Knight, Helen
December 2003
Engineer (00137758);12/5/2003, Vol. 292 Issue 7641, p25
Evaluates the cost and effectiveness of the proposed biometric passports. Plan of Great Britain's Passport Office to incorporate a chip with biometric information; Number of countries with U.S. visa waiver status; Possible flaws in the system.


Related Articles

  • Technologization of Security: Management of Uncertainty and Risk in the Age of Biometrics. Ceyhan, Ayse // Surveillance & Society;Apr2008, Vol. 5 Issue 2, p102 

    Contemporary security policies are characterized by a dramatic focus on high technology like biometrics as a security enabler. The process of the technologization of security, i.e. the making of technology the centerpiece of security systems and its perception as an absolute security provider,...

  • A HUMAN IRIS RECOGNITION TECHNIQUES TO ENHANCE E-SECURITY ENVIRONMENT USING WAVELET TRASFORM. Ali, Jafar M. H.; Hassanien, Aboul Ella // Proceedings of the IADIS International Conference on WWW/Interne;Nov2003, p572 

    In this paper, efficient biometric security techniques for iris recognition system with high performance and high confidence are described. The system is based on an empirical analysis of the iris image and it is split in several steps using local image properties. The system steps are capturing...

  • The Comparison of Iris Recognition using Principal Component Analysis, Log Gabor and Gabor Wavelets. Patil, Pravin S.; Kolhe, S. R.; Patil, R. V.; Patil, P. M. // International Journal of Computer Applications;Apr2012, Vol. 43, p29 

    With an ever growing emphasis on security systems, automated personal identification based on biometrics has been getting extensive focus in both research and practical over the last decade. The methods for iris recognition mainly focus on feature representation and matching. As we known...

  • A New Direction for Biometrics. Emigh, Jacqueline // Government Security;Apr2006, Vol. 5 Issue 3, p34 

    The article presents information on the biometric identification system, a part of security management in the United States. It reflects on the prevailing limitation of this system that it is still based on an old-style fingerprinting. But the government agencies are trying to modify it with...

  • Multibiometric: Feature Level Fusion Using FKP Multi-Instance biometric. AlMahafzah, Harbi; Imran, Mohammad; Sheshadri, H. S. // International Journal of Computer Science Issues (IJCSI);Jul2012, Vol. 9 Issue 4, p252 

    This paper proposed the use of multi-instance feature level fusion as a means to improve the performance of Finger Knuckle Print (FKP) verification. A log-Gabor filter has been used to extract the image local orientation information, and represent the FKP features. Experiments are performed...

  • A Survey on Iris Recognition. Birgale, Lenina; Kokare, Manesh // IUP Journal of Electrical & Electronics Engineering;Oct2009, Vol. 2 Issue 4, p7 

    As the demand for security systems is increasing exponentially day by day, there has been a rigorous search for different verification and identification techniques. Facial features, voice patterns, hand geometry, retinal patterns, vein patterns, signature dynamics, voice verification, facial...

  • On-line Handwritten Signature Identification: The Basics. Fotak, Tomislav; Koruga, Petra; Bača, Miroslav // Central European Conference on Information & Intelligent Systems;9/21/2011, p139 

    Handwritten signature is widely accepted and collectable biometric characteristic. Great entropy makes this characteristic suitable for research and development of new methods for personal authentication and identification. While development of authentication methods based on this biometric...

  • Sudan.  // AirGuide Online.com;10/26/2009, p25 

    The article reports on the changes in the new biometric passports issued by government in Sudan. Accordingly, it indicates that a discriminatory phrase has been removed, creating a way for Sudanese citizens to travel to Israel without fear of invalidating their travel document. Also mentioned is...

  • Number Driven. Punj, Shweta // Business Today;1/8/2012, Vol. 21 Issue 1, p187 

    The article discusses the advantages and disadvantages of the Unique Identification Authority of India (UIDAI), which aims to provide every citizen a unique identification number. People who gets a UID, or Aadhaar number, will have to be fingerprinted or eye-scanned. Its first uses would be in...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics