A comprehensive survey on the biometric systems based on physiological and behavioural characteristics

Author(s):  
Shaymaa Adnan Abdulrahman ◽  
Bilal Alhayani
Author(s):  
Vandana ◽  
Navdeep Kaur

The digitalization has been challenged with the security and privacy aspects in each and every field. In addition to numerous authentication methods, biometrics has been popularized as it relies on one’s individual behavioral and physical characters. In this context, numerous unimodal and multimodal biometrics have been proposed and tested in the last decade. In this paper, authors have presented a comprehensive survey of the existing biometric systems while highlighting their respective challenges, advantage and limitations. The paper also discusses the present biometric technology market value, its scope, and practical applications in vivid sectors. The goal of this review is to offer a compact outline of various advances in biometrics technology with potential applications using unimodal and multimodal bioinformatics are discussed that would prove to offer a base for any biometric-based future research.


2019 ◽  
Vol 8 (2S8) ◽  
pp. 1953-1961

Biometric based authentication has several advantages over traditional password or PIN based authentication process because biometric is consists of physical or behavioural characteristics i.e fingerprint, face, Finger Knuckle Print (FKP), iris, voice etc. Unimodal biometric system h as some drawbacks i.e non universality, inter-class variation, intra-class variation; system can be circumvented by the skilled imposter etc. These drawbacks can overcome by multimodal biometric system as it combines more than one modality for authentication. When multimodal system combined with cryptography it makes system more robust and secure. In this paper, a robust multimodal biometric crypto system has been proposed, in which two modalities (FKP and face) are used for authentication of a person and one modality (fingerprint) is used for key generation. AES algorithm with fingerprint based key is used for securing the biometric templates. At authentication time, decision level fusion with AND rule is used for making the final decision. The proposed multimodal biometric crypto system is more robust and secure as compare with other multimodal biometric systems. Experimental results are shown with the help of MATLAB3. 2017b.


2016 ◽  
Vol 14 (3) ◽  
pp. 253-274 ◽  
Author(s):  
C. M. Lorkowski

I argue that acknowledging Hume as a doxastic naturalist about belief in a deity allows an elegant, holistic reading of his Dialogues. It supports a reading in which Hume's spokesperson is Philo throughout, and enlightens many of the interpretive difficulties of the work. In arguing this, I perform a comprehensive survey of evidence for and against Philo as Hume's voice, bringing new evidence to bear against the interpretation of Hume as Cleanthes and against the amalgamation view while correcting several standard mistakes. I ultimately isolate the interpretation of Philo's Reversal at the end of the Dialogues as of paramount importance, and show how my naturalistic interpretation makes this, and other notoriously difficult passages, unproblematic.


2010 ◽  
Vol 4 (1-2) ◽  
pp. 75-96
Author(s):  
Mohammed Rustom

This article offers the first comprehensive survey of scholarly literature devoted to the Qur??nic works of the famous Muslim philosopher, Mull? ?adr? (d. 1050/1640). While taking account of the merits and shortcomings of studies on ?adr?’s Qur??nic writings, we will also be concerned with highlighting some of the methodological problems raised by the diverse range of approaches adopted in these studies. Chief amongst them is the tendency to pit ?adr? the philosopher against ?adr? the scriptural exegete. Such a dichotomy is not entirely helpful, both with respect to painting a clearer picture of ?adr?’s religious worldview, and to addressing broader questions pertaining to the intimate relationship shared between the “act” of philosophy and the “act” of reading scripture.


2016 ◽  
Vol 2 (1) ◽  
pp. 45-66 ◽  
Author(s):  
Douglas Scott
Keyword(s):  

This paper outlines the background to earlier studies of the orientation of the OrkneyCromarty (OC) passage cairns and the Clava passage and ring cairns, and details the outcome of a new and comprehensive survey carried out by the author over recent years. The paper sets out evidence of orientations in both sets of cairns to the eight divisions of the year and tests whether the alignments were observable. The results were compared to see if the Clava cairns had been influenced by the older OC cairns. Other solar and/or lunar aligned monuments are also briefly examined, as is relevant folklore.


2021 ◽  
Vol 33 (1) ◽  
pp. 012009
Author(s):  
Aiko Narazaki ◽  
Hideyuki Takada ◽  
Dai Yoshitomi ◽  
Kenji Torizuka ◽  
Yohei Kobayashi

Author(s):  
V. Jagan Naveen ◽  
K. Krishna Kishore ◽  
P. Rajesh Kumar

In the modern world, human recognition systems play an important role to   improve security by reducing chances of evasion. Human ear is used for person identification .In the Empirical study on research on human ear, 10000 images are taken to find the uniqueness of the ear. Ear based system is one of the few biometric systems which can provides stable characteristics over the age. In this paper, ear images are taken from mathematical analysis of images (AMI) ear data base and the analysis is done on ear pattern recognition based on the Expectation maximization algorithm and k means algorithm.  Pattern of ears affected with different types of noises are recognized based on Principle component analysis (PCA) algorithm.


Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


Sign in / Sign up

Export Citation Format

Share Document