SWOT of Biometric Technology

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 539

This Paper With 7 Page And PDF and WORD Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICMRS01_353

تاریخ نمایه سازی: 8 آبان 1395

Abstract:

In its broadest sense, biometrics is the measurement and analysis of a biological characteristic (fingerprints, iris patterns, retains, face or hand geometry) or a behavioral characteristic (voice, gait or signature). Biometric technologies use these characteristics to identify individuals automatically. Unlike identity documents or passwords, biometrics cannot be lost or forgotten since they are a part of user and are always present at the time of identification. They are also difficult, though not impossible, to forge or share. In this paper we will discuss various biometrics methods and their history, then some example of behaviometric technology and the current state of biometric technology, their usage in the security operations, future areas to use them and at the end analyses for finding the strength, weaknesses, opportunities and threats that is called SWOT of biometric Technology .

Authors

Moslem Mohammadi

Faculty member of Islamic Azad University branch Meyandoab

Maryam Shamsadini

Msc. Computer engineering Student in Islamic Azad university of Meyandoab

Ashkan Hassani Karimabad

Msc. Management Information Systems

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Jain, A.K., Prabhakar, S., Hong, L., Pankanti, _ S , ...
  • U.Uludag, S.Pankanti, S.Prabhakar andA.K.Jain, "Biometric cryptosystems: Issue and ...
  • challenges", Proceedings of the IEEE, vol.92, no, (948-960), 2014 ...
  • Vivek K. Singh, Tripathi S. P., R. P. Agarwal and ...
  • F.Han, J.Hu, X.Yu, Feng, Zhou, "A novel hybrid crypto -biometric ...
  • Fridrich, J.:"Symmetric Ciphers Based _ two -dimensional chaotic maps", Int. ...
  • N.Selvaraju, G.Sekar "A Method to Improve the Security Level of ...
  • Zhou, J., Gu, J."A model-based method for the computation of ...
  • Benny Pinkas, "Introduction to Cryptography", February 20, 201 1 ...
  • Biometric Person Authentication Odor "Zhanna Korotkaya _ Lappe enrantaUnives ity ...
  • Face Recognition by Elastic Bunch Graph Matching website, B _ ...
  • e/VDM/re S earch/c omputerVi S i _ n/grap hMatching/i dentific ...
  • An Introduction to Biometric Recognition Anil K. Jain, Fellow, IEEE ...
  • INFRARED ID ENTIF ICATION _ FACES AND BODY PARTS Francine ...
  • Using Gait to Recognize People Jorge Fazenda, David Santos and ...
  • On gait a biometric :progress and prospect Mark S. Nixon, ...
  • http : //www .bayometric , co m/pro ducts/default .html _ ...
  • نمایش کامل مراجع