Full Paper View Go Back

An Overview and Analysis Based on Biometric Framework Technique and Fingerprint Biometric Technology

Nitin Tiwari1

  1. Dept. of Information Technology, Swami Vivekananda University, Sagar, India.

Correspondence should be addressed to: tiwari.tiit@gmail.com .


Section:Research Paper, Product Type: Journal-Paper
Vol.5 , Issue.6 , pp.69-74, Dec-2017


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v5i6.6974


Online published on Dec 31, 2017


Copyright © Nitin Tiwari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nitin Tiwari , “An Overview and Analysis Based on Biometric Framework Technique and Fingerprint Biometric Technology,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.69-74, 2017.

MLA Style Citation: Nitin Tiwari "An Overview and Analysis Based on Biometric Framework Technique and Fingerprint Biometric Technology." International Journal of Scientific Research in Computer Science and Engineering 5.6 (2017): 69-74.

APA Style Citation: Nitin Tiwari , (2017). An Overview and Analysis Based on Biometric Framework Technique and Fingerprint Biometric Technology. International Journal of Scientific Research in Computer Science and Engineering, 5(6), 69-74.

BibTex Style Citation:
@article{Tiwari_2017,
author = {Nitin Tiwari },
title = {An Overview and Analysis Based on Biometric Framework Technique and Fingerprint Biometric Technology},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2017},
volume = {5},
Issue = {6},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {69-74},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=520},
doi = {https://doi.org/10.26438/ijcse/v5i6.6974}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i6.6974}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=520
TI - An Overview and Analysis Based on Biometric Framework Technique and Fingerprint Biometric Technology
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Nitin Tiwari
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 69-74
IS - 6
VL - 5
SN - 2347-2693
ER -

778 Views    181 Downloads    108 Downloads
  
  

Abstract :
Biometric technique area a strange and reliable structure and creation biometric, recognition has pulled in various researchers and achieved great success. This paper of overview of analysis work is to how is process, biometric are review and principal of the biometric techniques, taking both secure information and personal integrity into consideration. But my point of view every individual has unique characteristics. It is more secure and often more convenient. Biometrics are extra of high accuracy in today`s can be used for identification biometric framework. The reason for our paper is to overview and analysis to know how to use biometric system and working for creation assessment whether the combination of structure and creation and unique mark biometric method used success execution that may not be believable utilizing a friendless technique innovation. The term biometrics encompasses together which means that Biometric information is more and more useful and can replace passwords identity verification of user’s. This improves privacy for both user and administrator. Various method are used to discover and study and outcome result, biometric functions are advantage and for their strength and properly working in the completion of the biometric technology.

Key-Words / Index Term :
Network Security, Biometric Technique, Fingerprinting Biometric, Numerous Biometric System, New and Emerging Biometric Techniques

References :
[1] S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric Recognition: Security and Privacy Concerns”, IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, 2003
[2] Fingerprint Matching Using Two Methods Mrs. Hemlata Patel*, Pallavi Asrodia**International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 pp 857-pp560
[3] D. Landgrebe, Hyper spectral Image data analysis. IEEE process vol. 19, pp. 17–pp 28, 2002.
[4] Kalyani Mali Samayita Bhattacharya International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2013 pp162-pp172
[5] A. K. Jain, L. Hong, S. Pankanti, and R. Bolle, An identity authentication system using fingerprints Proc. IEEE, vol. 85, no. 9, pp.1365–pp1388, Sep. 1997.
[6]. T. Nakamoto, A. Fukunda, and T. Moriizumi. Perfume and FlavorIdentification by Odor-Sensing System Using Quartz-Resonator Sensor Array and Neural Network Pattern Recognition. Volume18/19, pp. 282-pp290, 1994
[7] P.Inbavalli1, G.Nandhini2International Journal of Computer Science and Information Technologies, Vol. 5 , 2014, pp 6270-pp6274 Body Odor as a Biometric Authentication
[8] Ramya M*; Dr. V. Krishnaveni**; Dr. K. S. Sridharan*** Effective Approches and Challenges Focued in IRIS Image Recognition – A Survey Asian Journal of Research in Social Sciences and Humanities Vol. 6, No. 11, November 2016, pp. 565-580.
[9] S. Garg, A. Kumar, and M. Hanmandlu. Biometric authentication using finger nail surface. International conference on Intelligent Systems Design and Applications (ISDA), . IEEE pages 497–502, Nov. 2012.
[10] Joseph Kalunga*, Simon Tembo American Journal of Bioinformatics Research Development of Fingerprint Biometrics Verification and Vetting Management System Joseph, 6(3): pp99-pp112 ,2016
[11] Rupinder Saini , Narinder Rana “Comparison of Various Biometric Methods”. International Journal of Advances in Science and Technology (IJAST) ISSN 2348-5426 pp24-pp30
[12] Rabia Jarfi and Hamid R. Arabina, “A Survey of Face Recognition Techniques”, Journal of Information Processing Systems, Vol.5, No.2, pp41-69 June 2009.
[13] Michal Choras (2009) ,” The lip as a biometric”. February 2010, issue 1 Volume 13 pp 105–111
[14] Dr.Haitham Kareem Ali1,Dr.Yasir Khalil Ibrahim2 Energy Conservation using Voice RecognitionJournal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.11 pp59-62, 2013
[15] Montri Phothisonothai, "An investigation of using SSVEP for EEG-based user authentication system", Signal and Information Processing Association Annual Summit and Conference (APSIPA) 2015 Asia-Pacific, pp. 923-926, 2015.
[16]S. Marcel and J. D. R. Millan. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans.Pattern Anal. MachIntell. 29(4) pp743-pp 752, April 2007.
[17] Nitin Tiwari, Overview & Comparison of Inactive and Active Finger Stamping. International journal of scientific engineering Research IJSER March vol-3 issue 3 2012
[18] Nitin Tiwari, an overview An Overview of Techniques for Framework of Finger Stamping international journal of electronics and computer science engineering June 2012. ISSN code 2229-5518

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation