International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 119

Survey Paper | Information Technology | India | Volume 3 Issue 5, May 2014


Different Modalities in Biometric Detection

Mukesh Rinwa | Bharat Borkar


Abstract: Many organizations are using different kinds of automated persons identifications systems which improve the users needs; satisfaction; and efficiency to secure critical resource. In this paper we are giving the information on the recent developments in persons identification using Biometric technology method. By using this technology we are to ensure to identify a person weather he/she is real person or a fake person. The objective is to increase the security of biometric recognization frameworks; by adding liveness assessment in a fast; user-friendly; and non-intrusive manner. In this paper we are giving information about different modalities such as fingerprint; face recognition; and iris to study against the different types of vulnerabilities attacks.


Keywords: Biometric recognization, liveness detection, image quality assessment, attacks, security


Edition: Volume 3 Issue 5, May 2014,


Pages: 503 - 506


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Mukesh Rinwa, Bharat Borkar, "Different Modalities in Biometric Detection", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 503-506, https://www.ijsr.net/get_abstract.php?paper_id=20131663

Similar Articles with Keyword 'attacks'

Downloads: 0

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2487 - 2494

Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices

Jeevan Manda [4]

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda [4]

Share this Article
Top