Biometric System Introduction with its various Identification Techniques

Authors

  • Gaurav Patni  School of Computer & Systems Sciences, Jaipur National University, Jaipur, Rajasthan, India
  • Dr. Shilpa Sharma  School of Computer & Systems Sciences, Jaipur National University, Jaipur, Rajasthan, India

Keywords:

Unique ID/IDs, biometric identification, biometric/biometric recognition, biometric registration/enrollment, verification procedure, template, transactions, fingerprint, law enforcement.

Abstract

As per the traditional identification system for identifying any human being, there is easy way of marking the human using Biometric identification system. The paper presents the development of human identification system based on fingerprint identification. These ways of identifying any human will help us for securing his/her highly secure identification and personal verification. In order to tackle the increasing incidents of security breaches and frauds, every organization needs a full proof technology that can provide security and safety to individuals and the transactions that the individuals make. In a lot of articles, the researchers explores the need for biometrics in state and local governments, in the military, in commercial applications, Airports and Aircrafts to ensure the proper security system for identifying the human. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from Biometrics. Also here the various markets and the potential revenue are analyzed.

References

[1]. Shelly Batra, Sandeep Ahuja, Abhishek Sinha, and Nicholas Gordon, 2012 in Proceedings of M4D 2012 28-29 February 2012 New Delhi, India, “eCompliance : Enhancing Tuberculosis Treatment with Biometric and Mobile Technology”, pp 35-40, 2012 [2]. Michael Paik, Navkar Samdaria, Aakar Gupta, Julie Weber, Nupur Bhatnagar, Shelly Batra, Manish Bharadwaj, and William Thies, 2010 , in Proceeding NSDR’10 Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions, Article No. 4, “A Biometric Attendance Terminal and its Application to Health Programs in India”, pp 1-6, 2010 [3]. Nupur Bhatnagar, Abhishek Sinha, Navkar Samdaria, Aakar Gupta, Shelly Batra, Manish Bhardwaj, and William Thies, 2012 in Springer, “Biometric Monitoring as a Persuasive Technology : Ensuring Patients Visit Health Centers in India’s Slums”, pp. 169-180, 2012 [4]. Seema Rao, and Prof. K.J.Satoa, 2013, in International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 4, “An Attendance Monitoring System Using Biometrics Authentication”, pp. 379 – 383, April 2013 [5]. O. Shoewu, and O.A.Idowu, 2012, in The Pacific Journal of Science and Technology, Vol 13, No. 1, “Development of Attendance Management System using Biometrics”, pp. 300-307, May 2012 (Spring) [6]. Tiwalade O. Majekodunmi, and Francis E. Idachaba, 2011, in Proceedings of the World Congress of Engineering WCE – 2011, July 6-8, 2011, London, U.K., Vol II, “A Review of the Fingerprint, Speaker Recognition, Face Recognition and Iris Recognition Based Biometric Identification Technologies”, 2011 [7]. Michael H. Indico, Luisa M. Lanciso, and Ana L. Vargas, 2014 , in International Journal of Scientific and Research Publications, Vol 4, Issue 1, “Mobile Monitoring and Inquiry System Using Fingerprint Biometrics and SMS Technology”, pp. 1-6, January 2014 [8]. Pallavi Verma, and Namit Gupta, 2013, in International Journal of Science and Research (IJSR), Vol 2, Issue 10, “Fingerprint Based Student Attendance System Using GSM”, pp. 128 – 131, October 2013 [9]. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, and Saumya Mahapatra, 2012, in Int. J. Computer Technology & Applications, Vol 3 (2), “Unique ID Management”, pp. 520-524, 2012 [10]. K. Jaikumar, M. Santhosh Kumar, S. Rajkumar, and A. Sakthivel, 2015 , in International Journal of Research in Engineering and Technology, Vol 4, Issue 2, “Fingerprint Based Student Attendance System with SMS Alert to Parents”, pp. 293-297, Feb 2015 [11]. Smita S. Mudholkar, Pradnya M. Shende, Milind V. Sarode, “Biometrics Authentication Technique for Intrusion Detection Systems Using fingerprint Recognition”, in International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol 2, No. 1, pp. 57-65, February 2012 [12]. Gowthami P, and Dr. P. Sathishkumar, 2016 , in International Journal of Innovative Research in Advanced Engineering (IJIRAE), Vol 3, Issue 4, “An Andriod Based Patient Monitoring System”, pp. 54-57, April 2016 [13]. Mohd Idzwan, Mohd Salleh, Mohamad Rahimi, Mohamad Rosman, Raja Abdullah, and Raja Yaacob, 2011, in International Conference on Computer Applications and Industrial Electronics (ICCAIE 2011) - IEEE, “Biometric Authentication for Securing Life Cycle Management of Electronic Patient Records”, pp. 602-606, 2011 [14]. Abhishek Sinha, Shashank Batra, Dr. Shelly Batra, and Sandeep Ahuja, 2014, in Indian Journal of Medical Informatics – official Organ of Indian Association for Medical Informatics (IAMI), “Using Biometrics to Turn the Tap Off of Multi Drug Resistant TB (MDR TB)”, pp.38-41, 2014 [15]. Adebayo Omotosho, Omotanwa Adegbola, Barakat Adelakin, Adeyemi Adelakun, and Justice Emuoyibofarhe, 2014 , in Journal of Biology, Agriculture and Healthcare, Vol 4, No. 18, “Exploiting Multimodal Biometrics in E-Privacy Scheme for Electronic Health Records”, pp. 22-33, 2014 [16]. Shirish Joshi, 2016, in International Journal for Scientific Research & Development (IJSRD), Vol 3, Issue 11, “BIOMETRICS : Selecting the Best Solution”, pp. 206-208, 2016 [17]. Jayant V. Kulkarni, Bhushan D. Patil, and Raghunath S. Holambe, 2006 , in Pattern Recognition Society : Published by Elsevier Ltd., “Orientation feature for fingerprint matching”, pp. 1551-1554, 2006 [18]. Mangesh Raut, Sheetal Kokate, Sandeep Shinde, Sushant Karpe, and Mr. Sachin Barahate, 2015 , in International Journal for Scientific Research & Development (IJSRD), Vol 3, Issue 1, “Virtual Biometric Fingerprint Attendance System”, pp. 511-513, 2015 [19]. Nitin Sambharwal, and Dr. Chander Kant, 2015, in International Journal for Scientific Research & Development (IJSRD), Vol 3, Issue 2, “Biometrics Fingerprint Sensors : An Introduction”, pp. 1019-1025, 2015 [20]. Divya K V, Akansha Pandey, Manoj Sharma, Meghashrita Kashyap, and Divya Kumari, 2016, in International Journal for Scientific Research & Development (IJSRD), Vol 3, Issue 12, “A Survey on Biometric Authentication for Accident Victims During Emergencies” pp. 992-994, 2016 [21]. Chirag Singh Sisodia, Aparajiit Shrivastava, 2015, in International Journal for Scientific Research & Development (IJSRD), Vol 3, Issue 9, “A Survey on Network and Security Authentication using Biometrics”, pp. 236-241, 2015 [22]. Keerti Arse, 2014, in International Journal for Scientific Research & Development (IJSRD), Vol 2, Issue 9, “A Survey of Automated Biometric Authentication Techniques”, pp. 906-908, 2014 [23]. Anjana P, Betty P, 2015, in International Journal for Scientific Research & Development (IJSRD), Vol 2, Issue 12, “An Elaborated View on Biometric Template Protection”, pp. 490-495, 2015 [24]. Koichi Ito, Ayumi Morita, Takafumi Aoki, Tatsuo Higuchi, Hiroshi Nakajima, and Koji Kobayashi, 2005, in ICIP – IEEE International Conference, “A Fingerprint Recognition Algorithm Using Phase-Based Image Matching for Low-Quality Fingerprints”, pp. II-33 – II-36, 2005 [25]. Rubal Jain, Dr. Chander Kant, 2015, in International Journal for Scientific Research & Development (IJSRD), Vol 3, Issue 2, “Attacks on Biometric Systems : An Overview”, pp. 1090-1094, 2015 [26]. Eshraf El-Sisi, 2011, in The International Arab Journal of Information Technology, Vol 8, No. 4, “Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Based on Gabor Filter”, pp. 355-363, October 2011 [27]. Adewole K.S., Abdulsalam S.O., Babatund e R.S., Shittu T.M., and Oloyede M.O., 2014, in Computer Engineering and Intelligent Systems, Vol 5, No. 2, “Development of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary Institution”, pp. 62-70, 2014 [28]. Norshidah Katiran, Helmy Abdul Wahab, Jamal Rasyid, and Abdul Rahman, 2010 , ” in Proceedings of EnCon2010 3rd Engineering Conference on Advancement in Mechanical and Manufacturin g for Sustainable Environment April 14-16, 2010, Kuching, Sarawak, Malaysia, “Development of Attendance System using Biometric Fingerprint Identification pp. 1-4, 2010 [29]. Hemlata Patel, and Pallavi Asrodia, 2012, in International Journla of Electrical, Electronics and Computer Engineering, vol1, No. 1, “Employee Attendance Management System Using Fingerprint Recognition”, pp. 37-40, 2012 [30]. Oloyede Muhtahir O., Adedoyin Adeyinka O., and Adewole Kayode S., 2013, in International Journal of Applied Information Systems (IJAIS), Vol 5, No. 3, “Fingerprint Biometric Authentication for Enhancing Staff Attendance System”, pp. 19-24, February 2013 [31]. Devendra Kumar Yadav, Sumit Singh, Prof. Shashank Pujari, and Pragyan Mishra, 2015, in International Journal of Advanced Research in Electrical , Electronics and Instrumentation Engineering, Vol 4, Issue 6, “Fingerprint Based Attendance System Using Microcontroller and LabView”, pp. 5111-5121, June 2015 [32]. Ravi Subban, and Dattatreya P. Mankame, 2013, in Lecture Notes on Software Engineering, Vol 1, No. 2, “A Study of Biometric Approach Using Fingerprint Recognition”, pp. 209-213, May 2013

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Gaurav Patni, Dr. Shilpa Sharma, " Biometric System Introduction with its various Identification Techniques, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.866-871, May-June-2017.