International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Survey Paper | Information Technology | India | Volume 3 Issue 5, May 2014

Different Modalities in Biometric Detection

Mukesh Rinwa, Bharat Borkar

Many organizations are using different kinds of automated persons identifications systems which improve the users needs; satisfaction; and efficiency to secure critical resource. In this paper we are giving the information on the recent developments in persons identification using Biometric technology method. By using this technology we are to ensure to identify a person weather he/she is real person or a fake person. The objective is to increase the security of biometric recognization frameworks; by adding liveness assessment in a fast; user-friendly; and non-intrusive manner. In this paper we are giving information about different modalities such as fingerprint; face recognition; and iris to study against the different types of vulnerabilities attacks.

Keywords: Biometric recognization, liveness detection, image quality assessment, attacks, security

Edition: Volume 3 Issue 5, May 2014

Pages: 503 - 506


How to Cite this Article?

Mukesh Rinwa, Bharat Borkar, "Different Modalities in Biometric Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131663, Volume 3 Issue 5, May 2014, 503 - 506

19 PDF Views | 14 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'attacks'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2137 - 2142

Multiple Prevention Techniques for Different Attacks in Web Application

Tejal V. Kasture, Pinaki P. Dixit, Pooja S. Ovhal, Gayatri Sathe, Neelam A. Zambre

Share this article

Similar Articles with Keyword 'security'

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 1459 - 1462

An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S, Manjula V, Gnanashree S

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this article

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1750 - 1753

Currency Recognition System Using Image Processing

Devashree R. Patwardhan, Swarali Namjoshi, Vrinda Valunj, Pratibha Shikhare, Prof. Anjali Shejul

Share this article

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1945 - 1950

Rooting & Custom Rom in Android

Pranit A. Kamble, Dr. Jyoti Kharade

Share this article

Top