Biometric Technologies in Recognition Systems: A Survey
Main Article Content
Abstract
The ability to recognize people uniquely and to associate personal attributes such as name and nationality with them has been very important to the fabric of human society. Nowadays, modern societies have an explosion in population growth and increased mobility which necessitated building advanced identity management systems for recording and maintaining people’s identities. In the last decades, biometrics has played an important role in recognizing people instead of traditional ways such as passwords and keys which can be forgotten or be stolen. Biometric systems employ physiological and/or behavioral characteristics of people to verify their identities. There are different biometric modalities that can be used to recognize people such as fingerprints, face, hand geometry, voice, iris, signature, etc. In this paper, a comprehensive overview have been provided on the major issues of biometric systems including general biometric system architecture, major biometric traits, biometric systems performance, and some relevant works.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Tikrit Journal of Pure Science is licensed under the Creative Commons Attribution 4.0 International License, which allows users to copy, create extracts, abstracts, and new works from the article, alter and revise the article, and make commercial use of the article (including reuse and/or resale of the article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made, and the licensor is not represented as endorsing the use made of the work. The authors hold the copyright for their published work on the Tikrit J. Pure Sci. website, while Tikrit J. Pure Sci. is responsible for appreciate citation of their work, which is released under CC-BY-4.0, enabling the unrestricted use, distribution, and reproduction of an article in any medium, provided that the original work is properly cited.
References
[1] Chen, Ching-Han, and Chia Te Chu. (2006). "Fusion of face and iris features for multimodal biometrics." In International Conference on Biometrics, Springer, Berlin Heidelberg, pp 571-580.
[2] Vats, Sandhya, and Harkeerat Kaur. (2016). "A Comparative Study of Different Biometric Features." International Journal of Advanced Research in Computer Science 7(6), pp 169-171 .
[3] Marcel, Sébastien. (2013). "BEAT–biometrics evaluation and testing." Biometric technology today 2013, 1(2), pp 3-22.
[4] Dunstone, Ted, and Neil Yager. (2008). "Biometric system and data analysis: Design, evaluation, and data mining", Springer Science & Business Media, pp 45-69.
[5] Jain, Anil, Arun A. Ross, and Karthik Nandakumar. (2011). "Introduction to biometrics", Springer Science & Business Media, pp 40-55.
[6] Aly, Ola M., Houda M. Onsi, Gouda I. Salama, and Tarek A. Mahmoud. (2012). "Multimodal biometric system using iris, palmprint and finger knuckle." International journal of computer applications 57(16), pp (112-125).
[7] Miura, Naoto, Akio Nagasaka, and Takafumi Miyatake. (2007). "Extraction of finger-vein patterns using maximum curvature points in image profiles." IEICE TRANSACTIONS on Information and Systems 90(8), pp 1185-1194 .
[8] Freeman, William T., and Michal Roth. (1995). "Orientation histograms for hand gesture
recognition." In International workshop on automatic face and gesture recognition,12, pp 296-301 .
[9] Jain, Anil, Lin Hong, and Sharath Pankanti. (2000). "Biometric identification." Communications of the ACM 43(2) , pp 90-98.
[10] Jain, Anil K., Arun A. Ross, and Karthik Nandakumar. (2011) . "Introduction." In Introduction to Biometrics" ,Springer, Boston, MA, pp 1-49.
[11] Bhatt, Shanthi, and T. Santhanam. (2013). "Keystroke dynamics for biometric authentication—A survey." In Pattern Recognition, Informatics and Mobile Engineering (PRIME), International Conference on, IEEE, pp 17-23.
[12] Delac, Kresimir, and Mislav Grgic. (2004). "A survey of biometric recognition methods." In Electronics in Marine, 2004. Proceedings Elmar 2004. 46th International Symposium, IEEE, pp 184-193 .
[13] Prabhakar, Salil, Sharath Pankanti, and Anil K. Jain. (2003). "Biometric recognition: Security and privacy concerns." IEEE security & privacy 99(2) , pp 33-42.
[14] Win, Zin Mar, and Myint Myint Sein. (2011). "Texture feature based fingerprint recognition for low quality images." In Micro-NanoMechatronics and Human Science (MHS), International Symposium on, IEEE, pp 333-338,.
[15] Jain, Anil K., Sunpreet S. Arora, Kai Cao, Lacey Best-Rowden, and Anjoo Bhatnagar. (2017). "Fingerprint Recognition of Young Children." IEEE Transactions on Information Forensics and Security 12(7), pp 1501-1514.
[16] Estrebou, Cesar, Laura Lanzarini, and Waldo Hasperué. ,(2010). "Voice recognition based on probabilistic SOM." In Proceedings of the Conference: Conferencia Latinoamericana en Informática, At Asunción, Paraguay.
[17] Motlicek, Petr, Subhadeep Dey, Srikanth Madikeri, and Lukas Burget. ( 2015). "Employment of subspace gaussian mixture models in speaker recognition." In Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on, IEEE, pp 4445-4449 .
[18] Ghahabi, Omid, and Javier Hernando. (2015). "Restricted Boltzmann machine supervectors for speaker recognition." In Acoustics, Speech and Signal Processing (ICASSP),International Conference on, IEEE, pp 4804-4808 .
[19] Zhong, Yu, Yunbin Deng, and Anil K. Jain. (2012) "Keystroke dynamics for user authentication." In Computer Vision and Pattern Recognition Workshops (CVPRW), IEEE Computer Society Conference on, IEEE, pp 117-123.
[20] Ahmed, Ahmed A., and Issa Traore. (2014). "Biometric recognition based on free-text keystroke dynamics." IEEE transactions on cybernetics 44(4) pp 458-472.
[21] Zhou, Qianqian, Yanni Yang, Feng Hong, Yuan Feng, and Zhongwen Guo. (2016). "User Identification and Authentication Using Keystroke Dynamics with Acoustic Signal." In Mobile Ad-Hoc and Sensor Networks (MSN), 12th International Conference on, IEEE, pp 445-449 .
[22] Ahmed.T and Al-Senaidy.A.M. (2013). "Software tools in bioinformatics and issues faced implementation." Global Engineers & Technologists review.
[23] Jean-Michel Claverie. (2000). "From bioinformatics to computational biology." Cold spring Horbor Laboratory Press.
[24] Khalid Raza. (2012). "Application of data mining in bioinformatics." Indian journal of computer science and engineering Vol 1 No 2, 114-118.