Skip to main content

Abstract

The last decade has seen a dramatic increase in the adoption rate of biometric technologies. This is driven by significant improvement in the enabling technologies (e.g., sensors) and the data processing capabilities (i.e., computing power, algorithms, to name a few). Advances in mobile computing, with the appearance of smart devices, and the increasing needs of security in critical areas such as finance and government are major drivers of the biometric security field. In the last decade, the population operating, using directly, or impacted indirectly by biometric solutions has grown dramatically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Global Biometric System Market Analysis & Trends - Industry Forecast to 2025. (Research and Markets, Guinness Centre, Taylors Lane, Dublin 8, Ireland), http://www.researchandmarkets.com/publication/medpaeb/420980

  2. J. Pearsall, B. Trumble (eds.), The Oxford English Reference Dictionary, 2nd edn. (Oxford University Press, Oxford, 1996)

    Google Scholar 

  3. A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. Spec. Issue Image- Video-Based Biomet. 14(1), 4–20 (2004)

    Article  Google Scholar 

  4. W.W. Bledsoe Man-machine facial recognition: report on a large-scale experiment. Technical report PRI-22. Panoramic Research Inc., California (1966)

    Google Scholar 

  5. R. Sanchez-Reillo, C. Sanchez-Avila, A. Gonzalez-Marcos, Biometric identification through hand geometry measurements. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1168–1171 (2000)

    Article  Google Scholar 

  6. G. Aguilar, et al. Fingerprint recognition. Internet monitoring and protection, 2007. ICIMP 2007. Second international conference on. IEEE, 2007

    Google Scholar 

  7. G. Guo, M.J. Jones, Iris extraction based on intensity gradient and texture difference. Applications of computer vision, 2008. WACV 2008. IEEE workshop on. IEEE, 2008

    Google Scholar 

  8. J. Wu, J. Konrad, P. Ishwar. Dynamic time warping for gesture-based user identification and authentication with Kinect. Acoustics, speech and signal processing (ICASSP), 2013 I.E. international conference on. IEEE, 2013

    Google Scholar 

  9. J.A. Markowitz, Voice biometrics. Commun. ACM 43(9), 66–73 (2000)

    Article  Google Scholar 

  10. J. Kasprzak, B. Leczynska, Cheiloscopy, in Human Identification on the Basis of Lip Trace (in Polish), (KGP, Warsaw, 2001)

    Google Scholar 

  11. Odinaka, Ikenna, et al. ECG biometrics: a robust short-time frequency analysis. Information forensics and security (WIFS), 2010 I.E. international workshop on. IEEE, 2010

    Google Scholar 

  12. A. Ahmed, I. Traore, A new biometric technology based on mouse dynamics. IEEE transactions on dependable and secure computing 4.3 (2007)

    Article  Google Scholar 

  13. A.A.E. Ahmed, I. Traore, Free text recognition of keystrokes. IEEE Trans. Cybernet. 44(4), 458–472 (2014)

    Article  Google Scholar 

  14. E.M. Newton, L. Sweeney, B. Malin, Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17, 232–243 (2005)

    Article  Google Scholar 

  15. I. Traore, A. A. E. Ahmed (eds.), Continuous Authentication Based on Biometrics: Data, Models, and Metrics (IGI Global, Hershey. ISBN 978-1-61350-129, 2012)

    Google Scholar 

  16. W. Payne, Biometrics: a Double Edged Sword - Security and Privacy (SANS Institute, 2002). https://www.sans.org/reading…/biometrics-double-edged-sword-security-privacy-137

  17. S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: security and privacy concerns. IEEE Secur. Priv. 99(2), 33–42 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Issa Traore .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Traore, I., Obaidat, M.S., Woungang, I. (2019). Introduction. In: Obaidat, M., Traore, I., Woungang, I. (eds) Biometric-Based Physical and Cybersecurity Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-98734-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98734-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98733-0

  • Online ISBN: 978-3-319-98734-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics