Detail publikace
Biometric Security Systems
ORSÁG, F., DRAHANSKÝ, M.
Originální název
Biometric Security Systems
Anglický název
Biometric Security Systems
Jazyk
en
Originální abstrakt
This paper describes the design of a Biometric Security Systems. At the beginning we introduce some biometrical attributes, especially the fingerprints, and we discuss their advantages and disadvantages when used in Biometric Security Systems. On example of the well understood fingerprint method we try to estimate the upper limit for the amount of available information on a fingerprint. Next part describes the architecture of such Biometric Security System focused on fingerprint and voice (speech) recognition. A qualified draft of the design is shown in this chapter. Finally the last chapter outlines the transformation of a biometric information key from fingerprint and the comparison of this key.
Anglický abstrakt
This paper describes the design of a Biometric Security Systems. At the beginning we introduce some biometrical attributes, especially the fingerprints, and we discuss their advantages and disadvantages when used in Biometric Security Systems. On example of the well understood fingerprint method we try to estimate the upper limit for the amount of available information on a fingerprint. Next part describes the architecture of such Biometric Security System focused on fingerprint and voice (speech) recognition. A qualified draft of the design is shown in this chapter. Finally the last chapter outlines the transformation of a biometric information key from fingerprint and the comparison of this key.
Dokumenty
BibTex
@inproceedings{BUT10915,
author="Martin {Drahanský} and Filip {Orság} and Luděk {Smolík}",
title="Biometric Security Systems",
annote="This paper describes the design of a Biometric Security Systems. At the beginning we introduce some biometrical attributes, especially the fingerprints, and we discuss their advantages and disadvantages when used in Biometric Security Systems. On example of the well understood fingerprint method we try to estimate the upper limit for the amount of available information on a fingerprint. Next part describes the architecture of such Biometric Security System focused on fingerprint and voice (speech) recognition. A qualified draft of the design is shown in this chapter. Finally the last chapter outlines the transformation of a biometric information key from fingerprint and the comparison of this key.",
address="ECOM-MONITOR",
booktitle="Sborník Mikulášské kryptobesídky 2003",
chapter="10915",
institution="ECOM-MONITOR",
year="2003",
month="december",
pages="1--10",
publisher="ECOM-MONITOR",
type="conference paper"
}