{"title":"选择生物识别技术","authors":"N. Boodoo-Jahangeer, S. Baichoo","doi":"10.1109/ISTAFRICA.2014.6880618","DOIUrl":null,"url":null,"abstract":"Biometrics is playing a major role in automating personal identification system deployed to enhance security in several applications including use of passports, cellular telephones, automatic teller machines, computer systems and driver licenses. The use of biometric features for identification purposes requires that a particular biometric factor be unique for each individual, that it can be readily measured, and that it is invariant over time. In this work, a review of biometrics is made, including the characteristics of biometrics. The existing biometric technologies have been detailed with their relative strengths and weaknesses. Finally, applications using biometrics have been outlined with the view to understand that not all biometric are suitable for all the applications, each application has its requirements and the right biometric chosen will enhance the security of that application.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"198 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Choice of biometrics\",\"authors\":\"N. Boodoo-Jahangeer, S. Baichoo\",\"doi\":\"10.1109/ISTAFRICA.2014.6880618\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Biometrics is playing a major role in automating personal identification system deployed to enhance security in several applications including use of passports, cellular telephones, automatic teller machines, computer systems and driver licenses. The use of biometric features for identification purposes requires that a particular biometric factor be unique for each individual, that it can be readily measured, and that it is invariant over time. In this work, a review of biometrics is made, including the characteristics of biometrics. The existing biometric technologies have been detailed with their relative strengths and weaknesses. Finally, applications using biometrics have been outlined with the view to understand that not all biometric are suitable for all the applications, each application has its requirements and the right biometric chosen will enhance the security of that application.\",\"PeriodicalId\":248893,\"journal\":{\"name\":\"2014 IST-Africa Conference Proceedings\",\"volume\":\"198 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IST-Africa Conference Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTAFRICA.2014.6880618\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IST-Africa Conference Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAFRICA.2014.6880618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Biometrics is playing a major role in automating personal identification system deployed to enhance security in several applications including use of passports, cellular telephones, automatic teller machines, computer systems and driver licenses. The use of biometric features for identification purposes requires that a particular biometric factor be unique for each individual, that it can be readily measured, and that it is invariant over time. In this work, a review of biometrics is made, including the characteristics of biometrics. The existing biometric technologies have been detailed with their relative strengths and weaknesses. Finally, applications using biometrics have been outlined with the view to understand that not all biometric are suitable for all the applications, each application has its requirements and the right biometric chosen will enhance the security of that application.