This complete, technical guide details the principles, methods, technologies, and core ideas used in biometric authentication systems. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance. The "Guide to Biometrics:" * Debunks myths and candidly confronts problems associated with biometrics research * Details relevant issues in choosing between biometrics, as well as defining and measuring performance * Defines and explains how to measure the performance of both verification and identification systems * Addresses challenges in managing tradeoffs between security and convenience Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology.
Cited By
- Ottakath N, Al-Ali A, Al-Maadeed S, Elharrouss O and Mohamed A (2023). Enhanced computer vision applications with blockchain, Journal of King Saud University - Computer and Information Sciences, 35:10, Online publication date: 1-Dec-2023.
- Doroz R, Wrobel K, Orczyk T, Porwik P and Cholewa M (2022). Multidimensional nearest neighbors classification based system for incomplete lip print identification, Expert Systems with Applications: An International Journal, 202:C, Online publication date: 15-Sep-2022.
- Li Z, Chen B, Chen X, Xu C, Chen Y, Lin F, Li C, Dantu K, Ren K and Xu W (2022). Reliable Digital Forensics in the Air, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 6:2, (1-25), Online publication date: 4-Jul-2022.
- Wan C, Wang L and Phoha V (2018). A Survey on Gait Recognition, ACM Computing Surveys, 51:5, (1-35), Online publication date: 30-Sep-2019.
- Buckley O and Nurse J (2019). The language of biometrics, Journal of Information Security and Applications, 47:C, (112-119), Online publication date: 1-Aug-2019.
- Li Z, Rathore A, Chen B, Song C, Yang Z and Xu W SpecEye Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, (103-116)
- Li Z, Yang Z, Song C, Li C, Peng Z and Xu W E-Eye Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, (68-81)
- Li Z, Rathore A, Song C, Wei S, Wang Y and Xu W PrinTracker Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1306-1323)
- Akdogan D, Karaoglan Altop D, Eskandarian L and Levi A (2018). Secure key agreement protocols, Computer Networks: The International Journal of Computer and Telecommunications Networking, 142:C, (33-48), Online publication date: 4-Sep-2018.
- Wójtowicz A and Chmielewski J (2017). Technical feasibility of context-aware passive payment authorization for physical points of sale, Personal and Ubiquitous Computing, 21:6, (1113-1125), Online publication date: 1-Dec-2017.
- Sartasov S, Zakharov R and Mikhalev A Lions, swans, monkeys Proceedings of the 13th Central & Eastern European Software Engineering Conference in Russia, (1-8)
- Carneiro D and Novais P (2017). Quantifying the effects of external factors on individual performance, Future Generation Computer Systems, 66:C, (171-186), Online publication date: 1-Jan-2017.
- Doroz R, Wrobel K and Watroba M A Hybrid System of Signature Recognition Using Video and Similarity Measures Proceedings of the 9th International Conference on Hybrid Artificial Intelligence Systems - Volume 8480, (211-220)
Recommendations
Multi-factor biometrics for authentication: a false sense of security
MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and securityMulti-factor biometric authentications have been proposed recently to strengthen security and/or privacy of biometric systems in addition to enhancing authentication accuracy. An important approach to multi-factor biometric authentication is to apply ...
Biometrics: Biometrics for enterprise security
'You can't leave your finger behind,' as biometrics fans never tire of telling us. In fact biometrics have been promoted as a 'foolproof' way to authenticate an individual's identity. But how much should we trust those claims? Industry vendors even ...
Finger knuckle biometrics - A review
Display Omitted Describes the role of finger knuckle surface in biometric authentication.Enumerates various available open datasets for finger knuckle biometric trait.Presents different view point in the classification of various finger knuckle feature ...