ITC595 Biometrics Research Project: Security and Privacy Implications
VerifiedAdded on 2025/05/02
|7
|2425
|362
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

ITC595 Research Project (Biometrics for
Authentication: Security and Privacy
Implications)
Keywords: Biometric sensor, Privacy,
Fingerprint scanner
Abstract
According to the study, biometric
technology is the next generation of
technology based on providing access and
authentications. This technology is now
growing every day, also is not limited to
organization and offices where employees
data can assess through fingerprint. It is also
now used in mobile phones as well. This
technology has some issues related to
authentication when the data is comprised
the user would not able to change it,
therefore, it might also result in theft of
identity.
Introduction
Biometric for authentication is now growing
day by day, it can provide the authentication
and providing access to the user for the
better security of the data. This is not just
limited to the organization and offices but
also biometric technology is now widely
used in a mobile phone as well where user
can sign in through their fingerprint [4].
Based on the information security, it is
required to the proof the person, which can
assess the information and authorized to use
it. In one of the study, the major priorities in
the world of information security are
required an individual user who is assessing
sensitive information, classified and
confidential information to protect the
information through the technology so that
only user can assess his information.
Biometric authentication is the technology
or process, which is based on the individual
person to verify his authenticity. Basically,
the process of biometric is easy to user, the
user needs to store his fingerprint and the
data of the user is stored after that when the
user wants to see the security it required his
fingerprint to access the information,
therefore the user can access his data.
Security is the main aim in the world, better
security can make your life better can secure
nobody can access the data.
Literature review
Overview
Biometric authentication is the technology
which is used in many organization, offices,
school, colleges’ etcetera. Basically
biometric is the technology which can
analyze, identify and measure an
individual's behavioural and physical
characteristics. Biometric can be defined as
each human being has his own identity such
as fingerprint, the colour of hair and colour
of iris, tone and speech. Biometric can
identify and verify a person. Also, it makes
the system safe from unethical hacking [3].
Biometric system works has the recognition
system followed by these points:
Identification (one-to-many)
Verification (one-to-one)
There are many points to be considered
while doing the biometric for authentication:
Registration stage
Authentication stage
Authentication: Security and Privacy
Implications)
Keywords: Biometric sensor, Privacy,
Fingerprint scanner
Abstract
According to the study, biometric
technology is the next generation of
technology based on providing access and
authentications. This technology is now
growing every day, also is not limited to
organization and offices where employees
data can assess through fingerprint. It is also
now used in mobile phones as well. This
technology has some issues related to
authentication when the data is comprised
the user would not able to change it,
therefore, it might also result in theft of
identity.
Introduction
Biometric for authentication is now growing
day by day, it can provide the authentication
and providing access to the user for the
better security of the data. This is not just
limited to the organization and offices but
also biometric technology is now widely
used in a mobile phone as well where user
can sign in through their fingerprint [4].
Based on the information security, it is
required to the proof the person, which can
assess the information and authorized to use
it. In one of the study, the major priorities in
the world of information security are
required an individual user who is assessing
sensitive information, classified and
confidential information to protect the
information through the technology so that
only user can assess his information.
Biometric authentication is the technology
or process, which is based on the individual
person to verify his authenticity. Basically,
the process of biometric is easy to user, the
user needs to store his fingerprint and the
data of the user is stored after that when the
user wants to see the security it required his
fingerprint to access the information,
therefore the user can access his data.
Security is the main aim in the world, better
security can make your life better can secure
nobody can access the data.
Literature review
Overview
Biometric authentication is the technology
which is used in many organization, offices,
school, colleges’ etcetera. Basically
biometric is the technology which can
analyze, identify and measure an
individual's behavioural and physical
characteristics. Biometric can be defined as
each human being has his own identity such
as fingerprint, the colour of hair and colour
of iris, tone and speech. Biometric can
identify and verify a person. Also, it makes
the system safe from unethical hacking [3].
Biometric system works has the recognition
system followed by these points:
Identification (one-to-many)
Verification (one-to-one)
There are many points to be considered
while doing the biometric for authentication:
Registration stage
Authentication stage
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Performance matrix
Factors to be considered while selecting
a biometric
Relevant technologies and applications
Biometric technology based on
authentication is used to provide privacy and
security in the organization and offices. The
related biometric technology is Iris
recognition, face detection, fingerprint
scanner, body scanner etcetera. These are
the technologies where biometric
authentication can implement in this area.
Most of the organization used a fingerprint
scanner to access the information of the
user. Biometric is the safer and secure
technology because it required the user must
be present who is going to access the
information otherwise it will not be able to
use the information. This is the reason;
biometric has better security and privacy [6].
The application of the biometric
authentication is followed:
Access control
Time and attendance management
Surveillance
Face recognition for surveillance
Challenges and problem in the area
The main challenges with the recent
technology are it violates the right to privacy
and anonymity according to objectifying the
human body.
Biometric authentication occurs the problem
when recognition has many problems such
as face rotation or variation in pose,
variation in lighting conditions, collusion
problem when a person wearing scrap, eye,
hat and glasses etcetera. Therefore the
various facial expression decreases the
performance of the system research that is
needed to focus to provide and develop a
reliable and robust recognition system.
The main problem in biometric
authentication is followed as:
Fake body parts
False reject rate
False accept rate
Non-reproducibility
Bit-replay
Discussing areas/issues that you believe
have been addressed in the current
literature;
This study shows the issue should be
mentioned in the current literature. The issue
with the current literature is to shows with
the overcome the issue in the biometric
authentication. It focused on the issue of the
fingerprint. Basically, it works namely with
the loop, arch and whorl. When pressing the
finger it must be of series of dark and white
lines. The recognition rate occurs fingerprint
based on biometric recognition occur an
authentication problem when the finger is
wrinkled and wet. The issue of wrinkled and
wet shows the performance is not well
addressed of the biometric system.
Face recognition is part of biometric
authentication. It also plays an important
role in authentication to access the data.
Basically is captured the face through face
capacity camera is scanned to match with
the stored information. It occurs the problem
Factors to be considered while selecting
a biometric
Relevant technologies and applications
Biometric technology based on
authentication is used to provide privacy and
security in the organization and offices. The
related biometric technology is Iris
recognition, face detection, fingerprint
scanner, body scanner etcetera. These are
the technologies where biometric
authentication can implement in this area.
Most of the organization used a fingerprint
scanner to access the information of the
user. Biometric is the safer and secure
technology because it required the user must
be present who is going to access the
information otherwise it will not be able to
use the information. This is the reason;
biometric has better security and privacy [6].
The application of the biometric
authentication is followed:
Access control
Time and attendance management
Surveillance
Face recognition for surveillance
Challenges and problem in the area
The main challenges with the recent
technology are it violates the right to privacy
and anonymity according to objectifying the
human body.
Biometric authentication occurs the problem
when recognition has many problems such
as face rotation or variation in pose,
variation in lighting conditions, collusion
problem when a person wearing scrap, eye,
hat and glasses etcetera. Therefore the
various facial expression decreases the
performance of the system research that is
needed to focus to provide and develop a
reliable and robust recognition system.
The main problem in biometric
authentication is followed as:
Fake body parts
False reject rate
False accept rate
Non-reproducibility
Bit-replay
Discussing areas/issues that you believe
have been addressed in the current
literature;
This study shows the issue should be
mentioned in the current literature. The issue
with the current literature is to shows with
the overcome the issue in the biometric
authentication. It focused on the issue of the
fingerprint. Basically, it works namely with
the loop, arch and whorl. When pressing the
finger it must be of series of dark and white
lines. The recognition rate occurs fingerprint
based on biometric recognition occur an
authentication problem when the finger is
wrinkled and wet. The issue of wrinkled and
wet shows the performance is not well
addressed of the biometric system.
Face recognition is part of biometric
authentication. It also plays an important
role in authentication to access the data.
Basically is captured the face through face
capacity camera is scanned to match with
the stored information. It occurs the problem

in face recognition such as face rotation,
wearing collusion occurs problem by scrap,
hat, glasses etcetera [2].
The current literature of the research is to
provide better security for better
authentication to the user so that it can
assess the information or data securely. This
research mainly focused on face recognition
and fingerprint scanner. Also, its issues to
overcome with the current methodology to
improve the authentication. Biometric
authentication mainly focused on the
fingerprint scanner. It is used to verify the
identity of a person by using his fingerprint.
It basically works with a sensor. Sensor
recognized the user fingers data through the
series of dark lines and white spaces.
Figure 1 The above diagram shows how
Biometric fingerprint scanner works.
Highlighting areas/issues that have not
been addressed or adequately addressed;
The current research is to propose the
biometric system for authentication to
improve the security and secure
authentication of the data. This research
mainly focused on the fingerprint scanner,
face recognition and iris recognition which
are the mainly used body parts to access the
information. There are many areas and
issues for the authentication of the biometric
system in a person's body such as speech
recognition, retinal recognition, palm body
recognition, ear shape recognition etcetera.
Speech recognition
As every individual has their own vocal
characteristics, speech or voice can be used
as a biometric for the authentication or
identifying of an individual is called speech
recognition. A person needs to speak in front
of the sensor, the sensor captured the
acoustic sensor into unique digital code and
further it can be recognized[7].
Retinal recognition
This recognition is based on the blood
vessels with the retina of an individual. It
works as when the image of the retina is
captured and stored then it will be used as a
template for the further processing of an
individual.
Palm recognition
In this recognition, the palm of an individual
is scanned through the sensor device or
optical device and palm prints are stored in
the reader and distinguish individual. This
has the issue of the wet and wrinkled palm
of the recognition rate.
Ear shape recognition
As every human has unique ears which can
be used for the biometric authentication
purposes. It has the challenges as if the ear is
covered with the hair, it will be difficult to
recognize.
Discussing your view(s) on the issue(s)
that you see as being critical.
wearing collusion occurs problem by scrap,
hat, glasses etcetera [2].
The current literature of the research is to
provide better security for better
authentication to the user so that it can
assess the information or data securely. This
research mainly focused on face recognition
and fingerprint scanner. Also, its issues to
overcome with the current methodology to
improve the authentication. Biometric
authentication mainly focused on the
fingerprint scanner. It is used to verify the
identity of a person by using his fingerprint.
It basically works with a sensor. Sensor
recognized the user fingers data through the
series of dark lines and white spaces.
Figure 1 The above diagram shows how
Biometric fingerprint scanner works.
Highlighting areas/issues that have not
been addressed or adequately addressed;
The current research is to propose the
biometric system for authentication to
improve the security and secure
authentication of the data. This research
mainly focused on the fingerprint scanner,
face recognition and iris recognition which
are the mainly used body parts to access the
information. There are many areas and
issues for the authentication of the biometric
system in a person's body such as speech
recognition, retinal recognition, palm body
recognition, ear shape recognition etcetera.
Speech recognition
As every individual has their own vocal
characteristics, speech or voice can be used
as a biometric for the authentication or
identifying of an individual is called speech
recognition. A person needs to speak in front
of the sensor, the sensor captured the
acoustic sensor into unique digital code and
further it can be recognized[7].
Retinal recognition
This recognition is based on the blood
vessels with the retina of an individual. It
works as when the image of the retina is
captured and stored then it will be used as a
template for the further processing of an
individual.
Palm recognition
In this recognition, the palm of an individual
is scanned through the sensor device or
optical device and palm prints are stored in
the reader and distinguish individual. This
has the issue of the wet and wrinkled palm
of the recognition rate.
Ear shape recognition
As every human has unique ears which can
be used for the biometric authentication
purposes. It has the challenges as if the ear is
covered with the hair, it will be difficult to
recognize.
Discussing your view(s) on the issue(s)
that you see as being critical.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

As discussing the biometric for
authentication is used to provide better
security, privacy and authentication so that
user can asses its information easily. There
are many technologies of biometric which
has been used for biometric. The used recent
technology is the fingerprint scanner. It
works on any finger of a person. It is mostly
used in the organization and offices. It
process is a sensor to detect the finger with
the fingerprint appearing as a series of white
spaces and dark lines. But when the finger is
wrinkled and wet, the sensor will not work.
Another problem of biometric is raised by
the user it violates the right to privacy and
anonymity in the way to objectifying the
human body. The research violates the user
privacy and anonymity that will impact on
the user information, nobody can access the
information but it sometimes a person has
the problem with this high security because
no other person of his family and close
friend etcetera cannot access the
information. Biometric authentication and
used information technology issues can
occur the problem in real life of the person.
This technology has both positive and
negative impact on real life. This research
can help people in knowing the various
information security systems, privacy and
security.
Summarize the future research directions
based on the identified gaps
The future research direction taking the
biometric authentication grown and expands
towards the new technology of biometric
authentication in order to identify a person
accurately. The new trends have begun in
the following important areas [1].
Facial recognition will have increased
investigative use and intelligence use. In
future, law enforcement may not use
facial recognition for detection and
evidence in the near future.
As increased the technology, to improve
the authentication may enhance the palm
print may be used with the increased
investment in further study.
Palm identification and fingerprint
identification technologies are the main
biometric authentication technology will
be the foreseeable future that law
enforcement to increase.
In the future aspect, international
cooperation will be the major current
trend. It is the backbone of law
enforcement agencies based on
cooperation. Also, biometric data need
to be shared among them.
In future, acquiring passive biometric
data will also follow in future trends of
biometric. Matching and capturing
biometric passively without human
interaction will be used in the existing
technology.
Multimodal biometric will be used to
increase the accuracy of identification or
authentication.
Behaviour biometric is the technology
which will be used in further
authentication to increase the digital
technology of biometric.
Biometric in health is good for health.
The airport will expand use beyond
passport control.
Mobile biometric is ubiquitous
Mobile biometrics
authentication is used to provide better
security, privacy and authentication so that
user can asses its information easily. There
are many technologies of biometric which
has been used for biometric. The used recent
technology is the fingerprint scanner. It
works on any finger of a person. It is mostly
used in the organization and offices. It
process is a sensor to detect the finger with
the fingerprint appearing as a series of white
spaces and dark lines. But when the finger is
wrinkled and wet, the sensor will not work.
Another problem of biometric is raised by
the user it violates the right to privacy and
anonymity in the way to objectifying the
human body. The research violates the user
privacy and anonymity that will impact on
the user information, nobody can access the
information but it sometimes a person has
the problem with this high security because
no other person of his family and close
friend etcetera cannot access the
information. Biometric authentication and
used information technology issues can
occur the problem in real life of the person.
This technology has both positive and
negative impact on real life. This research
can help people in knowing the various
information security systems, privacy and
security.
Summarize the future research directions
based on the identified gaps
The future research direction taking the
biometric authentication grown and expands
towards the new technology of biometric
authentication in order to identify a person
accurately. The new trends have begun in
the following important areas [1].
Facial recognition will have increased
investigative use and intelligence use. In
future, law enforcement may not use
facial recognition for detection and
evidence in the near future.
As increased the technology, to improve
the authentication may enhance the palm
print may be used with the increased
investment in further study.
Palm identification and fingerprint
identification technologies are the main
biometric authentication technology will
be the foreseeable future that law
enforcement to increase.
In the future aspect, international
cooperation will be the major current
trend. It is the backbone of law
enforcement agencies based on
cooperation. Also, biometric data need
to be shared among them.
In future, acquiring passive biometric
data will also follow in future trends of
biometric. Matching and capturing
biometric passively without human
interaction will be used in the existing
technology.
Multimodal biometric will be used to
increase the accuracy of identification or
authentication.
Behaviour biometric is the technology
which will be used in further
authentication to increase the digital
technology of biometric.
Biometric in health is good for health.
The airport will expand use beyond
passport control.
Mobile biometric is ubiquitous
Mobile biometrics
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Linking biometric data
Convert identification to individuals
Conclusion
This research has covered all the necessary
details with the previous and current
technologies of each emerging technology in
order to help the current research area to
choose its particular topic of their interest in
research. The recently used technology of
biometric for authentication to improve
privacy and authentication is fingerprint
scanner and face recognition. This
technology plays an important role in the
recognition of the human body through the
fingerprint scanner and faces recognition
which can help to access the information
easily. Another technology of biometric for
authentication is iris recognition, retinal
recognition, ear recognition, palm
recognition, body odour recognition
etcetera. This research also discussed
enough details of future trends of research
direction and biometric technologies. This
research work also discussed the review of
biometric technologies which has been
discussed in the literature review of the
research based on biometric modalities. This
research also analyzes the literature work
with the previous issue in biometric for
authentication to improve the more security
of the individuals. It will help in enhancing
the technology in future trends. Facial
recognition has many challenges and
problem and it will be focused on further
research or technology. The future work is
to study and analyze the facial recognition
system which is suffering from the many
challenges.
References
[3] Maltoni, D., Maio,
D., Jain, A. K., and
Prabhakar, S. (2003),
Handbook of Fingerprint
Recognition, New York:
Springer-
Verlag
[4] Phillips et al.
(2005) P.J. Phillips, P.
J . Flynn, T. Scruggs,
K . W . B o w y e r , J .
C h a n g , K .
H o ff m a n , J .
M a r q u e s , J . M i n ,
a n d W . W o r e k .
" O v e r v i e w o f t h e
f a c e r e c o g n i t i o n
g r a nd cha l l eng e ”.
In IEEE Computer
Society
Conference on
Computer Vision and
Pattern Recognition,
CVPR 2005, pp. 947–
954.
[5] Ross, A. K. Jain,
"Information fusion in
biometrics", Pattern
Convert identification to individuals
Conclusion
This research has covered all the necessary
details with the previous and current
technologies of each emerging technology in
order to help the current research area to
choose its particular topic of their interest in
research. The recently used technology of
biometric for authentication to improve
privacy and authentication is fingerprint
scanner and face recognition. This
technology plays an important role in the
recognition of the human body through the
fingerprint scanner and faces recognition
which can help to access the information
easily. Another technology of biometric for
authentication is iris recognition, retinal
recognition, ear recognition, palm
recognition, body odour recognition
etcetera. This research also discussed
enough details of future trends of research
direction and biometric technologies. This
research work also discussed the review of
biometric technologies which has been
discussed in the literature review of the
research based on biometric modalities. This
research also analyzes the literature work
with the previous issue in biometric for
authentication to improve the more security
of the individuals. It will help in enhancing
the technology in future trends. Facial
recognition has many challenges and
problem and it will be focused on further
research or technology. The future work is
to study and analyze the facial recognition
system which is suffering from the many
challenges.
References
[3] Maltoni, D., Maio,
D., Jain, A. K., and
Prabhakar, S. (2003),
Handbook of Fingerprint
Recognition, New York:
Springer-
Verlag
[4] Phillips et al.
(2005) P.J. Phillips, P.
J . Flynn, T. Scruggs,
K . W . B o w y e r , J .
C h a n g , K .
H o ff m a n , J .
M a r q u e s , J . M i n ,
a n d W . W o r e k .
" O v e r v i e w o f t h e
f a c e r e c o g n i t i o n
g r a nd cha l l eng e ”.
In IEEE Computer
Society
Conference on
Computer Vision and
Pattern Recognition,
CVPR 2005, pp. 947–
954.
[5] Ross, A. K. Jain,
"Information fusion in
biometrics", Pattern

Recognition Letters 24
(2003) 21 15-2125,
available at
http://
www.computersciencew
eb.com/
[6] Lifeng Lai, Sui
Wai Ho and H. Vicent
Poor "Privacy
1. Tanwar, S., Tyagi, S., Kumar, N., &
Obaidat, M. S., “Ethical, Legal, and
Social Implications of Biometric
Technologies”, In Biometric-Based
Physical and Cybersecurity Systems (pp.
535-569), April 2019. Springer, Cham.
2. Ogbanufe, O., & Kim, D. J.,
“Comparing fingerprint-based
biometrics authentication versus
traditional authentication methods for e-
payment”, Decision Support
Systems, vol 106, 1-14, May 2018.
3. Carpenter, D., McLeod, A., Hicks, C., &
Maasberg, M., “Privacy and biometrics:
An empirical examination of employee
concerns”, Information Systems
Frontiers, vol 20(1), 91-110, June 2018.
4. Obaidat, M. S., Traore, I., & Woungang,
I., “Biometric-Based Physical and
Cybersecurity Systems”, Springer
International Publishing, vol 34, Jan
2018.
5. Buckley, O., & Nurse, J. R., “The
language of biometrics: Analysing
public perceptions”, Journal of
Information Security and
Applications, vol 47, 112-119, May
2019.
6. North-Samardzic, A., “Biometric
Technology and Ethics: Beyond Security
Applications”, Journal of Business
Ethics, pp-1-18, Sept 2019.
7. Feng, Q., He, D., Zeadally, S., & Wang,
H., “Anonymous biometrics-based
authentication scheme with key
distribution for mobile multi-server
environment”, Future Generation
Computer Systems, vol 84, 239-251, Dec
2019
1] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition:
Security and Privacy Concerns", IEEE Security & Privacy,
MarcWApril2003, pp. 33-42
[2] A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to
Biometric Recognition", IEEE Trans. on Circuits and Systems
for Video Technology, Vol. 14, No. 1, pp. 4-19, January 2004
1] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition:
Security and Privacy Concerns", IEEE Security & Privacy,
MarcWApril2003, pp. 33-42
[2] A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to
Biometric Recognition", IEEE Trans. on Circuits and Systems
for Video Technology, Vol. 14, No. 1, pp. 4-19, January 2004
1] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition:
Security and Privacy Concerns", IEEE Security & Privacy,
MarcWApril2003, pp. 33-42
[2] A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to
(2003) 21 15-2125,
available at
http://
www.computersciencew
eb.com/
[6] Lifeng Lai, Sui
Wai Ho and H. Vicent
Poor "Privacy
1. Tanwar, S., Tyagi, S., Kumar, N., &
Obaidat, M. S., “Ethical, Legal, and
Social Implications of Biometric
Technologies”, In Biometric-Based
Physical and Cybersecurity Systems (pp.
535-569), April 2019. Springer, Cham.
2. Ogbanufe, O., & Kim, D. J.,
“Comparing fingerprint-based
biometrics authentication versus
traditional authentication methods for e-
payment”, Decision Support
Systems, vol 106, 1-14, May 2018.
3. Carpenter, D., McLeod, A., Hicks, C., &
Maasberg, M., “Privacy and biometrics:
An empirical examination of employee
concerns”, Information Systems
Frontiers, vol 20(1), 91-110, June 2018.
4. Obaidat, M. S., Traore, I., & Woungang,
I., “Biometric-Based Physical and
Cybersecurity Systems”, Springer
International Publishing, vol 34, Jan
2018.
5. Buckley, O., & Nurse, J. R., “The
language of biometrics: Analysing
public perceptions”, Journal of
Information Security and
Applications, vol 47, 112-119, May
2019.
6. North-Samardzic, A., “Biometric
Technology and Ethics: Beyond Security
Applications”, Journal of Business
Ethics, pp-1-18, Sept 2019.
7. Feng, Q., He, D., Zeadally, S., & Wang,
H., “Anonymous biometrics-based
authentication scheme with key
distribution for mobile multi-server
environment”, Future Generation
Computer Systems, vol 84, 239-251, Dec
2019
1] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition:
Security and Privacy Concerns", IEEE Security & Privacy,
MarcWApril2003, pp. 33-42
[2] A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to
Biometric Recognition", IEEE Trans. on Circuits and Systems
for Video Technology, Vol. 14, No. 1, pp. 4-19, January 2004
1] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition:
Security and Privacy Concerns", IEEE Security & Privacy,
MarcWApril2003, pp. 33-42
[2] A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to
Biometric Recognition", IEEE Trans. on Circuits and Systems
for Video Technology, Vol. 14, No. 1, pp. 4-19, January 2004
1] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition:
Security and Privacy Concerns", IEEE Security & Privacy,
MarcWApril2003, pp. 33-42
[2] A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Biometric Recognition", IEEE Trans. on Circuits and Systems
for Video Technology, Vol. 14, No. 1, pp. 4-19, January 2004
1] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition:
Security and Privacy Concerns", IEEE Security & Privacy,
MarcWApril2003, pp. 33-42
[2] A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to
Biometric Recognition", IEEE Trans. on Circuits and Systems
for Video Technology, Vol. 14, No. 1, pp. 4-19, January 2004
for Video Technology, Vol. 14, No. 1, pp. 4-19, January 2004
1] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition:
Security and Privacy Concerns", IEEE Security & Privacy,
MarcWApril2003, pp. 33-42
[2] A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to
Biometric Recognition", IEEE Trans. on Circuits and Systems
for Video Technology, Vol. 14, No. 1, pp. 4-19, January 2004
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.