The Reliability and Acceptance of Biometric System in Bangladesh: Users
Perspective
- URL: http://arxiv.org/abs/2106.08177v1
- Date: Mon, 14 Jun 2021 08:46:00 GMT
- Title: The Reliability and Acceptance of Biometric System in Bangladesh: Users
Perspective
- Authors: Shaykh Siddique, Monica Yasmin, Tasnova Bintee Taher, Mushfiqul Alam
- Abstract summary: The study shows that users are satisfied by using biometric systems rather than other security systems.
As system reliability and user satisfaction are the focused issue of this research, biometric service providers can use these phenomena to find what aspect of improvement they need for their services.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Biometric systems are the latest technologies of unique identification.
People all over the world prefer to use this unique identification technology
for their authentication security. The goal of this research is to evaluate the
biometric systems based on system reliability and user satisfaction. As
technology fully depends on personal data, so in terms of the quality and
reliability of biometric systems, user satisfaction is a principal factor. To
walk with the digital era, it is extremely important to assess users' concerns
about data security as the systems are conducted the authentication by
analyzing users' personal data. The study shows that users are satisfied by
using biometric systems rather than other security systems. Besides, hardware
failure is a big issue faced by biometric systems users. Finally, a matrix is
generated to compare the performance of popular biometric systems from the
users' opinions. As system reliability and user satisfaction are the focused
issue of this research, biometric service providers can use these phenomena to
find what aspect of improvement they need for their services. Also, this study
can be a great visualizer for Bangladeshi users, so that they can easily
realize which biometric system they have to choose.
Related papers
- Biometrics Employing Neural Network [0.0]
Fingerprints, iris and retina patterns, facial recognition, hand shapes, palm prints, and voice recognition are frequently used forms of biometrics.
For systems to be effective and widely accepted, the error rate in recognition and verification must approach zero.
Artificial Neural Networks, which simulate the human brain's operations, present themselves as a promising approach.
arXiv Detail & Related papers (2024-02-01T03:59:04Z) - FarSight: A Physics-Driven Whole-Body Biometric System at Large Distance
and Altitude [67.55994773068191]
This paper presents the end-to-end design, development and evaluation of FarSight.
FarSight is an innovative software system designed for whole-body (fusion of face, gait and body shape) biometric recognition.
We test FarSight's effectiveness using the newly acquired IARPA Biometric Recognition and Identification at Altitude and Range dataset.
arXiv Detail & Related papers (2023-06-29T16:14:27Z) - Facial Soft Biometrics for Recognition in the Wild: Recent Works,
Annotation, and COTS Evaluation [63.05890836038913]
We study the role of soft biometrics to enhance person recognition systems in unconstrained scenarios.
We consider two assumptions: 1) manual estimation of soft biometrics and 2) automatic estimation from two commercial off-the-shelf systems.
Experiments are carried out fusing soft biometrics with two state-of-the-art face recognition systems based on deep learning.
arXiv Detail & Related papers (2022-10-24T11:29:57Z) - Evaluation of User Perception on Biometric Fingerprint System [0.0]
Biometric systems involve security assurance to make our system highly secured and robust.
Several innovative system have been introduced, and most of them have biometrics installed to protect military bases, banking machines, and other sophisticated systems.
Despite the benefits and enhancements in security that biometrics offer, there are also some vulnerabilities.
arXiv Detail & Related papers (2022-05-21T23:39:07Z) - Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal
Biometric Fusion Algorithms [58.156733807470395]
This paper reports a benchmarking study carried out within the framework of the BioSecure DS2 (Access Control) evaluation campaign.
The campaign targeted the application of physical access control in a medium-size establishment with some 500 persons.
To the best of our knowledge, this is the first attempt to benchmark quality-based multimodal fusion algorithms.
arXiv Detail & Related papers (2021-11-17T13:39:48Z) - Quality Measures in Biometric Systems [67.6699940572256]
Quality is a critical issue in security, especially in adverse scenarios involving surveillance cameras, forensics, portable devices, or remote access through the Internet.
This article analyzes what factors negatively impact biometric quality, how to overcome them, and how to incorporate quality measures into biometric systems.
arXiv Detail & Related papers (2021-11-17T13:28:07Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Analyze and Development System with Multiple Biometric Identification [0.0]
Methods developed earlier to ensure personal the information from the thefts was not effective and safe.
Biometrics were introduced when it was needed technology for more efficient security of personal information.
In biometric authentication system, user may not remember any passwords or carry any keys.
arXiv Detail & Related papers (2020-04-10T05:08:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.