2.7. Concluding Remarks

In this chapter, various biometric identification models are reviewed and key design issues and tradeoffs for biometric authentication systems are explored. As vital background information for later chapters, several commonly used feature extraction algorithms for visual-based and audio-based biometric systems are described. In real-world situations, most people divide the BI model selection problem into optimization of the feature extraction algorithms and then optimization of pattern classification algorithms, under the constraints of compatibility, data storage, speed, and data availability. Various existing feature extraction and pattern classification methods are investigated. The tradeoff between the feature extractor ...

Get Biometric Authentication: A Machine Learning Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.