Detail publikace

Biometric Security Systems: Robustness of the Fingerprint and Speech Technologies

Originální název

Biometric Security Systems: Robustness of the Fingerprint and Speech Technologies

Anglický název

Biometric Security Systems: Robustness of the Fingerprint and Speech Technologies

Jazyk

en

Originální abstrakt

This paper deals with the combination of more biometric technologies for access systems at the beginning and describes the rules for combination of different biometric systems. Pros and cons of biometric systems are discussed too. Further, design of the biometric security system is introduced. The proposal of this system allows the generation of biometric keys, which can be used for cryptographic purposes. The theoretical estimations of fingerprint and speech robustness (entropy) are described in the end. In conclusion section is discussed the practical usage and problems of this system.

Anglický abstrakt

This paper deals with the combination of more biometric technologies for access systems at the beginning and describes the rules for combination of different biometric systems. Pros and cons of biometric systems are discussed too. Further, design of the biometric security system is introduced. The proposal of this system allows the generation of biometric keys, which can be used for cryptographic purposes. The theoretical estimations of fingerprint and speech robustness (entropy) are described in the end. In conclusion section is discussed the practical usage and problems of this system.

BibTex


@inproceedings{BUT17116,
  author="Martin {Drahanský} and Filip {Orság}",
  title="Biometric Security Systems: Robustness of the Fingerprint and Speech Technologies",
  annote="This paper deals with the combination of more biometric technologies for access systems at the beginning and describes the rules for combination of different biometric systems. Pros and cons of biometric systems are discussed too. Further, design of the biometric security system is introduced. The proposal of this system allows the generation of biometric keys, which can be used for cryptographic purposes. The theoretical estimations of fingerprint and speech robustness (entropy) are described in the end. In conclusion section is discussed the practical usage and problems of this system.",
  booktitle="BT 2004 - International Workshop on Biometric Technologies",
  chapter="17116",
  year="2004",
  month="june",
  pages="99--103",
  type="conference paper"
}