Reference Hub1
Biometrics: Identification and Security

Biometrics: Identification and Security

Muzhir Shaban Al-Ani
ISBN13: 9781466658080|ISBN10: 1466658088|EISBN13: 9781466658097
DOI: 10.4018/978-1-4666-5808-0.ch014
Cite Chapter Cite Chapter

MLA

Al-Ani, Muzhir Shaban. "Biometrics: Identification and Security." Multidisciplinary Perspectives in Cryptology and Information Security, edited by Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, IGI Global, 2014, pp. 343-364. https://doi.org/10.4018/978-1-4666-5808-0.ch014

APA

Al-Ani, M. S. (2014). Biometrics: Identification and Security. In S. Sadkhan Al Maliky & N. Abbas (Eds.), Multidisciplinary Perspectives in Cryptology and Information Security (pp. 343-364). IGI Global. https://doi.org/10.4018/978-1-4666-5808-0.ch014

Chicago

Al-Ani, Muzhir Shaban. "Biometrics: Identification and Security." In Multidisciplinary Perspectives in Cryptology and Information Security, edited by Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, 343-364. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-5808-0.ch014

Export Reference

Mendeley
Favorite

Abstract

It is important to know that absolute security does not exist, and the main goal of the security system is to reach an optimal approach that satisfies the customer requirements. Biometrics is a small part of the security system that aims to replace a traditional password or a key. Biometrics offer higher security levels by simply ensuring that only the authorized people have access to sensitive data. It is easy to copy or get a traditional password using different methods (legal or illegal), but it is difficult to copy a key of biometric pattern such as iris or fingerprint or other patterns. Recent years have seen a boom in the use of biometric techniques in the design of modern equipment to maintain the information and personal identification. This chapter focuses on biometrics (types and technologies), personal identification, and specifications, and then how to implement these performances in security. Finally, a future aspect of merging technologies and disciplines is a good issue to treat via a specific concentration of information technology. In this chapter, two approached are proposed: a novel thinning algorithm for fingerprint recognition and a novel e-passport based on personal identification.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.