Skip to main content

Biometric Authentication

International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002 Proceedings

  • Conference proceedings
  • © 2002

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2359)

Included in the following conference series:

Conference proceedings info: BioAW 2002.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (19 papers)

Other volumes

  1. Biometric Authentication

Keywords

About this book

Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral characteristics. It associates an individual with a previously determined identity based on that individual s appearance or behavior. Because many physiological or behavioral characteristics (biometric indicators) are distinctive to each person, biometric identifiers are inherently more reliable and more capable than knowledge-based (e.g., password) and token-based (e.g., a key) techniques in differentiating between an authorized person and a fraudulent impostor. For this reason, more and more organizations are looking to automated identity authentication systems to improve customer satisfaction, security, and operating efficiency as well as to save critical resources. Biometric authentication is a challenging pattern recognition problem; it involves more than just template matching. The intrinsic nature of biometric data must be carefully studied, analyzed, and its properties taken into account in developing suitable representation and matching algorithms. The intrinsic variability of data with time and environmental conditions, the social acceptability and invasiveness of acquisition devices, and the facility with which the data can be counterfeited must be considered in the choice of a biometric indicator for a given application. In order to deploy a biometric authentication system, one must consider its reliability, accuracy, applicability, and efficiency. Eventually, it may be necessary to combine several biometric indicators (multimodal-biometrics) to cope with the drawbacks of the individual biometric indicators.

Editors and Affiliations

  • Computer Vision Laboratory, DIBEV, University of Sassari, Sassari, Italy

    Massimo Tistarelli

  • Halmstad University, Halmstad, Sweden

    Josef Bigun

  • Department of Computer Science and Engineering, Michigan State University, East Lansing, USA

    Anil K. Jain

Bibliographic Information

Publish with us