Vein and Fingerprint Biometrics Authentication- Future Trends

نویسنده

  • HATIM A. ABOALSAMH
چکیده

Biometric signatures, or biometrics, are used to identify individuals by measuring certain unique physical and behavioral characteristics. Individuals must be identified to allow or prohibit access to secure areas—or to enable them to use personal digital devices such as, computer, personal digital assistant (PDA), or mobile phone. Virtually all biometric methods are implemented using the following 1) sensor, to acquire raw biometric data from an individual; 2) feature extraction, to process the acquired data to develop a feature-set that represents the biometric trait; 3) pattern matching, to compare the extracted feature-set against stored templates residing in a database; and 4) decision-making, whereby a user’s claimed identity is authenticated or rejected. In this paper, a compact system that consists of a CMOS fingerprint sensor (FPC1011F1) is used with the FPC2020 power efficient fingerprint processor ; which acts as a biometric sub-system with a direct interface to the sensor as well as to an external flash memory for storing finger print templates. Distinct Area Detection (DAD) algorithm; which is a feature based algorithm is used by the fingerprint processor, which offer improvements in performance. Vein authentication is another recent advancement in biometrics. Vein biometrics is discussed and comparison with other biometrics is revealed. Key-Words: Access control, Vein biometrics, Fingerprint processor, Fingerprint authentication, Biometrics.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Recent Advancements in Biometrics: Vein and Fingerprint Authentication

Biometric signatures, or biometrics, are used to identify individuals by measuring certain unique physical and behavioral characteristics. Individuals must be identified to allow or prohibit access to secure areas—or to enable them to use personal digital devices such as, computer, personal digital assistant (PDA), or mobile phone. Virtually all biometric methods are implemented using the follo...

متن کامل

The Role of Biometrics in Virtual Communities and Digital Governments

This chapter is intended to introduce the role of biometrics in virtual communities and digital governments. Key steps for a biometric system to complete an identification or verification / authentication process are introduced. Main biometric techniques, such as fingerprint recognition, face recognition, iris recognition, and voice recognition, for the security purposes of identification and a...

متن کامل

Hand Vein Detection using Infrared Light for Web based Account

The most common account based password used for authentication is Textual passwords. But Textual passwords are in risk to phishing attack, burette force attack, social engineering and shoulder surfing. Biometrics is used for human recognition which consists of authentication, verification and recognition. Biometric passwords are introduced as alternative techniques to textual passwords. Many bi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010