Human Authentication Using Biometric Recognition

Abstract

Authentication is the primary requirement for any system by means of privacy & security. Physiological biometrics is based on direct measurements of a part of the human body, such as finger-scan, facial scan, iris-scan, hand-scan, and retina-scan. Behavioral biometrics is based on measurements and data derived from an action and therefore indirectly measure characteristics of the human body, such as voice-scan and signature-scan. The element of time is essential to behavioral biometrics because it may change with time. In this paper the discussion is made on various aspects for designing a biometric recognition system for human authentication and related topics to the particular feature of biometric parameter.

Authors and Affiliations

Shailendra Kumar Dewangan

Keywords

Related Articles

Spectral Subtraction for Speech Enhancement and Compression Using LPC 

Pre-Processing of Speech Signal is very crucial in the applications where silence or background noise is completely undesirable. The degradation of speech due to the presence of noise causes severe difficulties in variou...

An Approach of Zero Correlation Linear Cryptanalysis

Differential and Linear Cryptanalysis are two most popular techniques that have been widely used to attacks block ciphers to reveal its weakness in substitution and permutation network. Most of the block ciphers which ar...

EXTRACT THE PUNJABI WORD WITH EDGE DETECTOR FROM MACHINE PRINTED DOCUMENT IMAGES

Optical character recognition is the essential area of research in the world. Text segmentation and extraction is an important task under the OCR System. OCR system depends on the quality of the input document and type o...

Optimistic Rough Sets Attribute Reduction using Dynamic Programming

Nowadays, and with the current progress in technologies and business sales, databases with large amount of data exist especially in Retail Companies. The main objective of this study is to reduce the complexity of the cl...

DIVERSE ROUTING IN NETWORKS WITHOUT DISJOINTNESS CONSTRAINT USING PROBABILISTIC FAILURES

To develop a various routing theme for coping with multiple, presumably related to failures. Isolated single link failures is effectively restrained disjoint path protection, however mechanisms for sick from multiple fai...

Download PDF file
  • EP ID EP148160
  • DOI -
  • Views 146
  • Downloads 0

How To Cite

Shailendra Kumar Dewangan (2015). Human Authentication Using Biometric Recognition. International Journal of Computer Science & Engineering Technology, 6(4), 240-245. https://europub.co.uk/articles/-A-148160