An Overview and Analysis Based on Biometric Framework Technique and Fingerprint Biometric Technology
Keywords:
Network Security, Biometric Technique, Fingerprinting Biometric, Numerous Biometric System, New and Emerging Biometric TechniquesAbstract
Biometric technique area a strange and reliable structure and creation biometric, recognition has pulled in various researchers and achieved great success. This paper of overview of analysis work is to how is process, biometric are review and principal of the biometric techniques, taking both secure information and personal integrity into consideration. But my point of view every individual has unique characteristics. It is more secure and often more convenient. Biometrics are extra of high accuracy in today`s can be used for identification biometric framework. The reason for our paper is to overview and analysis to know how to use biometric system and working for creation assessment whether the combination of structure and creation and unique mark biometric method used success execution that may not be believable utilizing a friendless technique innovation. The term biometrics encompasses together which means that Biometric information is more and more useful and can replace passwords identity verification of user’s. This improves privacy for both user and administrator. Various method are used to discover and study and outcome result, biometric functions are advantage and for their strength and properly working in the completion of the biometric technology.
References
S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric Recognition: Security and Privacy Concerns”, IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, 2003
Fingerprint Matching Using Two Methods Mrs. Hemlata Patel*, Pallavi Asrodia**International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 pp 857-pp560
D. Landgrebe, Hyper spectral Image data analysis. IEEE process vol. 19, pp. 17–pp 28, 2002.
Kalyani Mali Samayita Bhattacharya International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2013 pp162-pp172
A. K. Jain, L. Hong, S. Pankanti, and R. Bolle, An identity authentication system using fingerprints Proc. IEEE, vol. 85, no. 9, pp.1365–pp1388, Sep. 1997.
T. Nakamoto, A. Fukunda, and T. Moriizumi. Perfume and FlavorIdentification by Odor-Sensing System Using Quartz-Resonator Sensor Array and Neural Network Pattern Recognition. Volume18/19, pp. 282-pp290, 1994
P.Inbavalli1, G.Nandhini2International Journal of Computer Science and Information Technologies, Vol. 5 , 2014, pp 6270-pp6274 Body Odor as a Biometric Authentication
Ramya M*; Dr. V. Krishnaveni**; Dr. K. S. Sridharan*** Effective Approches and Challenges Focued in IRIS Image Recognition – A Survey Asian Journal of Research in Social Sciences and Humanities Vol. 6, No. 11, November 2016, pp. 565-580.
S. Garg, A. Kumar, and M. Hanmandlu. Biometric authentication using finger nail surface. International conference on Intelligent Systems Design and Applications (ISDA), . IEEE pages 497–502, Nov. 2012.
Joseph Kalunga*, Simon Tembo American Journal of Bioinformatics Research Development of Fingerprint Biometrics Verification and Vetting Management System Joseph, 6(3): pp99-pp112 ,2016
Rupinder Saini , Narinder Rana “Comparison of Various Biometric Methods”. International Journal of Advances in Science and Technology (IJAST) ISSN 2348-5426 pp24-pp30
Rabia Jarfi and Hamid R. Arabina, “A Survey of Face Recognition Techniques”, Journal of Information Processing Systems, Vol.5, No.2, pp41-69 June 2009.
Michal Choras (2009) ,” The lip as a biometric”. February 2010, issue 1 Volume 13 pp 105–111
Dr.Haitham Kareem Ali1,Dr.Yasir Khalil Ibrahim2 Energy Conservation using Voice RecognitionJournal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.11 pp59-62, 2013
Montri Phothisonothai, "An investigation of using SSVEP for EEG-based user authentication system", Signal and Information Processing Association Annual Summit and Conference (APSIPA) 2015 Asia-Pacific, pp. 923-926, 2015.
S. Marcel and J. D. R. Millan. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans.Pattern Anal. MachIntell. 29(4) pp743-pp 752, April 2007.
Nitin Tiwari, Overview & Comparison of Inactive and Active Finger Stamping. International journal of scientific engineering Research IJSER March vol-3 issue 3 2012
Nitin Tiwari, an overview An Overview of Techniques for Framework of Finger Stamping international journal of electronics and computer science engineering June 2012. ISSN code 2229-5518
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.