Comparative and Analysis Study of Biomet
Comparative and Analysis Study of Biomet
1
CadyAyyad University, High School of Technology, LAPSSII Laboratory, Safi-MOROCCO
E-mail: [email protected]
ABSTRACT
In recent years, there has been a growing interest in the field of biometrics as a powerful identification
technology. Various biometric technologies are based on behavioral and physiological analysis; therefore
they must be reliable, robust, simple and cheap.
In this paper, we have investigated an analytical comparison of different biometric systems namely:
fingerprint, iris, face, voice, keystroke dynamics, signature, retina, etc. and we have classified these
methods based on several criteria such as: universality, uniqueness, permanency, intrusiveness, effort, cost,
and reliability, as well as the most used biometric systems requested in the market and those that are of
greater interest in the current research work, and for each criteria we gave synthetic discussions.
Furthermore, we provided a brief overview of biometric methods, then we have described the modes used
in a biometric system such as enrollment, verification and identification and we have presented the possible
applications of biometrics.
3466
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
3467
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
3468
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
illuminated by a light source to ensure proper diatopic (depending on the region) and
contrast. diaphasic (stylistic or situational) variations
Face: This method looks at the face shape. [29].Voice capture is relatively easy to perform
Robust systems of facial recognition are in using a microphone, but is sensitive to ambient
great demand in several applications against noise [30]. It should be noted that this
crimes and terrorism, as well as the access technique is nevertheless difficult to use
control of personnel regardless of physical or because it is extremely subject to external
virtual space.Moreover, face recognition is a conditions (illness, stress of the person, etc.)
non-intrusive method, and facial attributes are [28, 29, 30]. Because of this, it is both a
the most common biometric characteristics physical and a behavioral characteristic. It is
used by human beings to recognize each sometimes chosen in combination with another
other.The most popular approaches to face characteristic (voice and writing for
recognition [2] are based on: (i) the location example).On the other hand, in everyday life,
and shape of facial attributes, such as the eyes, identifying a person through a recording of his
eyebrows, nose, lips and chin, and their speech is an ordinary task that can be found in
relationships and spatial distances; (ii) the many cases. For example, a listener may know
overall analysis of the facial image: which a speaker's voice easily either over the phone
represents the image of the face as a linear or in a crowd of individuals. Also, in court
combination of its characteristics.Although the applications, a voice recording may be the only
authentication performance of commercially evidence to recognize the identity of the
available facial recognition systems is criminal.The main purpose of voice
reasonable [27], it imposes a number of recognition is to extract the characteristics
limitations on how facial images are obtained, contained in a speech signal that is physically
often requiring a fixed and simple background like a variation of the air pressure produced by
to controlled lighting.These systems also have the articulator system [31].This signal will be
difficulty matching face images captured from converted by sampling into an electrical signal
two different views, under different lighting obtained at the output of a microphone, so that
conditions and at different times.For a face it can be compared to models in digital form.
recognition system to function properly in Then it will be quantified in discrete values of
practice, it must automatically (i) detect amplitude.Then, the noise of the acoustic
whether a face is present in the acquired image; signal must be removed and made very clear in
(ii) locate the face if there is one; and (iii) order to be transformed into a series of vectors
recognize the face from a general point of view typically having from 8 to 50 coefficients [31].
(i.e. any pose) under different environmental Subsequently, it is generally necessary to
conditions. reduce the size of the acoustic vector by
Voice: The voice is an interesting biometric keeping the maximum of the characteristic
feature and is extremely sought after in systems information of the original signal.
related to remote applications where the Hand Contour (Hand geometry): This is a
individual authenticates himself by telephone popular technology that is widely used for
for example. Voice biometrics aims to identify physical access control or clocking[32].
the idiosyncratic characteristics of the speech Historically, Jain and Duta [33] were the first
signal, produced at a given moment and under to analyze a deformable shape and develop a
specific conditions.Indeed, the production of method in which hand shapes are stored and
speech is a complex process that is influenced compared according to the average
by several factors at different levels [28]. As a misalignment.The main advantage of this
single speech sample represents several types modality is that it is simple and easy to capture.
of information, both linguistic and typical In addition, the biometric system is not very
features encapsulated together.The attributes of sensitive to the state of the hand, in other
the speaker certainly include clues related to words, dirt and cuts will not prevent its
the physical properties of his vocal organs. operation [32].However, the geometry of the
Furthermore, many distinctive non- hand also has disadvantages that can make the
physiological features of the speaker mark the system imprecise. Indeed, different individuals
acoustic signal, such as information about the can have almost similar hand shapes. In
emotional state of the speaker. In addition, addition, jewelry and accessories can be a
speech is influenced by diastatic (enzymatic), challenge to extract shape information from the
3469
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
3470
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
graphics palette, they have been accepted in b. Non universality: although biometric
government, legal, and commercial modalities exist in every individual, there
transactions as an authentication method.The are exceptions in which a person is not
signature processcontains a graphic palette able to present his biometric trait due to
with a pen. This device will measure several pathological conditions or a working
characteristics during the signature, such as environment characterized even by
speed, order of strikes, pressure and erasing fingerprint data or palmprint. For
accelerations, total time, etc [7]. The major example, a fingerprint system may fail to
disadvantage of handwritten signature is that capture the friction peak structure of some
even if the signatures of the same person can individuals due to the poor quality of their
change dramatically, thieves can produce the fingerprints. Similarly, an iris recognition
same signatures that fool the signature system may be unable to obtain
verification system [14]. information about a person's iris because
Keystroke dynamics: This technology doesn’t of their long eyelashes or certain
require any special equipment since every pathological conditions of the eye.
computer has a keyboard. It is not unique to c. Upper bound on identification accuracy:
each individual but can be expected to provide (also called Temporal variability and non
sufficient discriminatory information to enable uniqueness) that is when the system
identity verification.It is a software device that becomes limited by the observed
calculates the amount of time a finger presses a variations in the set of characteristics of
key and the time a finger is in the air (between each subject (ie, intra-class variations)
keystrokes) [9]. This measurement is captured and by the variations between sets of
about a thousand times per second. The typing characteristics of different subjects (that
sequence is predetermined in the form of a is, inter-class variations). For example, in
password. Initially the person must compose the identical twin identity case, the main
his password so that a template is created. This lines of their palms can lead to an
biometric device is used as a verification inaccurate match due to incorrect data
method for electronic commerce and as a inducing a false rejection.
mechanism for controlling access to databases d. Spoof attacks:biometric traits like voice,
[12].We can say that Keystroke dynamics fingerprint and signature are easily
permits “continuous verification” of an vulnerable to spoofing attacks. For
individual's identity over a session after the example, the voice can be imitated and
individual logs in using a performing biometric fingerprints can be falsified for identity
like fingerprint or iris [14]. theft.
Multimodality: Multimodality is defined as In this regard, some of the first multimodal
the use of different biometric systems. The biometric systems reported in the literature
most importantmain to combine various combined the face and voice characteristics of
biometric systems is to reduce the limitations individuals [44]. There are other works that
of single biometric systems. In fact, the combine several modalities such as: ear and
combination of different biometric systems face in [45], hand geometry and palmprint in
aims to ameliorate recognition performances [46], etc.
by increasing the quantity of discriminant data
of each individual, and to have a very low 4. APPLICATIONS OF BIOMETRIC
failure.However, biometric systems have so far SYSTEMS
failed to achieve accurate recognition. Several Nowadays biometric systems are increasingly
challenges confronted biometric systems are integrated in several applications. These
presented below [14]: applications can be classified into three main
a. Noise effect: The biometric information groups [47, 48]:
presented to the system can be infected by • Business applications: such as computer network
noise due to imperfect acquisition opening, electronic data security, e-commerce,
conditions or subtle variations in the Internet access, credit card, physical access control,
biometric value itself. These variations cell phone, registry management medical, distance
can cause bad illumination as the case of learning, etc.
the iris and the face or the dirty surface of
the sensor for the case of the fingerprint.
3471
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
• Government applications: such as national For the performance, the number of stars is related
identity card, driver's license, social security, border to the value of the Equal Error Rate (EER) obtained
control, passport control, etc. in the state of the art [13].
• Legal applications: such as body identification, 5.1.1 Discussion 1
criminal investigation, terrorist identification, etc. According to this table, we note that no modality is
perfect and therefore is not supposed to respond
5. COMPARISON RESULTS OF VARIOUS effectively to all the requirements (for example,
BIOMETRIC SYSTEMS permanence, acceptability, community) imposed by
all applications (Digital Rights Management
Each physiological or behavioral biometric
(DRM), access control, social protection
modality has its strengths and weaknesses, and the
distribution). For example, DNA is one of the most
choice depends on the targeted application. In other
effective techniques for verifying the identity of an
words, no biometric system is "optimal" and to be
individual. But, it cannot be used for access control
effective, it must have the ability to adapt to the
for reasons of computation time and also because
permanent and temporary changes of the user [14,
the individual would not be ready to take a little
47].
blood to carry out the identification. The choice of
5.1 Comparison according to biometric the modality is therefore dependent on the
modalities properties application used.
In this part, we will give a comparative analysis we can also point out that the iris, fingerprint,
concerning the biometric modalities based on retina, hand veins are very reliable thanks to their
several studies. We start with Jain et al. who made uniqueness and performance; but presently, they are
a comparison according to properties mentioned not frequently used because they are thought to
above (see Table 1). represent an intrusion into one’s private life and
Table 1: Comparison of the biometric modalities their fabrication costs are very expensive
according to the following properties: (a) Universality, specifically for the iris, retina and hand veins.
(b) Uniqueness, (c) Permanency, (d) Collectability, (e) Methods such as the face, voice, contour of the
Acceptability, (f) Performance [13]. hand are very acceptable by individuals by reason
Biometric a b c d e f of their ease of use, and their biometric systems are
modality not expensive to manufacture.In the following part,
DNA Yes Yes Yes Not Not really **** we will give an analytic comparison according to
really *
Blood Yes No Yes Not No * others performances.
really
Brain signal Yes Yes Yes Not No **** 5.2 Analytic comparison according evaluation
really criteria
Heart signal Yes Yes Yes Not Yes ****
really * Several studies have been conducted to evaluate the
Signature Yes Yes Not Yes Yes **** performance of biometric systems. The American
really company - the International Biometric Group [IBG]
Gait Yes No Not Yes Yes ***
[49] - for example has carried out a study based on
really
Keystroke Yes Yes Not Yes Yes **** four evaluation criteria:
really Intrusiveness: the existence of a direct contact
Haptic Yes Yes Not Not Yes **** between the sensor used and the individual to
behavior Really Really be recognized.
Voice Yes Yes Not Yes Yes ****
Really Reliability: effectiveness of the method (ability
Iris Yes Yes Yes Yes Somewhat **** to identify someone).
* Cost: cost of the technology (readers, sensors,
Retina Yes Yes Yes Yes Somewhat **** etc ...), must be moderate.
*
Face Yes No Not Yes Yes **** Effort: required by the user when entering
really biometric measurements. That is, techniques
Hand Yes No Yes Yes Yes **** that don’t need enough effort by the user.
geometry The comparison results of the most used biometric
Hand veins Yes Yes Yes Yes Yes ****
* methods used namely: contour of the hand,
Ear Yes Yes Yes Yes Yes **** fingerprint, face, voice, retina, iris, signature and
* Keyboard Strike are presented as follows [46]:
Fingerprint Yes Yes Yes Yes Yes **** The least "intrusive" techniques to the most
"intrusive": voice, Keyboard Strike, signature,
3472
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
contour of the hand, face, fingerprint, iris and disadvantage of being intrusive, which greatly
finally retina. limits their areas of application. In addition, a
The most reliable techniques to the least method such as the identification of the iris remains
reliable: iris, retina, fingerprint, face, hand, binding for the users. Conversely, identification
voice, and finally at an equivalent level, systems based on the analysis of face images pose
Keyboard Strike and signature. no difficulty for users. Face recognition is a method
The least expensive to the most expensive that can be implemented independently of other
techniques: Keyboard Strike, voice, signature, biometric modalities, and is often used in
fingerprint, face, contour of the hand, retina surveillance applications.
and finally iris. 5.3 Statistical analysis of publications on
The easiest techniques of use to the most biometrics
difficult. Here, it is worth appreciating the Another comparative study was carried out by
degree of possible interaction with the system: Prabhakar et al. [50] about statistical analysis of
face, signature, iris, Keyboard Strike, voice, publications specific to biometric techniques
fingerprint, contour of the hand and finally submitted and published in the scientific journal
retina. IEEE Transaction on PAMI. This analysis
On the same subject, the International Biometric compares face, fingerprint, Iris, multimodal
Group has carried out a comparative study on the biometrics and the “other” category includes: ear,
most popular and most used methods in the security signature, EEG (Electroencephalography), gait,
market. The results are presented in the form of a hand, dental, and speaker. Besides, it presents for
graph as shown in the figure 5. each subject the percentage of Paper
Distributionrelated to one of the above subjects.
Table 2 shows the distribution results of submitted
and accepted papers[50].
3473
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
habitually and naturally in their daily lives, non- This paper presents an analytic comparison of the
intrusive, socially well accepted and easily main biometric technologies. This comparison is
implemented unlike most biometric modalities, based on several properties like: universality,
which necessitate professional materiel during their uniqueness, permanency, collectability,
implementation (sensors and scanners for acceptability and performance or their evaluation
fingerprints, palm prints, retina and iris), face criteria such as: intrusiveness, effort, cost, and
image can be easily captured via digital cameras. reliability, as well as the most used biometric
Currently, 3D facial representation seems to be a systems requested in the market and those that are
promising method to deal with many of the human of greater interest in the current research work.
face variations such as illumination [51], pose Fingerprint biometrics remains the most widely
changes [52] and varying facial cosmetics [53]. used technology around the world and is the most
Moreover, it allows recognizing the individuals at a requested in the global market. It is a reliable and
distance thanks to surveillance cameras [54] and intrusive technique. The iris technique is one of the
identifying the face of the subject from a technologies (with the retina) that ensure a high
multifaceted image [55] contrary to other methods level of security. The iris provides a very high
(need contact with the sensors). For these reasons uniqueness and extended stability, resulting in
and others the scientific researchers are interested extraordinary reliability. These three methods
in the face recognition. Fingerprint and iris require a great cooperation by the users because of
recognition methods are extremely reliable their intrusiveness which makes them unacceptable
technique. However, they demand much explicit to users compared to the other methods.
effort from users. Especially, fingerprint requires Biometry by the contour of the hand is simple to
that the user puts down his finger to have well implement. However, it is not a very reliable
physical contact with the surface of the sensor to technique. The ear biometric is relatively new and
acquire the image, while iris acquisition currently not yet widely studied and has not attracted very
requires that the individual cooperate to careful attention by the scientific community.
position their eye relative to the sensor. The first Face recognition is a non-intrusive, natural, easy for
problem that now arises with these two techniques implementation and less costly method. It is also
is to leave the surface of the sensor clean because requested in the market and well accepted by users.
by dint of use it becomes dirty. The second problem Besides it currently acquires a greater interest to the
is that the two techniques invade one's private life scientific researchers. All of these factors make face
which makes it inacceptable. There is therefore a recognition one of the best biometric methods.
very strong demand for improved performance in Finally, behavioral methods such as signing and
face recognition systems and increasingly important typing are still known methods but still don’t have
in the field of research. very high identification accuracy.
Although it has desirable properties such as
universality, uniqueness and permanence, the ear REFERENCES:
biometric is relatively new and not yet widely
studied and has not attracted attention compared to [1] Maltoni, Davide, Maio, Dario, Jain, Anil K., et
other biometric systems such as face, fingerprint al. Handbook of fingerprint recognition.
and gait. Springer Science & Business Media, 2009.
For the signature, it has the advantage over other [2] Jain, Anil K. and Li, Stan Z. Handbook of face
biometric measures of being commonly used for recognition. New York : springer, 2011.
transactions. For this reason, the signature as a [3] Daugman, John. How iris recognition works.
means of identification is generally well accepted. In : The essential guide to image processing.
The problem of signature recognition comes from Academic Press, 2009, pp. 715-739.
the great variability that exists between two [4] Kumar, Ajay And Zhang, David. Hand-
occurrences of the signature of the same individual. geometry recognition using entropy-based
In addition, the signature may be affected by the discretization. IEEE Transactions on
health or emotional state of the individual or can be information forensics and security, Vol. 2, No
falsified by other person. 2, 2007, pp. 181-187.
6. CONCLUSION [5] Sukumaran, S. And Punithavalli, M. Retina
recognition based on fractal
Biometric recognition is a powerful tool for dimension. IJCSNS Int J Comput Sci and Netw
increasing security in the private and public sectors. Secur, Vol. 9, No 10, 2009, pp. 66-7.
3474
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
[6] Shu, Wei and Zhang, David. Palmprint evaluation. Springer Science & Business
verification: an implementation of biometric Media, 2005.
technology. In : Proceedings. Fourteenth [19] Jain, Anil K., Ross, Arun, Prabhakar, Salil, et
International Conference on Pattern al. An introduction to biometric
Recognition (Cat. No. 98EX170). IEEE, 1998, recognition. IEEE Transactions on circuits and
pp. 219-221. systems for video technology, Vol. 14, No 1,
[7] Lee, Luan L., Berger, Toby, and Aviczer, Erez. 2004.
Reliable on-line human signature verification [20] Idrus, Syed Zulkarnain Syed, Cherrier, Estelle,
systems. IEEE Transactions on Pattern Rosenberger, Christophe, et al. Soft biometrics
Analysis & Machine Intelligence, No 6, 1996, for keystroke dynamics. In : International
pp. 643-647. Conference Image Analysis and Recognition.
[8] Lee, Lily, and Grimson, W. Eric L. Gait Springer, Berlin, Heidelberg, 2013. pp. 11-18.
analysis for recognition and classification. In [21] Babler, W. Embryologic development of
: Proceedings of Fifth IEEE International epidermal ridges and their configurations. Birth
Conference on Automatic Face Gesture defects original article series, Vol. 27, No 2,
Recognition. IEEE, 2002, pp. 155-162. 1991, pp. 95-112.
[9] Monrose, Fabian and Rubin, Aviel D. [22] Gaensslen, Robert E., Ramotowski, Robert,
Keystroke dynamics as a biometric for and Lee, Henry C. Advances in fingerprint
authentication. Future Generation computer technology. CRC press, 2001.
systems, Vol. 16, No 4, 2000, pp. 351-359.
[23] Ross, Arun. Iris recognition: The path
[10] National Research Council, Whither forward. Computer, Vol. 43, No 2, 2010, pp.
Biometrics Committee, et al. Biometric 30-35.
recognition: challenges and opportunities. [24] Lim, Shinyoung, Lee, Kwanyong, Byeon,
National Academies Press, 2010. Okhwan, et al.Efficient iris recognition through
[11] Roethenbaugh, Gary. An Introduction to improvement of feature vector and
Biometrics and General History. Biometrics classifier. ETRI journal, Vol. 23, No 2, 2001,
Explained, Section, Vol. 1, 1998. pp. 61-70.
[12] Jain, Anil K., Bolle, Ruud, and Pankanti, [25] Davson, Hugh. Physiology of the Eye.
Sharath (ed.). Biometrics: personal Macmillan International Higher Education,
identification in networked society. Springer 1990.
Science & Business Media, 2006. [26] Daugman, John G. Fast focus assessment
[13] Wayman, James, Jain, Anil, Maltoni, system and method for imaging. U.S. Patent No
Davide, et al. An introduction to biometric 6,753,919, 22 juin 2004.
authentication systems. In : Biometric Systems. [27] Phillips, P. Jonathon, Grother, Patrick,
Springer, London, 2005. pp. 1-20. Micheals, Ross J., et al. FRVT 2002: Overview
[14] Flynn, Patrick J., Jain, Anil K., and Ross, Arun and summary, 2003.
A. (ed.). Handbook of biometrics. Springer, [28] Rabiner, Lawrence R. and Schafer, Ronald
2008.
W. Digital processing of speech signals.
[15] Campbell, Joseph P. Speaker recognition: A Englewood Cliffs, NJ : Prentice-hall, 1978.
tutorial. Proceedings of the IEEE, Vol. 85, No
[29] Labov, William. Sociolinguistic patterns.
9, 1997, pp. 1437-1462. University of Pennsylvania Press, 1972.
[16] Chen, Hui and Bhanu, Bir. Human ear
[30] Scherer, Klaus R. Vocal Affect Expression: A
recognition in 3D. IEEE Transactions on review and a model for future
Pattern Analysis and Machine Intelligence, research. Psychological bulletin, Vol. 99, No 2,
Vol. 29, No 4, 2007, pp. 718-737.
1986, pp. 143.
[17] Ding, Yuhang, Zhuang, Dayan, and Wang, [31] Boite, René. Traitement de la parole. PPUR
Kejun. A study of hand vein recognition
presses polytechniques, 2000.
method. In : IEEE International Conference
Mechatronics and Automation, 2005. IEEE, [32] Ross, Arun, Jain, Anil, and Pankati, S. A
2005, pp. 2106-2110. prototype hand geometry-based verification
system. In : Proceedings of 2nd conference on
[18] Wayman, James L., Jain, Anil K., Maltoni, audio and video based biometric person
Davide, et al.(ed.). Biometric systems:
authentication. 1999, pp. 166-171.
Technology, design and performance
3475
Journal of Theoretical and Applied Information Technology
30th June 2019. Vol.97. No 12
© 2005 – ongoing JATIT & LLS
[33] Guo, Jing-Ming, Hsia, Chih-Hsien, Liu, Yun- [45] Chang, Kyong, Bowyer, Kevin W., Sarkar,
Fu, et al. Contact-free hand geometry-based Sudeep, et al.Comparison and combination of
identification system. Expert Systems with ear and face images in appearance-based
Applications, Vol. 39, No 14, 2012, pp. 11728- biometrics. IEEE Transactions on pattern
11736. analysis and machine intelligence, Vol. 25, No
[34] Luque-Baena, Rafael M., Elizondo, David, 9, 2003, pp. 1160-1165.
López-Rubio, Ezequiel, et al. Assessment of [46] Kumar, Ajay, Wong, David Cm, Shen, Helen
geometric features for individual identification C., et al.Personal verification using palmprint
and verification in biometric hand and hand geometry biometric. In
systems. Expert systems with applications, Vol. : International Conference on Audio-and
40, No 9, 2013, pp. 3580-3594. Video-Based Biometric Person Authentication.
[35] Goldberg, David E. and Holland, John H. Springer, Berlin, Heidelberg, 2003, pp. 668-
Genetic algorithms and machine 678.
learning. Machine learning, Vol. 3, No 2, [47] Uludag, Umut, Pankanti, Sharath, Prabhakar,
1988, pp. 95-99. Salil, et al.Biometric cryptosystems: issues and
[36] Kumar, Ajay and Zhang, David. Personal challenges. Proceedings of the IEEE, Vol. 92,
recognition using hand shape and texture. IEEE No 6, 2004, pp. 948-960.
Transactions on image processing, Vol. 15, No [48] Jain, Anil K., Flynn, Patrick, and Ross, Arun
8, 2006, pp. 2454-2461. A. (ed.). Handbook of biometrics. Springer
[37] Oden, Cenker, Ercil, Aytul, and Buke, Burak. Science & Business Media, 2007.
Combining implicit polynomials and geometric [49] International Biometric Group (Ibg),
features for hand recognition. Pattern Findbiometrics, Global Identity Management,
Recognition Letters, Vol. 24, No 13, 2003, pp. https://findbiometrics.com/
2145-2152. [50] Prabhakar, Salil, Kittler, Josef, Maltoni,
[38] Shu, Wei and Zhang, David. Palmprint Davide, et al.Introduction to the special issue
verification: an implementation of biometric on biometrics: Progress and directions. IEEE
technology. In : Proceedings. Fourteenth Transactions on Pattern Analysis and Machine
International Conference on Pattern Intelligence, Vol. 29, No 4, 2007, pp. 513-516.
Recognition (Cat. No. 98EX170). IEEE, 1998. [51] Zou, Xuan, Kittler, Josef, and Messer, Kieron.
pp. 219-221. Illumination invariant face recognition: A
[39] Hill, Robert B. Apparatus and method for survey. In : 2007 first IEEE international
identifying individuals through their retinal conference on biometrics: theory, applications,
vasculature patterns. U.S. Patent No and systems. IEEE, 2007, pp. 1-8.
4,109,237, 22 août 1978. [52] Cao, Kaidi, Rong, Yu, Li, Cheng, et al. Pose-
[40] Li, Stan Z. Encyclopedia of Biometrics: I-Z. robust face recognition via deep residual
Springer Science & Business Media, 2009. equivariant mapping. In : Proceedings of the
[41] Kumar, Ajay and Wu, Chenye. Automated IEEE Conference on Computer Vision and
human identification using ear Pattern Recognition. 2018. pp. 5187-5196.
imaging. Pattern Recognition, Vol. 45, No 3, [53] Stern, Guillaume, Fu, Zehua, and Ardabilian,
2012, pp. 956-968. Mohsen. 3D Face Analysis for Healthcare. In
[42] Wang, Liang, Tan, Tieniu, Hu, Weiming, et : Biometrics under Biomedical Considerations.
al. Automatic gait recognition based on Springer, Singapore, 2019, pp. 147-160.
statistical shape analysis. IEEE transactions on [54] Alqahtani, Faleh, Banks, Jasmine, Chandran,
image processing, Vol. 12, No 9, 2003, pp. Vinod, et al. Detection and tracking of faces in
1120-1131. 3D using a stereo camera
[43] Nalwa, Vishvjit S. Automatic on-line signature arrangements. International Journal of
verification. Proceedings of the IEEE, Vol. 85, Machine Learning and Computing, Vol. 9, No
No 2, 1997, pp. 215-239. 1, 2019, pp. 35-43.
[44] Chibelushi, Claude C., Mason, John S., and Nguyen, Anh, Yosinski, Jason, Et Clune, Jeff.
Deravi, R. Integration of acoustic and visual Multifaceted feature visualization: Uncovering
speech for speaker recognition. In : Third the different types of features learned by each
European Conference on Speech neuron in deep neural networks. arXiv preprint
Communication and Technology, 1993. arXiv:1602.03616, 2016.
3476