Communication and Information Technology Report on RFID and Biometrics
VerifiedAdded on 2022/08/13
|13
|2808
|22
Report
AI Summary
This report delves into the realms of Communication and Information Technology, focusing on Radio-Frequency Identification Devices (RFID) and Biometrics. It explores the Identification Friend-or-Foe (IFF) systems, Electronic Product Code (EPC), and various RFID architectures and applications, including post-point-of-sale and human implantation scenarios. The report further examines biometrics, covering diverse forms of biometric data such as iris recognition, facial biometrics, and gait analysis. It details validation and identification methods, the types of biometric measurements, and ethical issues associated with these technologies. The report also touches upon the applications of biometric measurements, including discussions on the theft of biometric data and methods to prevent it. The content provides a detailed overview of both RFID and biometrics, their applications, and their impact on various sectors.

Running head: COMMUNICATION AND INFORMATION TECHNOLOGY
Communication and Information Technology
Name of the Student
Name of the University
Author note
Communication and Information Technology
Name of the Student
Name of the University
Author note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1COMMUNICATION AND INFORMATION TECHNOLOGY
Table of Contents
Unit 3: Radio-Frequency Identification Devices.............................................................................2
3.1 Understanding of Identification Friend-or-Foe Systems.......................................................2
3.2 Spy on the Wall.....................................................................................................................2
3.3 Electronic Product Code (EPC).............................................................................................2
3.4 RFID Architectures................................................................................................................3
3.5 RFID Applications: Post Point of Sale..................................................................................4
3.6 RFID Applications: Human Implantation.............................................................................4
3.7 RFID Applications: Use of HIMs in the Workplace.............................................................4
Unit 4: Biometrics............................................................................................................................5
4.1 Forms of Biometric Data.......................................................................................................5
4.2 Validation and Identification.................................................................................................5
4.3 Types of Biometric Measurement.........................................................................................6
4.4 Overview of Biometric Measurements..................................................................................7
4.5 Facial biometrics....................................................................................................................7
4.6 Iris and retina biometrics.......................................................................................................8
4.7 Gait biometric........................................................................................................................8
4.8 Voice biometric.....................................................................................................................8
4.9 BNA biometric.......................................................................................................................9
4.10 Biometrics and Ethical Issues..............................................................................................9
References......................................................................................................................................11
Table of Contents
Unit 3: Radio-Frequency Identification Devices.............................................................................2
3.1 Understanding of Identification Friend-or-Foe Systems.......................................................2
3.2 Spy on the Wall.....................................................................................................................2
3.3 Electronic Product Code (EPC).............................................................................................2
3.4 RFID Architectures................................................................................................................3
3.5 RFID Applications: Post Point of Sale..................................................................................4
3.6 RFID Applications: Human Implantation.............................................................................4
3.7 RFID Applications: Use of HIMs in the Workplace.............................................................4
Unit 4: Biometrics............................................................................................................................5
4.1 Forms of Biometric Data.......................................................................................................5
4.2 Validation and Identification.................................................................................................5
4.3 Types of Biometric Measurement.........................................................................................6
4.4 Overview of Biometric Measurements..................................................................................7
4.5 Facial biometrics....................................................................................................................7
4.6 Iris and retina biometrics.......................................................................................................8
4.7 Gait biometric........................................................................................................................8
4.8 Voice biometric.....................................................................................................................8
4.9 BNA biometric.......................................................................................................................9
4.10 Biometrics and Ethical Issues..............................................................................................9
References......................................................................................................................................11

2COMMUNICATION AND INFORMATION TECHNOLOGY
Unit 3: Radio-Frequency Identification Devices
3.1 Understanding of Identification Friend-or-Foe Systems
The Identification Friend-or-Foe (IFF) systems are defined as a secure system for aircraft
identification, which is able to detect and measure differences between the hostile and friendly
aircrafts. The IFF systems make use of RFID and electromagnetic devices for communicating
with the aircrafts and identifying of various forces within the airspace (Svyd et al. 2019). These
systems are considered as a two-channel system that employs the 1030 MHz band, which is
responsible for interrogating signals. The 1090 MHz band is further used for response signals.
3.2 Spy on the Wall
The RFID systems, which are considered as similar to FM radio waves have the
capability of penetrating through doors, walls, clothes and other materials. With the proper form
of RFID reader, the user would be able to trigger the interrogation capability within the RGID
tag within ePassports, library cards, credit cards, enhanced driver licenses and many others
(McIntyre, Michael and Albrecht 2015). In this way, the RFID devices could be used as a spy
tool for viewing across certain objects and extract information.
3.3 Electronic Product Code (EPC)
The EPC is defined as a universal identifier, which aims at providing an unique identity
to some specific physical object. The identity provided by EPC is considered to be unique for
every physical object and every category of physical objects. The EPCs are encoded with RFID
tags and thus it helps in easy tracking of all forms of objects that includes documents, fixed
assets and reusable transport items (Toyoda et al. 2017). It is thus designed in accordance to a
Unit 3: Radio-Frequency Identification Devices
3.1 Understanding of Identification Friend-or-Foe Systems
The Identification Friend-or-Foe (IFF) systems are defined as a secure system for aircraft
identification, which is able to detect and measure differences between the hostile and friendly
aircrafts. The IFF systems make use of RFID and electromagnetic devices for communicating
with the aircrafts and identifying of various forces within the airspace (Svyd et al. 2019). These
systems are considered as a two-channel system that employs the 1030 MHz band, which is
responsible for interrogating signals. The 1090 MHz band is further used for response signals.
3.2 Spy on the Wall
The RFID systems, which are considered as similar to FM radio waves have the
capability of penetrating through doors, walls, clothes and other materials. With the proper form
of RFID reader, the user would be able to trigger the interrogation capability within the RGID
tag within ePassports, library cards, credit cards, enhanced driver licenses and many others
(McIntyre, Michael and Albrecht 2015). In this way, the RFID devices could be used as a spy
tool for viewing across certain objects and extract information.
3.3 Electronic Product Code (EPC)
The EPC is defined as a universal identifier, which aims at providing an unique identity
to some specific physical object. The identity provided by EPC is considered to be unique for
every physical object and every category of physical objects. The EPCs are encoded with RFID
tags and thus it helps in easy tracking of all forms of objects that includes documents, fixed
assets and reusable transport items (Toyoda et al. 2017). It is thus designed in accordance to a
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3COMMUNICATION AND INFORMATION TECHNOLOGY
flexible framework, which could support many kinds of coding schemes including the current
use of barcode technology.
3.4 RFID Architectures
The RF communication primarily occurs with the transference of data created by
electromagnetic waves. With the generation of electromagnetic waves created at the source, the
effect could be further received at a far distance from the source based on the identification.
The RFID system comprises of three components:
1. RFID transponder or tag
2. RFID transceiver or reader
3. Data processing subsystem
The RFID tag comprises of wireless transducer, encapsulating materials and an antenna.
The tags could be either passive or active in nature.
The RFID comprises of antenna, decider and transceiver. They would be responsible for
sending periodic form of signals based on inquiring whether any tag would remain in the vicinity
of the signal. After the receiving of signal, the information would be passed on to the data
processor.
The data processing subsystem helps in supporting and providing a way of storing and
processing over the data.
flexible framework, which could support many kinds of coding schemes including the current
use of barcode technology.
3.4 RFID Architectures
The RF communication primarily occurs with the transference of data created by
electromagnetic waves. With the generation of electromagnetic waves created at the source, the
effect could be further received at a far distance from the source based on the identification.
The RFID system comprises of three components:
1. RFID transponder or tag
2. RFID transceiver or reader
3. Data processing subsystem
The RFID tag comprises of wireless transducer, encapsulating materials and an antenna.
The tags could be either passive or active in nature.
The RFID comprises of antenna, decider and transceiver. They would be responsible for
sending periodic form of signals based on inquiring whether any tag would remain in the vicinity
of the signal. After the receiving of signal, the information would be passed on to the data
processor.
The data processing subsystem helps in supporting and providing a way of storing and
processing over the data.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4COMMUNICATION AND INFORMATION TECHNOLOGY
3.5 RFID Applications: Post Point of Sale
The RFID applications, which include the RFID reader, would help retailers beyond the
POS based on interrogating customers based on the RFID tags that would be fitted within the
objects (Novotny, Dávid and Csáfor 2015). This would further help in the management of the
inventory and maintain the purchase process with a high expertise.
3.6 RFID Applications: Human Implantation
Implantable RFID devices are defined as a technology, which determines the remote
identification of persons or animals (Chouhan and Halonen 2015). The RFID technology used
for human implants is dependent on battery-less devices and thus is mainly used for achieving
readings from a short range of 10 cm or event less.
3.7 RFID Applications: Use of HIMs in the Workplace
Utilization of RFID application in HIM that would be applied in the workplace would
help for improving towards the quality of healthcare and improving the safety of patients. The
use of RFID technology would also majorly help towards improving and transforming the
opportunities based within the healthcare sector.
3.5 RFID Applications: Post Point of Sale
The RFID applications, which include the RFID reader, would help retailers beyond the
POS based on interrogating customers based on the RFID tags that would be fitted within the
objects (Novotny, Dávid and Csáfor 2015). This would further help in the management of the
inventory and maintain the purchase process with a high expertise.
3.6 RFID Applications: Human Implantation
Implantable RFID devices are defined as a technology, which determines the remote
identification of persons or animals (Chouhan and Halonen 2015). The RFID technology used
for human implants is dependent on battery-less devices and thus is mainly used for achieving
readings from a short range of 10 cm or event less.
3.7 RFID Applications: Use of HIMs in the Workplace
Utilization of RFID application in HIM that would be applied in the workplace would
help for improving towards the quality of healthcare and improving the safety of patients. The
use of RFID technology would also majorly help towards improving and transforming the
opportunities based within the healthcare sector.

5COMMUNICATION AND INFORMATION TECHNOLOGY
Unit 4: Biometrics
4.1 Forms of Biometric Data
The forms of biometric data that have been provided are discussed as:
1. Iris Recognition – This is defined as the use of the features that would be unique in
the iris and would be able to identify an individual based on those unique features.
2. Retina Recognition – In this type of recognition feature, the patterns present in the
veins at the back section of eye would be used for the purpose of accomplishment of recognition
(Karimian, Wortman and Tehranipoor 2016).
3. Face Recognition – An analysis over the facial patterns or features based on
recognition or authentication of the identity of the individual.
4. Fingerprint Recognition – In this biometric data, the valleys and ridges that would be
found on the surface or tips of a human finger based on the identification of an individual.
5. Hand Geometry Recognition – This data relates to the geometric features of the
human hand that includes the finger length and hand width based on identification of an
individual.
4.2 Validation and Identification
1. In case of the airport, it can be discussed that staff should decrease the threshold value
(t) based on increasing the performance of the system and thus bringing efficiency towards
reduction of delay rates. Minimum form of input in the threshold value would have a high impact
Unit 4: Biometrics
4.1 Forms of Biometric Data
The forms of biometric data that have been provided are discussed as:
1. Iris Recognition – This is defined as the use of the features that would be unique in
the iris and would be able to identify an individual based on those unique features.
2. Retina Recognition – In this type of recognition feature, the patterns present in the
veins at the back section of eye would be used for the purpose of accomplishment of recognition
(Karimian, Wortman and Tehranipoor 2016).
3. Face Recognition – An analysis over the facial patterns or features based on
recognition or authentication of the identity of the individual.
4. Fingerprint Recognition – In this biometric data, the valleys and ridges that would be
found on the surface or tips of a human finger based on the identification of an individual.
5. Hand Geometry Recognition – This data relates to the geometric features of the
human hand that includes the finger length and hand width based on identification of an
individual.
4.2 Validation and Identification
1. In case of the airport, it can be discussed that staff should decrease the threshold value
(t) based on increasing the performance of the system and thus bringing efficiency towards
reduction of delay rates. Minimum form of input in the threshold value would have a high impact
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6COMMUNICATION AND INFORMATION TECHNOLOGY
on the FMR as it would be able to accurately match the travellers in accordance to their
passports.
2. The hidden risks posed by biometric identifiers are:
a. Reliability of biometric and the perception of people over the use of biometric systems.
b. Unlike other technologies, biometric systems would also be risked to technical failures.
c. Gaining access to user data through biometric data without the consent of the users
(Keenan and FCIPS 2015).
In order to avoid the posed risks due to biometric systems, some of the techniques of
avoiding them are:
1. The organizations should revise their data retention policies and make the people
aware of the same.
2. It should also be checked by these organizations whether any data should be collected
anonymously or would not be at all collected (Kudu, Student and Karamchandani 2016).
3. Each of the new technologies based on biometrics should be checked properly and
ensured that the benefits would be able to outweigh the risks.
4.3 Types of Biometric Measurement
1. The possible ramifications of theft of biometric data from schools are:
a. Breach of data would lead hackers to get all possible details of the students and might
pose threats to their data and career.
on the FMR as it would be able to accurately match the travellers in accordance to their
passports.
2. The hidden risks posed by biometric identifiers are:
a. Reliability of biometric and the perception of people over the use of biometric systems.
b. Unlike other technologies, biometric systems would also be risked to technical failures.
c. Gaining access to user data through biometric data without the consent of the users
(Keenan and FCIPS 2015).
In order to avoid the posed risks due to biometric systems, some of the techniques of
avoiding them are:
1. The organizations should revise their data retention policies and make the people
aware of the same.
2. It should also be checked by these organizations whether any data should be collected
anonymously or would not be at all collected (Kudu, Student and Karamchandani 2016).
3. Each of the new technologies based on biometrics should be checked properly and
ensured that the benefits would be able to outweigh the risks.
4.3 Types of Biometric Measurement
1. The possible ramifications of theft of biometric data from schools are:
a. Breach of data would lead hackers to get all possible details of the students and might
pose threats to their data and career.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7COMMUNICATION AND INFORMATION TECHNOLOGY
b. Stealing of one aspect of the identity of the student would lead to serious implications
over the replication of data to other sources.
The stealing or replication of the data associated with students would have an impact over
the later life. This would lead to tremendous impact over the educational career of students as
their data could be used by attackers to pose threats in terms of monetary or professional aspects.
2. The schools should take the consent of parents before the collection of biometric data
from the children. This would help in stopping frauds from taking place and thus ensuring
security within the data captured from the students.
4.4 Overview of Biometric Measurements
1. The techniques that could be used for thwarting applications in which fingerprint
scanners are primarily used for biometric validation are:
a. Use of iris recognition techniques could be used in smartphones or laptops based on
detecting the identity of an individual (Slanzi, Pizarro and Velásquez 2017).
b. Face recognition techniques could also be used for the prevention from fingerprint
scanners employed for biometric validation.
2. From the discussion over the case of theft of Mercedes S-class car in 2005, it can be
discussed that the amputating of fingers for thwarting security systems would be considered as a
serious issue (News.bbc.co.uk 2020). Other frameworks for security should be embedded for the
security of the cars, which might include iris recognition based on preventing the risks posed to
individuals.
b. Stealing of one aspect of the identity of the student would lead to serious implications
over the replication of data to other sources.
The stealing or replication of the data associated with students would have an impact over
the later life. This would lead to tremendous impact over the educational career of students as
their data could be used by attackers to pose threats in terms of monetary or professional aspects.
2. The schools should take the consent of parents before the collection of biometric data
from the children. This would help in stopping frauds from taking place and thus ensuring
security within the data captured from the students.
4.4 Overview of Biometric Measurements
1. The techniques that could be used for thwarting applications in which fingerprint
scanners are primarily used for biometric validation are:
a. Use of iris recognition techniques could be used in smartphones or laptops based on
detecting the identity of an individual (Slanzi, Pizarro and Velásquez 2017).
b. Face recognition techniques could also be used for the prevention from fingerprint
scanners employed for biometric validation.
2. From the discussion over the case of theft of Mercedes S-class car in 2005, it can be
discussed that the amputating of fingers for thwarting security systems would be considered as a
serious issue (News.bbc.co.uk 2020). Other frameworks for security should be embedded for the
security of the cars, which might include iris recognition based on preventing the risks posed to
individuals.

8COMMUNICATION AND INFORMATION TECHNOLOGY
4.5 Facial biometrics
1. The ‘Hyperface’ project can be defined as useful as it deals with the printing of
deceitful patterns on textiles and attires, which would further be rendered on the user face and
making it illegible towards surveillance systems (d'Azevedo and Fernandes 2015). This method
helps in dodging of facial recognition techniques.
2. The use of CCTV tool can be discussed as a powerful form of investigative tool for
detection of any kind of crime activities. The CCTV tool relates to public safety as it helps in
monitoring the flow of people and further aids in investigation of complaints against and facility
staff (Donald and Donald 2015). The modern cameras installed in CCTV provide high resolution
images and thus helps in tracking a person and capturing their movements and activities.
4.6 Iris and retina biometrics
A biometric identifier, which is also known as retinal scan could be used for mapping of
unique patterns found within the retina of a person. On the other hand, iris recognition makes use
of camera technology in addition to infrared illumination based on acquiring images of the
various intricate structures within the iris.
4.7 Gait biometric
The gait biometric technique would help in the acquisition of images based on the
portrayal of the gait of an individual and this action could be performed in various public areas.
4.8 Voice biometric
The voice biometric techniques applies analysis techniques over the voice of a person
based on verification over their identity. This form of technology is primarily used in virtual
4.5 Facial biometrics
1. The ‘Hyperface’ project can be defined as useful as it deals with the printing of
deceitful patterns on textiles and attires, which would further be rendered on the user face and
making it illegible towards surveillance systems (d'Azevedo and Fernandes 2015). This method
helps in dodging of facial recognition techniques.
2. The use of CCTV tool can be discussed as a powerful form of investigative tool for
detection of any kind of crime activities. The CCTV tool relates to public safety as it helps in
monitoring the flow of people and further aids in investigation of complaints against and facility
staff (Donald and Donald 2015). The modern cameras installed in CCTV provide high resolution
images and thus helps in tracking a person and capturing their movements and activities.
4.6 Iris and retina biometrics
A biometric identifier, which is also known as retinal scan could be used for mapping of
unique patterns found within the retina of a person. On the other hand, iris recognition makes use
of camera technology in addition to infrared illumination based on acquiring images of the
various intricate structures within the iris.
4.7 Gait biometric
The gait biometric technique would help in the acquisition of images based on the
portrayal of the gait of an individual and this action could be performed in various public areas.
4.8 Voice biometric
The voice biometric techniques applies analysis techniques over the voice of a person
based on verification over their identity. This form of technology is primarily used in virtual
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9COMMUNICATION AND INFORMATION TECHNOLOGY
assistant such as Alexa or Siri, while it could also be used in different speech-to-text
applications.
4.9 BNA biometric
One of the situations in which information derived from DNA could be beneficial for an
individual are:
1. It helps in supporting essential information on relation to solving critical problems
based on determining the identity of individual from another individual.
2. This data could be uploaded on various open source platforms for future use in medical
areas.
3. It could be used for building DNA databases for securing their identity within a
country.
The situations in which the DNA would lead to disadvantageous for an individual are:
1. It could lead towards discrimination of an individual by insurance companies and
employers.
2. Revealing of family and health information could lead to tremendous implications aras
they would be considered as data breach.
4.10 Biometrics and Ethical Issues
1. The merits of validation systems based on either a biometric identifier or traditional
password are:
a. It leads to improved security for an individual.
assistant such as Alexa or Siri, while it could also be used in different speech-to-text
applications.
4.9 BNA biometric
One of the situations in which information derived from DNA could be beneficial for an
individual are:
1. It helps in supporting essential information on relation to solving critical problems
based on determining the identity of individual from another individual.
2. This data could be uploaded on various open source platforms for future use in medical
areas.
3. It could be used for building DNA databases for securing their identity within a
country.
The situations in which the DNA would lead to disadvantageous for an individual are:
1. It could lead towards discrimination of an individual by insurance companies and
employers.
2. Revealing of family and health information could lead to tremendous implications aras
they would be considered as data breach.
4.10 Biometrics and Ethical Issues
1. The merits of validation systems based on either a biometric identifier or traditional
password are:
a. It leads to improved security for an individual.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10COMMUNICATION AND INFORMATION TECHNOLOGY
b. It enhances the customer experience (Dantcheva, Elia and Ross 2015).
c. It leads to reduced forms of operational costs.
A system that makes use of eight-character password would comprise of lowercase and
uppercase characters. During a brute force attack, hackers would generally make use of
computing powers that would be similar to supercomputers in which they would be able to hack
any form of weak passwords (Salamatian et al. 2019). Hence, with such form of supercomputing
power, they would be able to perform calculation for 109 combinations per second and thus all
the combinations would be tested in within 22 seconds leading to a successful attack.
2. The key issues in relation to the potential impact of biometrics over the personal
privacies are:
a. Many ethical concerns in relation to data privacy over individuals have been reported.
Most companies are capturing biometric data without the concern over their privacy.
b. The purpose of collection of information based on biometrics are not specified to
individuals and thus it leads to complaints raised against companies during situations of data
breach.
b. It enhances the customer experience (Dantcheva, Elia and Ross 2015).
c. It leads to reduced forms of operational costs.
A system that makes use of eight-character password would comprise of lowercase and
uppercase characters. During a brute force attack, hackers would generally make use of
computing powers that would be similar to supercomputers in which they would be able to hack
any form of weak passwords (Salamatian et al. 2019). Hence, with such form of supercomputing
power, they would be able to perform calculation for 109 combinations per second and thus all
the combinations would be tested in within 22 seconds leading to a successful attack.
2. The key issues in relation to the potential impact of biometrics over the personal
privacies are:
a. Many ethical concerns in relation to data privacy over individuals have been reported.
Most companies are capturing biometric data without the concern over their privacy.
b. The purpose of collection of information based on biometrics are not specified to
individuals and thus it leads to complaints raised against companies during situations of data
breach.

11COMMUNICATION AND INFORMATION TECHNOLOGY
References
Chouhan, S.S. and Halonen, K., 2015. Threshold voltage compensation scheme for RF-to-DC
converter used in RFID applications. Electronics Letters, 51(12), pp.892-894.
Dantcheva, A., Elia, P. and Ross, A., 2015. What else does your biometric data reveal? A survey
on soft biometrics. IEEE Transactions on Information Forensics and Security, 11(3), pp.441-
467.
d'Azevedo, A.B. and Fernandes, M.E., 2015. Classification of the regular oriented hypermaps
with prime number of hyperfaces. ARS MATHEMATICA CONTEMPORANEA, 10(1), pp.193-
209.
Donald, F.M. and Donald, C.H., 2015. Task disengagement and implications for vigilance
performance in CCTV surveillance. Cognition, Technology & Work, 17(1), pp.121-130.
Karimian, N., Wortman, P.A. and Tehranipoor, F., 2016, October. Evolving authentication
design considerations for the internet of biometric things (IoBT). In Proceedings of the Eleventh
IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System
Synthesis (pp. 1-10).
Keenan, T.P. and FCIPS, I., 2015. Hidden Risks of Biometric Identifiers and How to Avoid
Them. BlackHat USA.
Kudu, N., Student, M.E. and Karamchandani, S., 2016, March. Biometric identification system
using fingerprint and knuckle as multimodality features. In 2016 International Conference on
Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 3279-3284). IEEE.
References
Chouhan, S.S. and Halonen, K., 2015. Threshold voltage compensation scheme for RF-to-DC
converter used in RFID applications. Electronics Letters, 51(12), pp.892-894.
Dantcheva, A., Elia, P. and Ross, A., 2015. What else does your biometric data reveal? A survey
on soft biometrics. IEEE Transactions on Information Forensics and Security, 11(3), pp.441-
467.
d'Azevedo, A.B. and Fernandes, M.E., 2015. Classification of the regular oriented hypermaps
with prime number of hyperfaces. ARS MATHEMATICA CONTEMPORANEA, 10(1), pp.193-
209.
Donald, F.M. and Donald, C.H., 2015. Task disengagement and implications for vigilance
performance in CCTV surveillance. Cognition, Technology & Work, 17(1), pp.121-130.
Karimian, N., Wortman, P.A. and Tehranipoor, F., 2016, October. Evolving authentication
design considerations for the internet of biometric things (IoBT). In Proceedings of the Eleventh
IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System
Synthesis (pp. 1-10).
Keenan, T.P. and FCIPS, I., 2015. Hidden Risks of Biometric Identifiers and How to Avoid
Them. BlackHat USA.
Kudu, N., Student, M.E. and Karamchandani, S., 2016, March. Biometric identification system
using fingerprint and knuckle as multimodality features. In 2016 International Conference on
Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 3279-3284). IEEE.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





