Abstract
Objectives To study and compare different types of biometric systems and to obtain the result for the same, this paper has discussed the need of biometrics, ways of performing it and the best type of biometrics that should be implemented. Methods and findings: We used various statistics, graphical and tabular representations for showing data studied from different papers and reviewing them. Instances of infringements of right to privacy and protection of personal data are proliferating. Biometric systems are identity authentication systems for information assurance and protection via biological traits since they are unique. Technology is rapidly advancing in every field and choosing passwords are not enough. Biometric systems are the best approach to keep data safe, and it also makes the accessing of data simple. Everything has its own pros and cons so; we will be discussing the pros and cons of various biometric technologies in order to determine the best among them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alqahtani A (2016) Evaluation of the reliability of iris recognition biometric authentication systems. In: 2016 international conference on computational science and computational intelligence (CSCI). IEEE
Bilge L et al (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web. ACM
Boatwright M, Luo X (2007) What do we know about biometrics authentication? In: Proceedings of the 4th annual conference on Information security curriculum development. ACM
Kang BJ, Park KR (2005) A study on iris image restoration. In: Audio-and video-based biometric person authentication. Springer, pp 31–40
Chitte PP, Rana JG, Taware S (2012) Iris recognition based security system using RFID. In: Proceedings of the CUBE international information technology conference. ACM
Chowhan SS, Shinde GN (2008) Iris biometrics recognition application in security management. Image and signal processing, 2008. Congress on CISP'08, vol 1. IEEE
Duarte T et al (2016) Biometric access control systems: a review on technologies to improve their efficiency. In: 2016 IEEE international power electronics and motion control conference (PEMC). IEEE
Hämmerle-Uhl J, Raab K, Uhl A (2011) Robust watermarking in iris recognition: application scenarios and impact on recognition performance. ACM SIGAPP Appl Comput Rev 11(3):6–18
Fujimasa, Chinzei T, Saito I (2000) Converting far infrared image information to other physiological data. Eng Med Biol Mag 19:71–76
Jagadeesh N, Chandrasekhar M, Patil (2017) Conceptual view of the iris recognition systems in the biometric world using image processing techniques. In: 2017 international conference on computing methodologies and communication (ICCMC). IEEE
Anil J, Hong L, Sharath P (2000) Biometric identification. Commun ACM 43(2):90–98
Daugman J (2004) How iris recognition works. IEEE Trans Circ Syst Video Technol 14(1):21–30
Lai K, Steven S, Yanushkevich SN (2014) “Multi-spectral facial biometrics in access control. In: 2014 IEEE symposium on computational intelligence in biometrics and identity management (CIBIM). IEEE
Salganicoff M, Zhang GH (1999) Method of measuring the focus of close-up images of eyes. US Patent 5953440
Mock K et al (2012) Real-time continuous iris recognition for authentication using an eye tracker. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM
Kalka ND, Zuo J, Schmid NA, Cukic B (2006) Image quality assessment for iris biometric
Li P, Ma H (2012) Iris recognition in nonideal imaging conditions. Pattern Recognit Lett 33(8):1012–1018
Sharma, Shilpi, and J. S. Sodhi. “Implementation of biometric techniques in social networking sites.“ International Journal of Security and Its applications 8.6 (2014): 51–60.
Sheela SV, P. A. Vijaya."Iris recognition methods-survey." International Journal of Computer Applications 3.5 (2010): 19Snelick, Robert, et al (2005) Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Trans Pattern Anal Mach Intell 27(3):450–455
Solanke, Sarika B., and Ratnadeep R. Deshmukh. ““Biometrics—Iris recognition system” A study of promising approaches for secured authentication.“ Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on.IEEE, 2016.
Verma P et al (2012) Daughman’s algorithm method for iris recognition—a biometric approach. Int J Emerg Technol Adv Eng 2(6):177–185
Chen Y, Dass SC, Jain AK (2005) Localized iris image quality using 2-d wavelets. In: Advances in biometrics. Springer, Berlin, pp 373–381
Yadav V, Monika V, Kaushik VD (2016) A biometric approach to secure big data. In: 2016 international conference on innovation and challenges in cyber security (ICICCS-INBUSH). IEEE
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, S.B., Dhall, I., Nayak, S.R., Chatterjee, P. (2023). Reliable Biometric Authentication with Privacy Protection. In: Dhar, S., Do, DT., Sur, S.N., Liu, H.CM. (eds) Advances in Communication, Devices and Networking. Lecture Notes in Electrical Engineering, vol 902. Springer, Singapore. https://doi.org/10.1007/978-981-19-2004-2_21
Download citation
DOI: https://doi.org/10.1007/978-981-19-2004-2_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2003-5
Online ISBN: 978-981-19-2004-2
eBook Packages: EngineeringEngineering (R0)