{"title":"The evolution of biometrics","authors":"Panpan Li, Renjin Zhang","doi":"10.1109/ICASID.2010.5551405","DOIUrl":null,"url":null,"abstract":"Biometrics is a Technology that can carry out the identification and authentication according to the physiological or behavioral characteristics. The technology has the reliability, security, convenience and safety and so on. With the rapid development of computer technology and the needs of ever-increasing information security, biometrics is more and more important. Firstly, the paper makes a brief overview presentation on various types of biometric identification technology, Secondly, biometric technology in information security in the application and development prospects are also analyzed and prospected.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Anti-Counterfeiting, Security and Identification","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2010.5551405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Biometrics is a Technology that can carry out the identification and authentication according to the physiological or behavioral characteristics. The technology has the reliability, security, convenience and safety and so on. With the rapid development of computer technology and the needs of ever-increasing information security, biometrics is more and more important. Firstly, the paper makes a brief overview presentation on various types of biometric identification technology, Secondly, biometric technology in information security in the application and development prospects are also analyzed and prospected.