2019
DOI: 10.1145/3309550
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems

Abstract: Biometric research is directed increasingly towards Wearable Biometric Systems (WBS) for user authentication and identification. However, prior to engaging in WBS research, how their operational dynamics and design considerations differ from those of Traditional Biometric Systems (TBS) must be understood. While the current literature is cognizant of those differences, there is no effective work that summarizes the factors where TBS and WBS differ, namely, their modality characteristics, performance, security a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 43 publications
(25 citation statements)
references
References 141 publications
(140 reference statements)
0
25
0
Order By: Relevance
“…Usually, the intrusive features are fingerprints [37], retina scans [186] etc. They are referred as traditional or hard biometrics [188]. The non-intrusive features are called soft biometrics.…”
Section: Soft Biometrics: Non-intrusive Biometricsmentioning
confidence: 99%
See 2 more Smart Citations
“…Usually, the intrusive features are fingerprints [37], retina scans [186] etc. They are referred as traditional or hard biometrics [188]. The non-intrusive features are called soft biometrics.…”
Section: Soft Biometrics: Non-intrusive Biometricsmentioning
confidence: 99%
“…These are demographic, global, anthropometric, material, behavioural and medical etc. [45,188]. This set of soft biometrics features can be estimated or extracted from whole human body beside face or head only.…”
Section: Soft Biometrics: Non-intrusive Biometricsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, understandably so, there are no references to management, protection, or exchange of data within this context. The domains of communication, information exchange, and cybersecurity all contain standards for DG that provide some detail on how data are exchanged domain [61–65, 104–112, 131, 132]. Further, there are three DG or DG related standards that discuss how data will be protected from attack [113, 114, 122, 133–135].…”
Section: Case Study: Dgmentioning
confidence: 99%
“…The study is divided into four analyses during the eclipse peak: performance measurement and relationship analysis for the systems, power quality analysis at the point of interconnection (POI) of system A , simulation of voltage device operations on an IEEE 8500 test case distribution feeder network remodelled to include real system parameters of the feeders that the two PV systems connect to, and finally, system reliability evaluation and forecasting for the utility management areas (Miami and Daytona). Different datasets are used for conducting these analyses after being subject to quality checks [10, 11]: real‐time‐series PV generation data of 1 min resolution collected from cloud‐based on‐site data acquisition systems (DASs) for system performance; real‐time‐series average root‐mean‐square (RMS) voltage, harmonics (voltage, current), and instantaneous flicker (IFL), short‐term flicker )(Pst , and long‐term flicker )(Plt data of 1 min resolution collected from the POI of system A using a metre for power quality analysis; smart inverter data sheets (for power‐efficiency curves), PV data sheets (for temperature‐efficiency curve), and load profile data for the voltage profile analysis; moreover, hourly weather data from the National Climatic Data Centre and daily reliability data for the two management areas for the reliability analysis.…”
Section: Introductionmentioning
confidence: 99%