Detail publikace

Biometric Security Systems

ORSÁG, F., DRAHANSKÝ, M.

Originální název

Biometric Security Systems

Anglický název

Biometric Security Systems

Jazyk

en

Originální abstrakt

This paper describes the design of a Biometric Security Systems. At the beginning we introduce some biometrical attributes, especially the fingerprints, and we discuss their advantages and disadvantages when used in Biometric Security Systems. On example of the well understood fingerprint method we try to estimate the upper limit for the amount of available information on a fingerprint. Next part describes the architecture of such Biometric Security System focused on fingerprint and voice (speech) recognition. A qualified draft of the design is shown in this chapter. Finally the last chapter outlines the transformation of a biometric information key from fingerprint and the comparison of this key.

Anglický abstrakt

This paper describes the design of a Biometric Security Systems. At the beginning we introduce some biometrical attributes, especially the fingerprints, and we discuss their advantages and disadvantages when used in Biometric Security Systems. On example of the well understood fingerprint method we try to estimate the upper limit for the amount of available information on a fingerprint. Next part describes the architecture of such Biometric Security System focused on fingerprint and voice (speech) recognition. A qualified draft of the design is shown in this chapter. Finally the last chapter outlines the transformation of a biometric information key from fingerprint and the comparison of this key.

Dokumenty

BibTex


@inproceedings{BUT10915,
  author="Martin {Drahanský} and Filip {Orság} and Luděk {Smolík}",
  title="Biometric Security Systems",
  annote="This paper describes the design of a Biometric Security Systems. At the beginning we introduce some biometrical attributes, especially the fingerprints, and we discuss their advantages and disadvantages when used in Biometric Security Systems. On example of the well understood fingerprint method we try to estimate the upper limit for the amount of available information on a fingerprint. Next part describes the architecture of such Biometric Security System focused on fingerprint and voice (speech) recognition. A qualified draft of the design is shown in this chapter. Finally the last chapter outlines the transformation of a biometric information key from fingerprint and the comparison of this key.",
  address="ECOM-MONITOR",
  booktitle="Sborník Mikulášské kryptobesídky 2003",
  chapter="10915",
  institution="ECOM-MONITOR",
  year="2003",
  month="december",
  pages="1--10",
  publisher="ECOM-MONITOR",
  type="conference paper"
}