Identification: Biometrics, or a real-time ‘who is who’

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this first chapter of the book’s second part, I argue that the best way to deal with terrorism is to nip a planned terrorist attack in the bud. One way to do so is by discerning innocent citizens who have a right to be at certain locations from those who have not, and whose intentions are dubious, via a swift and reliable but non-intrusive identification and verification process. I introduce the main biometrics that are used in this regard, first discussing physical biometrics such as facial recognition, iris scans, voice scans or fingerprints, to then move on to behavioural ones such as one’s gait. Since most of them are not (yet) fool proof, especially not as stand-alone technologies, I make the case for multimodal-based biometric systems which currently are under development.

Cite

CITATION STYLE

APA

Lehr, P. (2019). Identification: Biometrics, or a real-time ‘who is who.’ In Advanced Sciences and Technologies for Security Applications (pp. 67–80). Springer. https://doi.org/10.1007/978-3-319-90924-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free