Biometrics as an Integration Tool

September 2005
Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p40
Trade Publication
Highlights the use of biometrics as an integrated security system tool. Background on biometric technology; Cost of the technology; Role of the technology in disaster preparedness; Areas of the system where biometrics is most effective. INSET: Faster Validation, Response.


Related Articles

  • Multibiometric: Feature Level Fusion Using FKP Multi-Instance biometric. AlMahafzah, Harbi; Imran, Mohammad; Sheshadri, H. S. // International Journal of Computer Science Issues (IJCSI);Jul2012, Vol. 9 Issue 4, p252 

    This paper proposed the use of multi-instance feature level fusion as a means to improve the performance of Finger Knuckle Print (FKP) verification. A log-Gabor filter has been used to extract the image local orientation information, and represent the FKP features. Experiments are performed...

  • Biometrics get the thumbs up. Jacobs, Martin // SC Magazine: For IT Security Professionals (UK Edition);Oct2004, p27 

    This article focuses on the significance of good planning before implementing biometrics. It is important for any organizations implementing a biometric project do so in a joined-up initiative. From the start, they should consider the underlying requirements, including implementation plans and...

  • Security Decisions After 9/11.  // SDM: Security Distributing & Marketing;Mar2004, Vol. 34 Issue 3, p17 

    Reports on the move to upgrade security systems in the U.S. in light of the September 11, 2001 terrorist attack by leaders participating in the Security Industry Association's Corporate Security Roundtable in Miami. Objective of the move to help reassure the public via anti-terrorism measures;...

  • Biometrics and Access Control in the Digital Age. Gates, Kelly // NACLA Report on the Americas;Mar/Apr2006, Vol. 39 Issue 5, p35 

    The article focuses on the use of biometrics in human recognition and identification. The system is being used to determine individual identities in part by digitizing body parts. The two different types of biometric applications are verification and identification. Other uses of biometrics...

  • NES Prepared for Global Biometrics Evolution. Durand, Augusto // Caribbean Business;7/21/2005, Vol. 33 Issue 28, pS14 

    The article reports that Northwest Electronic Security (NES), a division of Northwest Security Management Inc., started operations in 1982 as a local security-guard organization. By 2000, the company entered the electronic-security business. Today, it is a key player in biometric security...

  • 'BIG BROTHER' BIOMETRICS? Williams, Steve // Credit Union Management;Apr2005, Vol. 28 Issue 4, p44 

    Focuses on the inefficacy of biometric technology in providing securing data identification of the consumers in the U.S. Causes of the slow growth in biometric technology in credit unions; Functions of biometrics in check cashing process; Utilization of biometrics and smart cards for a higher...

  • Facing the Threat: Invading the Body for National Security. Wade, Lindsey // Knowledge, Technology & Policy;Spring2004, Vol. 17 Issue 1, p74 

    Discusses the study on the increasing use of biometric technology implemented in the global fight against domestic and international terrorism. Two principles of the Biometric Consortium, an amalgamation of the U.S. government and commercial agencies on the implementation of the biometric...

  • Giving body to biometrics. Davis, Russ // Manager: British Journal of Administrative Management;Apr/May2005, Issue 46, p32 

    The article focuses on the biometrics industry. The biometrics industry, which produces human-based identification systems, is weighed down with claims and counterclaims, fallacies and myths. Despite its high-technology glitzy image, the principles behind the technology can be traced back to...

  • Upgrading Existing Biometric Security Systems by Implementing the Concept of Cancelable Biometrics. Bača, Miroslav; Antonić, Marko; Franjo, Magusic // Central European Conference on Information & Intelligent Systems;2008, p518 

    Today's biometric security systems have a number of problems that emerge from the fact that the biometric data of a person is stored in the system. The problems arise when that data is compromised. Standard password based security systems have the ability to cancel the compromised password and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics