Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/11658
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kataria, Atul N. | |
dc.contributor.author | Adhyaru, D. M. | |
dc.contributor.author | Sharma, Ankit | |
dc.contributor.author | Zaveri, Tanish | |
dc.date.accessioned | 2023-04-20T11:06:40Z | - |
dc.date.available | 2023-04-20T11:06:40Z | - |
dc.date.issued | 2013-11-28 | |
dc.identifier.citation | 4th International Conference on Current Trends in Technology, NUiCONE - 2013, Institute of Technology, Nirma University, November 28 – 30, 2013 | en_US |
dc.identifier.uri | http://10.1.7.181:1900/jspui/123456789/4381 | |
dc.identifier.uri | http://10.1.7.192:80/jspui/handle/123456789/11658 | - |
dc.description.abstract | Biometric authentication refers to the automatic identification of a person by analyzing their physiological and/or behavioral characteristics or traits. Since many physiological and behavioral characteristics are unique to an individual, biometrics provides a more reliable system of authentication than ID cards, keys, passwords, or other traditional systems. A wide variety of organizations are using automated person authentication systems to improve customer satisfaction, operating efficiency as well as to secure critical resources. Now a day an increasing number of countries including India have decided to adopt biometric systems for national security and identity theft prevention, which makes biometrics an important component in securityrelated applications such as: logical and physical access control, forensic investigation, IT security, identity fraud protection, and terrorist prevention or detection. Various biometric authentication techniques are available for identifying an individual by measuring fingerprint, hand, face, signature, voice or a combination of these traits. New biometric algorithms and technologies are proposed, tested, reviewed, and implemented every year. This paper aims to give a brief overview of the field of biometrics and summarize various biometric authentication techniques including its strengths and limitations. | en_US |
dc.publisher | Institute of Technology, Nirma University & IEEE | en_US |
dc.relation.ispartofseries | ITFIC002-15 | en_US |
dc.subject | Biometrics | en_US |
dc.subject | Identification | en_US |
dc.subject | Verification | en_US |
dc.subject | Universal Identification Program | en_US |
dc.subject | IC Faculty Paper | en_US |
dc.subject | Faculty Paper | en_US |
dc.subject | ITFIC002 | en_US |
dc.subject | ITFIC016 | en_US |
dc.subject | ITFEC008 | en_US |
dc.title | A Survey of Automated Biometric Authentication Techniques | en_US |
dc.type | Faculty Papers | en_US |
Appears in Collections: | Faculty Papers, E&I |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ITFIC002-15.pdf | ITFIC002-15 | 167.96 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.