Multimodal Biometric Systems, its Security Issues, Research Challenges and Countermeasures—Technical Review

Author(s):  
M. Gayathri ◽  
C. Malathy ◽  
Hari Akhilesh Chandrasekar ◽  
Prabhakaran Mathialagan
2021 ◽  
Author(s):  
Mohamed Abdul-Al ◽  
George Kumi Kyeremeh ◽  
Naser Ojaroudi Parchin ◽  
Raed A Abd-Alhameed ◽  
Rami Qahwaji ◽  
...  

Author(s):  
K Sasidhar ◽  
Vijaya L Kakulapati ◽  
Kolikipogu Ramakrishna ◽  
K KailasaRao

Author(s):  
Shashidhara H. R. ◽  
Siddesh G. K.

Authenticating the identity of an individual has become an important aspect of many organizations. The reasons being to secure authentication process, to perform automated attendance, or to provide bill payments. This need of providing automated authentication has led to concerns in the security and robustness of such biometric systems. Currently, many biometric systems that are organizations are unimodal, which means that use single physical trait to perform authentication. But, these unimodal systems suffer from many drawbacks. These drawbacks can be overcome by designing multimodal systems which use multiple physical traits to perform authentication. They increase reliability and robustness of the systems. In this chapter, analysis and comparison of multimodal biometric systems is proposed for three physical traits like iris, finger, and palm. All these traits are treated independently, and feature of these traits are extracted using two algorithms separately.


Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.


2007 ◽  
Vol 62 (1-2) ◽  
pp. 156-176
Author(s):  
Doroteo T. Toledano ◽  
Álvaro Hernández Trapote ◽  
David Díaz Pardo de Vera ◽  
Rubén Fernández Pozo ◽  
Luis Hernández Gómez

Sign in / Sign up

Export Citation Format

Share Document