On testing methods for biometric authentication

被引:0
|
作者
Grosso, E [1 ]
Tistarelli, M [1 ]
机构
[1] Univ Sassari, Comp Vis Lab, I-07041 Alghero, SS, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of biometric data for user authentication and/or recognition is now a reality. On the other hand, there is still a strong need for new technologies to overpass intrinsic limitations of already "established" techniques. This not only requires to devise new algorithms but to determine the real potential and limitations of existing techniques. This is possible only devising standard testing and assessment procedures based on statistical observations of the outputs of the system. In order to define better a standard evaluation process, a system based on space-variant iconic image matching is described and the validation procedure defined. I turns out that all methods based on the same biometric measurements have the same intrinsic limitations, which can be only overcome by the adoption of a multi-modal or multi-algorithmic approach.
引用
收藏
页码:241 / 244
页数:4
相关论文
共 50 条
  • [1] Secure Authentication Using Biometric Methods
    Rejman-Greene, Marek
    Information Security Technical Report, 2002, 7 (03): : 30 - 40
  • [2] Biometric Authentication Methods on Smartphones: A Survey
    Spolaor, Riccardo
    Li, QianQian
    Monaro, Merylin
    Conti, Mauro
    Gamberini, Luciano
    Sartori, Giuseppe
    PSYCHNOLOGY JOURNAL, 2016, 14 (2-3): : 87 - 98
  • [3] Review of Biometric Authentication Methods in Mobile Payment
    Alaqeel, Afra
    Alghamdi, Maysun
    Alkhathami, Mohammed
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 10289 - 10299
  • [4] Authentication and Identification Methods Used in Keystroke Biometric Systems
    Ali, Md Liakat
    Tappert, Charles C.
    Qiu, Meikang
    Monaco, John V.
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1424 - 1429
  • [5] Biometric authentication
    Weaver, AC
    COMPUTER, 2006, 39 (02) : 96 - 97
  • [6] Secure Methods for Fuzzy Key Binding in Biometric Authentication Applications
    Bui, Francis Minhthang
    Hatzinakos, Dimitrios
    2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 1363 - 1367
  • [7] METHODS AND TOOLS FOR BIOMETRIC DATA AUTHENTICATION WITHIN INFORMATION SYSTEMS
    Kis, Y. P.
    Teslyuk, V. M.
    ACTUAL PROBLEMS OF ECONOMICS, 2012, (138): : 174 - 182
  • [8] Biometric Authentication Systems
    Costin, Liliana Maria
    COMPLEXITY IN ARTIFICIAL AND NATURAL SYSTEMS, PROCEEDINGS, 2008, : 166 - 174
  • [9] Biometric authentication: A review
    Bhattacharyya, Debnath
    Ranjan, Rahul
    Farkhod Alisherov, A.
    Choi, Minkyu
    International Journal of u- and e- Service, Science and Technology, 2009, 2 (03) : 13 - 28
  • [10] Biometric Authentication using Soft Biometric Traits
    Garg, Rishabh
    Arora, Anisha
    Singh, Saurabh
    Saraswat, Shipra
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 259 - 264