans. PatternAnal.Mach. Intell., Volume 20, No. 12, Dec. 1998, pp. [14] A. S. Tolba, A.H. El-Baz, and A.A. El-Harby, “FaceRecognition”, World Academy of Science, Engineering andTechnology, Vol: 2 2008-07-21 [15] Bhupinder Singh, RupinderKaur, NidhiDevgun, RamandeepKaur,” The process of Feature Extraction inAutomaticVoice Recognition System for Computer Machine Interaction with Humans”, InternationalJournal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 2, February 2012 [16] SamitBiswas, Tai-hoon Kim, Debnath Bhattacharyya, “Features Extraction and Verification of SignatureImageusing Clustering Technique”, International Journal of Smart Home, Vol-4 No.3, July 2010.