Benziane et al., 2011 - Google Patents
An introduction to biometricsBenziane et al., 2011
View PDF- Document ID
- 9436966515376032450
- Author
- Benziane S
- Benyettou A
- Publication year
- Publication venue
- International Journal of Computer Science and Information Security
External Links
Snippet
Biometric recognition has been studied over10 years, the biometric use was only limited for the police application's before. During this period, many different problems to the recognition were addressed; when looking to its potential advantages, this technology is now …
- 238000000034 method 0 description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hammad et al. | Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint | |
Unar et al. | A review of biometric technology along with trends and prospects | |
Vielhauer | Biometric user authentication for IT security: from fundamentals to handwriting | |
Awad et al. | Impact of some biometric modalities on forensic science | |
Jain et al. | Fingerprint recognition | |
Socheat et al. | Fingerprint enhancement, minutiae extraction and matching techniques | |
Deriche | Trends and challenges in mono and multi biometrics | |
Benziane et al. | An introduction to biometrics | |
Choudhary | Survey of different biometrics techniques | |
Chowhan et al. | Iris biometrics recognition application in security management | |
Herbadji et al. | Personal authentication based on wrist and palm vein images | |
Chaudhari et al. | The historical development of biometric authentication techniques: a recent overview | |
Kalsoom et al. | Iris recognition: existing methods and open issues | |
Abdulla et al. | Exploring human biometrics: A focus on security concerns and deep neural networks | |
Orike et al. | A gender and ethnicity identification system in Nigeria using the fingerprint technology | |
Mitica-Valentin et al. | Biometric security: Recognition according to the pattern of palm veins | |
Hamaamin et al. | Biometric systems: A comprehensive review | |
Gupta | Advances in multi modal biometric systems: a brief review | |
Vaidya et al. | Detection of Palmer Creases From Hand Images Using Deep Learning | |
Barde et al. | Classification of biometrics and implementation strategies | |
Sharma et al. | On Performance Analysis of Biometric Methods for Secure Human Recognition | |
Mohammed et al. | Human biometric identification: Application and evaluation | |
Bakshe et al. | Hand geometry techniques: a review | |
Chhabra et al. | Biometrics–Unique Identity Verification System | |
Ghorbani et al. | An Investigative Review of Human Authentication Based on Fingerprint |