Java GUI aplication for comparing the levels of biometric security - fingerprint vs. iris
Abstract
Introduction/purpose: The main purpose of this paper is to present a novel Java GUI – based software application for a comparative analysis of fingerprint and iris biometrics.
Methods: The first part of this work is realized in Java Programming language. in the GUI framework named swing while the rest of the paper shows in detail the advantages and disadvantages of both systems and gives scientific data on when fingerorint and iris recognition can be used to enable top level security. The main method here is a well known comparative analysis.
Results: The results were obtained for both fingerprint and iris biometrics, showing the difference between the two.
Conclusion: Different types of biometrics, based on body parts formed at different age, are given as well as the comparison of their security levels.
References
Anthony, A. 2019. 8+ Biometrics APIs At Your Fingertips [online]. https://nordicapis.com/8-biometrics-apis-at-your-fingertips/ [Accessed: 20 February 2021].
Burt, C. 2020. New terminal brings contactless iris biometrics to UnionCommunity’s UBio line [online]. Available at: https://www.biometricupdate.com/202005/new-terminal-brings-contactless-iris-biometrics-to-unioncommunitys-ubio-line [Accessed: 20 February 2021].
Dahlen, H.G. & Caplice, S. 2014. What do midwives fear? Women and Birth, 27(4), pp.266-270. Available at: https://doi.org/10.1016/j.wombi.2014.06.008.
Jain, A.K., Flynn, P. & Ross, A.A. 2008. Handbook of Biometrics. Boston, MA: Springer. Available at: https://doi.org/10.1007/978-0-387-71041-9. ISBN: 978-0-387-71041-9.
Lalović, K. 2018. Patent overview: Device for fingerprint identity guarantee. Vojnotehnički glasnik/Military Technical Courier, 66(2), pp.366-379. Available at: https://doi.org/10.5937/vojtehg66-15868.
Lalović, K. 2020. Osnove Java programiranja. Belgrade: Golden Mind (in Serbian). ISBN: 978-86-902148-0-8.
Lalović, K., Anđelić, S. & Tot, I. 2017. How to guarantee baby identity based on fingerprint biometry. In: The Ninth International Conference on Business Information Security (BISEC-2017), Belgrade, pp.1-4, October 18 [online]. Available at: http://bisec.rs/files/2017/16-k-lalovic-s-andjelic-i-tot-bisec-2017.pdf [Accessed: 20 February 2021].
Lalović, K., Maček, N., Milosavljević, M., Veinović, M., Franc, I., Lalović, J. & Tot, I. 2016a. Biometric Verification of Maternity and Identity Switch Prevention in Maternity Wards. Acta Polytechnica Hungarica, 13(5), pp.65-81. Available at: https://doi.org/10.12700/APH.13.5.2016.5.4.
Lalović, K., Milosavljević, M., Tot, I. & Maček, N. 2015. Device for biometric verification of maternity. Serbian Journal of Electrical Engineering, 12(3), pp. 293-302. Available at: https://doi.org/10.2298/SJEE1503293L.
Lalović, K., Nikolić, J., Tot, I. & Lalović, Ž. 2016b. Software algorithm of device for biometric identification of parenthood. In: The Eighth International Conference on Business Information Security (BISEC-2016), Belgrade, pp.66-71, October 15 [online]. Available at: https://www.metropolitan.ac.rs/files/2016/10/BISEC2016_Conference-Proceedings.pdf#page=67 [Accessed: 20 February 2021].
Lalović, K., Tot, I., Arsić, A. & Škarić, M. 2019. Security Information System, Based on Fingerprint Biometrics. Acta Polytechnica Hungarica, 16(5), pp.87-100. Available at: https://doi.org/10.12700/APH.16.5.2019.5.6.
Maček, N., Đorđević, B., Gavrilović, J. & Lalović, K. 2015. An Approach to Robust Biometric Key Generation System Design. Acta Polytechnica Hungarica, 12(8), pp.43-60. Available at: https://doi.org/10.12700/APH.12.8.2015.8.3.
Moore, K., Persaud, T.V.N. & Torchia, M. 2015. Before We Are Born, 9th Edition. Philadelphia, PA: Saunders. ISBN: 9780323313445.
Tot, I., Trikoš, M., Bajčetić, J., Lalović, K. & Bogićević, D. 2021. Software Platform for Learning about Brain Wave Acquisition and Analysis. Acta Polytechnica Hungarica, 18(3), pp.147-162. Available at: https://doi.org/10.12700/APH.18.3.2021.3.8.
Wing, B. 2014. NIST publishes compression guidance for fingerprint. IT Professional, 16(2), pp.38-44. Available at: https://doi.org/10.1109/MITP.2013.89.
Proposed Creative Commons Copyright Notices
Proposed Policy for Military Technical Courier (Journals That Offer Open Access)
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
