Biometrics
Ting Ma
The Chinese University of Hong Kong, Joint Research Centre for Biomedical Engineering, Shatin, NT, Hong Kong
Search for more papers by this authorYan Zhang
The Chinese University of Hong Kong, Joint Research Centre for Biomedical Engineering, Shatin, NT, Hong Kong
Search for more papers by this authorYuang-Ting Zhang
The Chinese University of Hong Kong, Joint Research Centre for Biomedical Engineering, Shatin, NT, Hong Kong
Search for more papers by this authorTing Ma
The Chinese University of Hong Kong, Joint Research Centre for Biomedical Engineering, Shatin, NT, Hong Kong
Search for more papers by this authorYan Zhang
The Chinese University of Hong Kong, Joint Research Centre for Biomedical Engineering, Shatin, NT, Hong Kong
Search for more papers by this authorYuang-Ting Zhang
The Chinese University of Hong Kong, Joint Research Centre for Biomedical Engineering, Shatin, NT, Hong Kong
Search for more papers by this authorAbstract
Biometrics deals with the automatic recognition of individuals based on statistical analysis of physiological and/or behavioral characteristics. Any human physiological or behavioral characteristic that is unique, universal, stable, and collectable could be used as a biometric characteristic.
In the modern automated world, access to a reliable authentication system becomes increasingly essential. However, traditional authentication methods based on the user's exclusive knowledge, such as password, personal identification number (PIN), or something belonging to one, such as a cardkey, smart card, or token [like identity cards (ID)], can hardly meet the requirements of the reliability of an authentication system because passwords or PIN may be forgotten and ID cards can be lost, forged, or misplaced. Compared with traditional methods, biometrics can provide enhanced security and convenience. As biometric recognition systems are increasingly deployed for many security applications, biometrics and its applications have attracted considerable interests. Recently, biometrics has emerged as one of the most reliable technologies for future human identification and verification.
Bibliography
- 1Court Technology Laboratory (CTL) (2003). Available: http://clt.ncsc.dni.us.
- 2D. D. Zhang, Automated Biometrics: Technologies and Systems. Amsterdam: Kluwer Academic Publishers, 2000.
10.1007/978-1-4615-4519-4 Google Scholar
- 3D. D. Zhang, Biometric Solutions For Authentication In An E-World. Amsterdam: Kluwer Academic Publishers, 2002.
10.1007/978-1-4615-1053-6 Google Scholar
- 4A. Jain, R. Bolle, and S. Pankanti, Biometrics: Personal Identification in Networked Society. Amsterdam: Kluwer Academic Publishers, 1999.
10.1007/b117227 Google Scholar
- 5S. Nanavati, M. Thieme, and R. Nanavati, Biometrics: Identity Verification in a Networked World. New York: Wiley Computer Publishing, 2002.
- 6S. Pankanti, R. M. Bolle, and A. Jain, Biometrics: The future of identification. Computer 2003; 33: 46–49.
10.1109/2.820038 Google Scholar
- 7A. Martin, G. Doddington, T. Kamm, M. Ordowski, and M. Przybocki, “The DET curve in assessment of decision task performance,” in Proc. ESCA 5th Eur. Conf. Speech Comm. and Tech., EuroSpeech ’97, Rhodes, Greece, 1997: 1895–1898.
- 8J. Ortega-Garcia, J. Bigun, D. Reynolds, and J. Gonzalez-Rodriguez, Authentication gets personal with biometrics. IEEE Signal Processing Mag. 2004; 21(2): 50–62.
- 9P. Peter, The smart cards are coming … really. Available: http://www.forbes.com/technology/feeds/general/2005/02/11/generalbhsgml_2005_02_11_19213_791446171-0019-KEYWORD.Missing.html.
- 10Summary of NIST standards of biometric accuracy, tamper resistance, and interoperability. Available: http://www.itl.nist.gov/iad/894.03/NISTAPP_Nov02.pdf.
- 11W. Shu and D. Zhang, Palmprint verification Palmprint verification: an implementation of biometric technology, Proc. 14th Int. Conf. on Pattern Recognition, 1998: 219–221.
- 12D.D. Zhang, Palmprint Verification in Automated Biometrics. Boston: Kluwer Academic Publishers, 2000.
10.1007/978-1-4615-4519-4 Google Scholar
- 13NEC Automatic Palmprint Identification System (2003). Available: http://www.nectech.com/afis/download/PalmprintDtsht.q.pdf.
- 14Automatic Palmprint Identification System (2003). Available: http://www.printrakinternational.com/omnitrak.htm—Printrak.
- 15J. Zhang, Y. Yan, and M. Lades, Face recognition: Eigenface, elastic matching, and neural nets. Proc. IEEE. 1997; 85: 1423–1435.
- 16M. J. Lyons, J. Budynek, A. Plante, and S. Akamatsu, Classifying facial attributes using a 2-D Gabor wavelet representation and discriminant analysis. Proc. Automatic Face and Gesture Recognition, Proceedings. Fourth IEEE International Conference, 2000.
- 17G. O. Williams, Iris recognition technology. IEEE Aerospace Electronic Syst. Mag. 1997; 12: 23–29.
- 18F. J. Prokoski, R. B. Riedel, and J. S. Coffin, Identification of individuals by means of facial thermography. Proc. IEEE 1992 International Carnahan Conference on Security Technology: Crime Countermeasure, Atlanta, GA, Oct. 14–16, pp. 120–125.
- 19R. Sanchez-Reillo and A. Gonzalez-Marcos, Access control system with hand geometry verification and smart cards. IEEE Aerospace Electronic Syst. Mag. 2000; 15: 45–48.
- 20B. Lehr, DNA's lasting imprint. IEEE Potentials. 1989; 8: 6–8.
10.1109/45.43026 Google Scholar
- 21M. Burge and W. Burger, Ear biometrics in computer vision. Proc. 15th Int. Conf. on Pattern Recognition, 2000: 822–826.
- 22K. Cai, T. Maekawa, and T. Takada, Identification of odors using a sensor array with kinetic working temperature and Fourier spectrum analysis. IEEE Sensors J. 2002; 2: 230–234.
- 23K. Chen, D. Xie, and H. Chi, A modified HME architecture for text-dependent speaker identification. IEEE Trans. Neural Networks. 1996; 7: 1309–1313.
- 24R. A. Finan and A. T. Sapeluk, Text-independent speaker verification using predictive neural networks. Proc. Fifth Int. Conf. on Artificial Neural Networks, 1997: 274–279.
- 25E. J. R. Justino, A. El Yacoubi, F. Bortolozzi, and R. Sabourin, An off-line signature verification system using hidden Markov model and cross-validation. Proc. XIII Brazilian Symposium on Computer Graphics and Image Processing, 2000: 105–112.
- 26L. Nakanishi, N. Nishiguchi, Y. Itoh, and Y. Fukui, On-line signature verification method utilizing feature extraction based on DWT. Proc. 2003 Int. Symp. on Circuits and Systems,2003: 25–30.
- 27J. A. Robinson, V. W. Liang, J. A. M. Chambers, and C. L. MacKenzie, Computer user verification using login string keystroke dynamics. IEEE Trans. Systems, Man Cybern. 1998; 28: 236–241.
- 28C. BenAbdelkader, R. Cutler, and L. Davis, Stride and cadence as a biometric in automatic person identification and verification. Proc. Fifth IEEE Int. Conf. on Automatic Face and Gesture Recognition, 2002: 357–362.
- 29L. Biel, O. Pettersson, L. Philipson, and P. Wide, ECG analysis: A new approach in human identification. IEEE Trans. Instrumentation Measure. 2001; 50: 808–812.
- 30T. W. Shen, W. J. Tompkins, and Y. H. Hu, One-lead ECG for identity verification. Proc. Second Joint IEEE EMBS/BMES Conf., Huston, TX, 2002.
- 31Y. Y. Gu, Y. Zhang, and Y. T. Zhang, A novel biometric approach in human verification by photoplethysmography signal. Proc. ITAB2003 4th Annu. IEEE EMBS Special Topic Conf. on Information Technology Applications in Biomedicine.
- 32T. Ma, Y. Y. Gu, Y. Zhang, and Y. T. Zhang, A novel biometric approach by evoked action potentials. Proc. Int. IEEE EMBS Conf. on Neural Engineering, Italy, 2003.
- 33V. Chatzis, A. G. Bors, and I. Pitas, Multimodal decision-level fusion for person authentication. IEEE Trans. Systems, Man Cybern. 1999; 29: 674–680.
- 34R. W. Frischholz and U. Dieckmann, BiolD: A multimodal biometric identification system. Computer. 2000; 33(2): 64–68.
Reading List
- D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. New York: Springer, 2003.
- S. Liu and M. Silverman, A practical guide to biometric security technology. IT Professional. 2001; 3(1): 27–32.
- M. Turk and A. Pentland, Eigenfaces for recognition. J. Cognitive Neurosci. 1991; 3(1): 71–86.
- J. Daugman, High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Analysis Machine Intell. 1993; 15(11): 1148–1161.
- D. Zhang, W. K. Kong, J. You, and M. Wong, Online palmprint identification. IEEE Trans. Pattern Analysis Machine Intell. 2003; 25(9): 1041–1050.
- R. Brunelli and D. Falavigna, Person identification using multiple cues. IEEE Trans. Pattern Analysis Machine Intell. 1995; 17(10): 955–966.
- A. Ross and A. K. Jain, Information fusion in biometrics. Pattern Recognition Lett. 2003; 24(13): 2115–2125.