skip to main content
10.1145/1741906.1742159acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicwetConference Proceedingsconference-collections
poster

Multimodal biometrics

Published: 26 February 2010 Publication History

Abstract

Biometric products provide improved security over traditional electronic access control methods such as RFID tags, electronic keypads and some mechanical locks. They ensure that the authorized user is present in order for access to take place. The user's authorized card or password pin cannot be stolen or lost to gain access. Common physical biometrics includes fingerprints, hand or palm geometry, retina, iris, or facial characteristics, whereas behavioural characteristics include signature, voice (which also has a physical component), keystroke pattern, and gait. While some technologies have gained more acceptance then others, it is beyond doubt that the field of access control biometrics has gained a measure of acceptance.
Multimodal biometrics use a combination of different biometric recognition technologies In order for the biometrics to be ultra-secure and to provide more-than-average accuracy, more than one form of biometric identification is required. Hence the need arises for the use of multimodal biometrics. This uses a combination of different biometric recognition technologies.
In certain situations, the user might find one form of biometric identification is not exact enough for identification. This can be the case with fingerprints, where at least 10% of the population have worn, cut or unrecognizable prints. Multimodal biometric technology uses more than one biometric identifier to compare the identity of the person. Therefore in the case of a system using say three technologies i.e. face mimic and voice. If one of the technologies is unable to identify, the system can still use the other two to accurately identify against. Multimodal technologies have been in use commercially since 1998. Multimodal biometric systems are those which utilize, or are capability of utilizing, more than one physiological or behavioral characteristic for enrollment, verification, or identification

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in Technology
February 2010
1070 pages
ISBN:9781605588124
DOI:10.1145/1741906
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • UNITECH: Unitech Engineers, India
  • AICTE: All India Council for Technical Education

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 February 2010

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Poster

Conference

ICWET '10
Sponsor:
  • UNITECH
  • AICTE

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media