Journal Press India®

A Review on Comparative Analysis on Different Sort of Physiological and Behavioral Biometric Framework

Vol 9 , Issue 2 , April - June 2021 | Pages: 1-9 | Research Paper  

https://doi.org/10.51976/ijari.922101

| | |


Author Details ( * ) denotes Corresponding author

1. * Harsh Sable, School of Basic and Applied Science SBAS, Galgotias University, Greater Noida, Uttar Pradesh, India (harshsable0308@gmail.com)
2. Divya Bajpai Tripathy, School of Basic and Applied Science SBAS, Galgotias University, Greater Noida, Uttar Pradesh, India (divyabaj@gmail.com)

Biometrics as the investigation of seeing an individual ward on their physical or conduct characteristics, biometric have now been conveyed in diverse business, ordinary resident and national security applications. Customarily the usage of biometrics devices has improved our capacity to give approved entry to material foundations. Biometric is the usage of a person's novel physiological, lead, and morphological trademark to give valuable person distinguishing proof. Biometric structures that are starting at now available today break down fingerprints, engravings, iris and retina models, and face. Mechanisms that are similar to biometrics anyway are not named such are lead systems, for instance, voice, imprint and keystroke mechanisms. These days biometrics is in effect effectively executed in numerous fields like measurable, security, recognizable proof and approval frameworks.

Keywords

Biometrics; Fingerprint; Retina; Iris


  1. Biometrics and standards ITU-T Technology watch report, 2009.

  2. AK. Jain, A Ross, S Prabhakar. An introduction to biometric recognition, 2004

  3. K Jain, A Ross, S Pankanti. Biometric: A Tool for Information Security, 2006.

  4. K Jain, R Bolle, S Pankanti. Biometrics: Personal Identification in Networked Society, 1999.

  5. A Ross, S Dass, AK Jain. A deformable model for fingerprint matching, 2005.

  6. A Klokova. Comparison of various biometric methods, Southampton, UK, SO17 1BJ.

  7. A Gopal, C Singh. e-world Emerging Trends in Information Technology, Excel Publication, New Delhi, 2009.

  8. B Edgington, Introducing Hitachi’s Finger Vein Technology, A White Paper, 2007.

  9. C Verma. Soft Biometric: An Asset for Personal Recognition, proceeding of international journal of computer science & communication technologies, 2009.

  10. D Zhang, W Shu. Two Novel Characteristic in Palmprint Verification: Datum Point Invariance and Line Feature Matching, 1999.

  11. D Maltoni, AK Jain. Hand book fingerprint recognition, [Online] Available: http:// bias.csr.UnIbo.it/ maltoni/handbook, [2009].

  12. D Bhattacharyya. Biometric Authentication: A Review, 2009.

  13. E Kukula, S Elliott. Implementation of Hand Geometry at Purdue University's Recreational Center, 2001.

  14. F Monrose, AD Rubin. Keystroke dynamics as a biometric for authentication, 2000.

  15. H Srivastava. Personal Identification Using Iris Recognition System, a Review, 2013.

  16. http://www.amazingincredible.com/show/82-the-incredible-human-eye [Online] [2013].

  17. https://www.slideshare.net/jackofhearty1/biometrics-techniques.

  18. International Biometric Group. Biometrics Market and Industry Report 2007-2012, 2007.

  19. International Biometric Group. Biometrics Market and Industry Report 2010-2015, 2010.

  20. J Ortega-Garcia, J Bigun, D Reynolds, JG Rodriguez. Authentication gets personal with biometrics, 2004.

  21. AK Jain, A Ross, SA Pankanti. Biometrics: A Tool for Information Security, 2006.

  22. J Choudhary. Survey of Different Biometrics Techniques, 2012.

  23. J Kent. Malaysia car thieves steal finger, 2013.

  24. K P Tripathi. Comparative Study of Biometric Technologies with Reference to Human Interface.  2011.

  25. KP Tripathi. Comparative Study of Biometric Technologies with reference to Human interface International Journal of Advances in Science and Technology, 2014.

  26. K Mali, S Bhattacharya. Comparative Study of Different Biometric Features, 7, 2013.

  27. MA Dabbah, WL Woo, SS Dlay, Secure Authentication for Face Recognition, 2007.

  28. P Tripathi. A Comparative Study of Biometric Technologies with Reference to Human Interface, 2011.

  29. P Manivannan. Comparative and Analysis of Biometric Systems, 2011.

  30. P Reid. Biometrics for network security,2004.

  31. RV Ramen, V Yampoolskiy. Biometrics: a survey and classification, Biometrics, 2008.

  32. RA Samaa’n. Biometrics Authentication Systems, 4 2003, 1-2.

  33. R Saini, N Rana. Comparison of various biometric methods, International Journal of Advances in Science and Technology, 2014.

  34. SR Ganorkar, AA Ghatol. Iris Recognition: An Emerging Biometric Technology, 2007.

  35. S Liu, M Silverman. A Practical Guide to Biometric Security Technology, 2001.

  36. T Burghardt A brief review of biometric identification, University of Bristol, UK.

  37. W Yang, S Wang, J Hu, C Valli. Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem, 6, 2018.

Abstract Views: 1
PDF Views: 137

Advanced Search

News/Events

Indira School of Bus...

Indira School of Mangement Studies PGDM, Pune Organizing Internatio...

Indira Institute of ...

Indira Institute of Management, Pune Organizing International Confe...

D. Y. Patil Internat...

D. Y. Patil International University, Akurdi-Pune Organizing Nation...

ISBM College of Engi...

ISBM College of Engineering, Pune Organizing International Conferen...

Periyar Maniammai In...

Department of Commerce Periyar Maniammai Institute of Science &...

Institute of Managem...

Vivekanand Education Society's Institute of Management Studies ...

Institute of Managem...

Deccan Education Society Institute of Management Development and Re...

S.B. Patil Institute...

Pimpri Chinchwad Education Trust's S.B. Patil Institute of Mana...

D. Y. Patil IMCAM, A...

D. Y. Patil Institute of Master of Computer Applications & Managem...

Vignana Jyothi Insti...

Vignana Jyothi Institute of Management International Conference on ...

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.