SWOT of Biometric Technology

سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 537

فایل این مقاله در 7 صفحه با فرمت PDF و WORD قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICMRS01_353

تاریخ نمایه سازی: 8 آبان 1395

چکیده مقاله:

In its broadest sense, biometrics is the measurement and analysis of a biological characteristic (fingerprints, iris patterns, retains, face or hand geometry) or a behavioral characteristic (voice, gait or signature). Biometric technologies use these characteristics to identify individuals automatically. Unlike identity documents or passwords, biometrics cannot be lost or forgotten since they are a part of user and are always present at the time of identification. They are also difficult, though not impossible, to forge or share. In this paper we will discuss various biometrics methods and their history, then some example of behaviometric technology and the current state of biometric technology, their usage in the security operations, future areas to use them and at the end analyses for finding the strength, weaknesses, opportunities and threats that is called SWOT of biometric Technology .

کلیدواژه ها:

نویسندگان

Moslem Mohammadi

Faculty member of Islamic Azad University branch Meyandoab

Maryam Shamsadini

Msc. Computer engineering Student in Islamic Azad university of Meyandoab

Ashkan Hassani Karimabad

Msc. Management Information Systems

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Jain, A.K., Prabhakar, S., Hong, L., Pankanti, _ S , ...
  • U.Uludag, S.Pankanti, S.Prabhakar andA.K.Jain, "Biometric cryptosystems: Issue and ...
  • challenges", Proceedings of the IEEE, vol.92, no, (948-960), 2014 ...
  • Vivek K. Singh, Tripathi S. P., R. P. Agarwal and ...
  • F.Han, J.Hu, X.Yu, Feng, Zhou, "A novel hybrid crypto -biometric ...
  • Fridrich, J.:"Symmetric Ciphers Based _ two -dimensional chaotic maps", Int. ...
  • N.Selvaraju, G.Sekar "A Method to Improve the Security Level of ...
  • Zhou, J., Gu, J."A model-based method for the computation of ...
  • Benny Pinkas, "Introduction to Cryptography", February 20, 201 1 ...
  • Biometric Person Authentication Odor "Zhanna Korotkaya _ Lappe enrantaUnives ity ...
  • Face Recognition by Elastic Bunch Graph Matching website, B _ ...
  • e/VDM/re S earch/c omputerVi S i _ n/grap hMatching/i dentific ...
  • An Introduction to Biometric Recognition Anil K. Jain, Fellow, IEEE ...
  • INFRARED ID ENTIF ICATION _ FACES AND BODY PARTS Francine ...
  • Using Gait to Recognize People Jorge Fazenda, David Santos and ...
  • On gait a biometric :progress and prospect Mark S. Nixon, ...
  • http : //www .bayometric , co m/pro ducts/default .html _ ...
  • نمایش کامل مراجع