On testing methods for biometric authentication

被引:0
|
作者
Grosso, E [1 ]
Tistarelli, M [1 ]
机构
[1] Univ Sassari, Comp Vis Lab, I-07041 Alghero, SS, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of biometric data for user authentication and/or recognition is now a reality. On the other hand, there is still a strong need for new technologies to overpass intrinsic limitations of already "established" techniques. This not only requires to devise new algorithms but to determine the real potential and limitations of existing techniques. This is possible only devising standard testing and assessment procedures based on statistical observations of the outputs of the system. In order to define better a standard evaluation process, a system based on space-variant iconic image matching is described and the validation procedure defined. I turns out that all methods based on the same biometric measurements have the same intrinsic limitations, which can be only overcome by the adoption of a multi-modal or multi-algorithmic approach.
引用
收藏
页码:241 / 244
页数:4
相关论文
共 50 条
  • [41] ECG biometric authentication based on non-fiducial approach using kernel methods
    Hejazi, Maryamsadat
    Al-Haddad, S. A. R.
    Singh, Yashwant Prasad
    Hashim, Shaiful Jahari
    Aziz, Ahmad Fazli Abdul
    DIGITAL SIGNAL PROCESSING, 2016, 52 : 72 - 86
  • [42] Soft-computing methods for robust authentication using soft-biometric data
    Mario Malcangi
    Neural Computing and Applications, 2011, 20 : 865 - 877
  • [43] Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
    Cislaghi, Mauro
    Eleftherakis, George
    Mazzilli, Roberto
    Mohier, Francois
    Ferri, Sara
    Giuffrida, Valerio
    Negroni, Elisa
    PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008, 2009, 53 : 11 - +
  • [44] Biometric Transaction Authentication using Smartphones
    Stokkenes, Martin
    Ramachandra, Raghavendra
    Busch, Christoph
    2018 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG), 2018,
  • [45] Biometric Authentication Based on Significant Parameters
    Balakirsky, Vladimir B.
    Vinck, A. J. Han
    BIOMETRICS AND ID MANAGEMENT, 2011, 6583 : 13 - +
  • [46] A Vein Biometric Based Authentication System
    Gupta, Puneet
    Gupta, Phalguni
    INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 425 - 436
  • [47] A survey on behavioral biometric authentication on smartphones
    Mahfouz, Ahmed
    Mahmoud, Tarek M.
    Eldin, Ahmed Sharaf
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 37 : 28 - 37
  • [48] A Study on Sclera as a Biometric Authentication System
    Sandhya, V
    Hegde, Naga Rathna P.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 253 - 259
  • [49] Multiparty biometric-based authentication
    Peyravian, M
    Matyas, SM
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 2000, 19 (04) : 369 - 374
  • [50] Biometric Authentication Leading the Way to the Future
    Imaoka, Hitoshi
    Sakurai, Kazuyuki
    Tsukada, Masato
    Miyakawa, Shinya
    Oami, Ryoma
    Isshiki, Toshiyuki
    NEC Technical Journal, 2022, 16 (02): : 104 - 108