Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Biometric identification

Published: 01 February 2000 Publication History
First page of PDF

References

[1]
Biometrics Consortium homepage; www.biometrics.org.
[2]
Chellappa, R., Wilson, C., and Sirohey, A. Human and machine recognition of faces: A survey. In Proceedings of the IEEE 83, 5 (1995) 705-740.
[3]
Daugman, J.G. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. and Machine Intell. 15, 11 (1993)1148-1161.
[4]
Furui, S. Recent advances in speaker recognition. Pattern Recognition Letters 18 (1997) 859-872.
[5]
Jain, A.K. Bolle, R. and Pankanti S. (eds.). Biometrics: Personal Identification in Networked Society. Kluwer, New York, 1999.
[6]
Jain, A.K., Hong, L., Pankanti, S., and Bolle, R. An identityauthentication system using fingerprints. In Proceedings of the IEEE 85, 9 (1997), 1365-1388.
[7]
Nalwa, V. Automatic on-line signature verification. In Proceedings of the IEEE 85, 2 (1997), 213-239.
[8]
Miller, B. Vital signs of identity. IEEE Spectrum 31, 2 (1994), 22-30.
[9]
Sidlauskas, D.R. 3D hand profile identification apparatus. U.S. Patent No. 4736203, 1988.
[10]
Hill, R.B. Apparatus and method for identifying individuals through their retinal vasculature patterns. US Patent No. 4109237, 1978.
[11]
Prokoski, F.K. Disguise detection and identification using infrared imagery. In the Proceedings of SPIE, Optics, and Images in Law Enforcement II. A.S. Hecht, Ed. (Arlington, VA, May, 1982), 27-31.
[12]
Wayman, J.L. Error Rate Equations for the General Biometric System. IEEE Robotics & Automation 6, 9 (Jan. 1999), 35-48.

Cited By

View all
  • (2024)Fingerprint Sequencing: An Authentication Mechanism that Integrates Fingerprints and a Knowledge-based Methodology to Promote Security and UsabilityEngineering, Technology & Applied Science Research10.48084/etasr.725014:3(14233-14239)Online publication date: 1-Jun-2024
  • (2024)Usability Analysis of a Virtual Reality Exposure Therapy Serious Game for Blood Phobia Treatment: PhobosElectronics10.3390/electronics1307135013:7(1350)Online publication date: 3-Apr-2024
  • (2024)Voice authentication module using mel-cepstral coefficientsHerald of Dagestan State Technical University. Technical Sciences10.21822/2073-6185-2024-51-2-77-8251:2(77-82)Online publication date: 25-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 43, Issue 2
Feb. 2000
109 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/328236
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 February 2000
Published in CACM Volume 43, Issue 2

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2,612
  • Downloads (Last 6 weeks)341
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Fingerprint Sequencing: An Authentication Mechanism that Integrates Fingerprints and a Knowledge-based Methodology to Promote Security and UsabilityEngineering, Technology & Applied Science Research10.48084/etasr.725014:3(14233-14239)Online publication date: 1-Jun-2024
  • (2024)Usability Analysis of a Virtual Reality Exposure Therapy Serious Game for Blood Phobia Treatment: PhobosElectronics10.3390/electronics1307135013:7(1350)Online publication date: 3-Apr-2024
  • (2024)Voice authentication module using mel-cepstral coefficientsHerald of Dagestan State Technical University. Technical Sciences10.21822/2073-6185-2024-51-2-77-8251:2(77-82)Online publication date: 25-Jul-2024
  • (2024)Who Wants to be Legible? Digitalization and Intergroup Inequality in KenyaComparative Political Studies10.1177/00104140241276971Online publication date: 11-Sep-2024
  • (2024)Drinking Chai with Your (AI) Programming Partner: Value Tensions in the Tokenization of Future Human-AI Collaborative WorkProceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for Work10.1145/3663384.3663390(1-15)Online publication date: 25-Jun-2024
  • (2024)SigningRing: Signature-based Authentication using Inertial Sensors on a Ring Form-factorProceedings of the Workshop on Body-Centric Computing Systems10.1145/3662009.3662019(11-16)Online publication date: 3-Jun-2024
  • (2024)Heart and Soul: The Ethics of Biometric Capture in Immersive Artistic PerformanceProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642309(1-23)Online publication date: 11-May-2024
  • (2024)Detection technology for photon energy below the Schottky barrierInfrared Technology and Applications L10.1117/12.3013622(71)Online publication date: 7-Jun-2024
  • (2024)Adapter-Based Selective Knowledge Distillation for Federated Multi-Domain Meeting SummarizationIEEE/ACM Transactions on Audio, Speech, and Language Processing10.1109/TASLP.2024.341431332(3694-3708)Online publication date: 2024
  • (2024)Employee Fingerprint Identification Management System Based on Bidirectional ResNext Network with Triplet Loss2024 8th International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS)10.1109/ICMSS61211.2024.00016(48-52)Online publication date: 12-Jan-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media