TITLE

Biometrics and Travel Go Hand in Hand

AUTHOR(S)
Ritchey, Diane
PUB. DATE
August 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article provides information on the usefulness of biometrics as one of the security systems used by companies in the U.S. It mentions that availability of biometrics in the market and cites that there are several companies have used and relied on this security product, particularly the Scandinavian Airlines. Meanwhile, the Associated Students at California State University has already installed seven Schlage HandPunch time and attendance readers for their students and employees.
ACCESSION #
43674165

 

Related Articles

  • A BIOMETRIA JELENLEGI MEGÍTÉLÉSE. Katalin, Kondás // Hadmérnök;mar2013, Vol. 8 Issue 1, p23 

    There are various types os authentical methods, nowadays the most modern of these is the biometric identification. Although biometric identification is a basic technical defense in the area of the security systems, however its expensively spread unfrequented yet. There are several reasons for...

  • Upgrading Existing Biometric Security Systems by Implementing the Concept of Cancelable Biometrics. Bača, Miroslav; Antonić, Marko; Franjo, Magusic // Central European Conference on Information & Intelligent Systems;2008, p518 

    Today's biometric security systems have a number of problems that emerge from the fact that the biometric data of a person is stored in the system. The problems arise when that data is compromised. Standard password based security systems have the ability to cancel the compromised password and...

  • Robustness of Multi Biometric Authentication Systems against Spoofing. Hariri, Mahdi; Shokouhi, Shahriar B. // Computer & Information Science;2012, Vol. 5 Issue 1, p77 

    Nowadays biometric authentication systems have been more developed, especially in secure and financial systems; so cracking a biometric authentication system is now a growing concern. But their security has not received enough attention. Imitating a biometric trait of a genuine user to deceive a...

  • Technologization of Security: Management of Uncertainty and Risk in the Age of Biometrics. Ceyhan, Ayse // Surveillance & Society;Apr2008, Vol. 5 Issue 2, p102 

    Contemporary security policies are characterized by a dramatic focus on high technology like biometrics as a security enabler. The process of the technologization of security, i.e. the making of technology the centerpiece of security systems and its perception as an absolute security provider,...

  • An Effective Two-Finger, Two-Stage Biometric Strategy for the US-VISIT Program. Baveja, Manas; Wein, Lawrence M. // Operations Research;Sep2009, Vol. 57 Issue 5, p1068 

    Motivated by the cost and disruption involved in changing from a two-finger to a ten-finger biometric system for matching U.S. visitors to a watchlist of criminals and terrorists, we investigate whether any two-finger multistage biometric strategies would fix the inadequate matching performance...

  • A New Multimodal Biometric Identification Approach. Samir, Akrouf; Yahia, Belayadi; Eddine, Mouhoub Nasser // International Journal of Computer Science Issues (IJCSI);Mar2012, Vol. 9 Issue 2, p238 

    Several authors [1] [2] [3] [4] [5] have shown that multimodality was a highly efficient solution for biometric identification and allows to increase performance and reliability. Indeed, the acquisition of multiple biometric features makes it much more difficult for an impostor to spoof the...

  • Sign in Please.  // Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p88 

    The article focuses on the significance of signature for security purposes in business and legal transactions. According to David Pintsov of Peladon Software who uses signature verification in his business, this form of security measure enables him to save labor cost. In dynamic signature...

  • A Robust Iris Identification System Based on Wavelet Packet Decomposition and Local Comparisons of the Extracted Signatures. Rosant, Florence; Mikovicova, Beata; Adam, Mathieu; Trocan, Maria // EURASIP Journal on Advances in Signal Processing;2010, Special section p1 

    This paper presents a complete iris identification system including three main stages: iris segmentation, signature extraction, and signature comparison. An accurate and robust pupil and iris segmentation process, taking into account eyelid occlusions, is first detailed and evaluated. Then, an...

  • Fiducial feature reduction analysis for electrocardiogram (ECG) based biometric recognition. Tantawi, M.; Revett, K.; Salem, A.; Tolba, M. // Journal of Intelligent Information Systems;Feb2013, Vol. 40 Issue 1, p17 

    Although the electrocardiogram (ECG) has been a reliable diagnostic tool for decades, its deployment in the context of biometrics is relatively recent. Its robustness to falsification, the evidence it carries about aliveness and its rich feature space has rendered the deployment of ECG based...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics