
handle: 11388/202103
To address the issues like identity theft and security threats, a continuously evolving technology known as biometrics is presently being deployed in a wide range of personal, government, and commercial applications. Despite the great progress in the field, several exigent problems have yet to be addressed to unleash biometrics full potential. This article aims to present an overview of biometric research and more importantly the significant progress that has been attained over the recent years. The paper is envisaged to further not only the understanding of general audiences and policy makers but also interdisciplinary research. Most importantly, this article is intended to complement earlier articles with updates on most recent topics and developments related to e.g. spoofing, evasion, obfuscation, face reconstruction from DNA, Big data issues in biometrics, etc.
biometrics, forensics, Audio processing; Biometrics; C Computer Systems Organization; C.2 Communication/Networking and Information Technology; C.2.8 Mobile Computing; Data mining; Face; Feature extraction; Fingerprint recognition; H Information Technology and Systems; H.2 Database Management; H.2.0 General; H.2.0.a Security, integrity, and protection; I Computing Methodologies; I.4 Image Processing and Computer Vision; I.4.7 Feature Measurement; I.4.7.a Feature representation; I.5 Pattern Recognition; I.5.0 General; I.5.4 Applications; I.5.4.o Waveform analysis; Iris recognition; Software; Signal Processing; Media Technology; Hardware and Architecture; Computer Science Applications1707 Computer Vision and Pattern Recognition, iris recognition, security, 551, privacy, fingerprint recognition, face recognition
biometrics, forensics, Audio processing; Biometrics; C Computer Systems Organization; C.2 Communication/Networking and Information Technology; C.2.8 Mobile Computing; Data mining; Face; Feature extraction; Fingerprint recognition; H Information Technology and Systems; H.2 Database Management; H.2.0 General; H.2.0.a Security, integrity, and protection; I Computing Methodologies; I.4 Image Processing and Computer Vision; I.4.7 Feature Measurement; I.4.7.a Feature representation; I.5 Pattern Recognition; I.5.0 General; I.5.4 Applications; I.5.4.o Waveform analysis; Iris recognition; Software; Signal Processing; Media Technology; Hardware and Architecture; Computer Science Applications1707 Computer Vision and Pattern Recognition, iris recognition, security, 551, privacy, fingerprint recognition, face recognition
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 12 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
