On testing methods for biometric authentication

被引:0
|
作者
Grosso, E [1 ]
Tistarelli, M [1 ]
机构
[1] Univ Sassari, Comp Vis Lab, I-07041 Alghero, SS, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of biometric data for user authentication and/or recognition is now a reality. On the other hand, there is still a strong need for new technologies to overpass intrinsic limitations of already "established" techniques. This not only requires to devise new algorithms but to determine the real potential and limitations of existing techniques. This is possible only devising standard testing and assessment procedures based on statistical observations of the outputs of the system. In order to define better a standard evaluation process, a system based on space-variant iconic image matching is described and the validation procedure defined. I turns out that all methods based on the same biometric measurements have the same intrinsic limitations, which can be only overcome by the adoption of a multi-modal or multi-algorithmic approach.
引用
收藏
页码:241 / 244
页数:4
相关论文
共 50 条
  • [21] Keyboard Invariant Biometric Authentication
    Smriti, Puja
    Srivastava, Swapnita
    Singh, Saurabh
    2018 4TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2018,
  • [22] Biometric authentication -: Security and usability
    Matyas, V
    Ríha, Z
    ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 227 - 239
  • [23] AUTHENTICATION BY BIOMETRIC VERIFICATION INTRODUCTION
    Vetter, Ron
    COMPUTER, 2010, 43 (02) : 28 - 29
  • [24] Biometric authentication in infrastructure security
    Armington, J
    Ho, P
    Koznek, P
    Martinez, R
    INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 1 - 18
  • [25] Biometric Authentication for Older Adults
    Kowtko, Marc Alexander
    2014 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2014,
  • [26] A Novel Authentication Biometric for Pacemakers
    Heather, Kenedi
    Shah, Kunal K.
    Venkatasubramanian, Krishna K.
    Cai, Hang
    Hoyme, Ken
    Seeberger, Michael
    Wiechman, Grace
    2018 IEEE/ACM INTERNATIONAL CONFERECE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2018, : 81 - 87
  • [27] Cognition for Enhanced Biometric Authentication
    Zivic, Natasa
    Ruland, Christoph
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 241 - 244
  • [28] Hazards of Biometric Authentication in Practice
    Phang, Samantha S. S.
    Pavlovski, Christopher J.
    INFORMATION TECHNOLOGY IN INDUSTRY, 2016, 4 (01): : 34 - 40
  • [29] A survey of biometric authentication systems
    Qazi, FA
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 61 - 67
  • [30] Biometric Person Authentication: A Review
    Raju, A. S.
    Udayashankara, V.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 575 - 580