Biometric Security

Biometric Security

Muzhir Shaban Al-Ani
ISBN13: 9781466665835|ISBN10: 1466665831|EISBN13: 9781466665842
DOI: 10.4018/978-1-4666-6583-5.ch011
Cite Chapter Cite Chapter

MLA

Al-Ani, Muzhir Shaban. "Biometric Security." Handbook of Research on Threat Detection and Countermeasures in Network Security, edited by Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, IGI Global, 2015, pp. 199-217. https://doi.org/10.4018/978-1-4666-6583-5.ch011

APA

Al-Ani, M. S. (2015). Biometric Security. In A. Al-Hamami & G. Waleed al-Saadoon (Eds.), Handbook of Research on Threat Detection and Countermeasures in Network Security (pp. 199-217). IGI Global. https://doi.org/10.4018/978-1-4666-6583-5.ch011

Chicago

Al-Ani, Muzhir Shaban. "Biometric Security." In Handbook of Research on Threat Detection and Countermeasures in Network Security, edited by Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, 199-217. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6583-5.ch011

Export Reference

Mendeley
Favorite

Abstract

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.