Abstract
The last decade has seen a dramatic increase in the adoption rate of biometric technologies. This is driven by significant improvement in the enabling technologies (e.g., sensors) and the data processing capabilities (i.e., computing power, algorithms, to name a few). Advances in mobile computing, with the appearance of smart devices, and the increasing needs of security in critical areas such as finance and government are major drivers of the biometric security field. In the last decade, the population operating, using directly, or impacted indirectly by biometric solutions has grown dramatically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Global Biometric System Market Analysis & Trends - Industry Forecast to 2025. (Research and Markets, Guinness Centre, Taylors Lane, Dublin 8, Ireland), http://www.researchandmarkets.com/publication/medpaeb/420980
J. Pearsall, B. Trumble (eds.), The Oxford English Reference Dictionary, 2nd edn. (Oxford University Press, Oxford, 1996)
A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. Spec. Issue Image- Video-Based Biomet. 14(1), 4–20 (2004)
W.W. Bledsoe Man-machine facial recognition: report on a large-scale experiment. Technical report PRI-22. Panoramic Research Inc., California (1966)
R. Sanchez-Reillo, C. Sanchez-Avila, A. Gonzalez-Marcos, Biometric identification through hand geometry measurements. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1168–1171 (2000)
G. Aguilar, et al. Fingerprint recognition. Internet monitoring and protection, 2007. ICIMP 2007. Second international conference on. IEEE, 2007
G. Guo, M.J. Jones, Iris extraction based on intensity gradient and texture difference. Applications of computer vision, 2008. WACV 2008. IEEE workshop on. IEEE, 2008
J. Wu, J. Konrad, P. Ishwar. Dynamic time warping for gesture-based user identification and authentication with Kinect. Acoustics, speech and signal processing (ICASSP), 2013 I.E. international conference on. IEEE, 2013
J.A. Markowitz, Voice biometrics. Commun. ACM 43(9), 66–73 (2000)
J. Kasprzak, B. Leczynska, Cheiloscopy, in Human Identification on the Basis of Lip Trace (in Polish), (KGP, Warsaw, 2001)
Odinaka, Ikenna, et al. ECG biometrics: a robust short-time frequency analysis. Information forensics and security (WIFS), 2010 I.E. international workshop on. IEEE, 2010
A. Ahmed, I. Traore, A new biometric technology based on mouse dynamics. IEEE transactions on dependable and secure computing 4.3 (2007)
A.A.E. Ahmed, I. Traore, Free text recognition of keystrokes. IEEE Trans. Cybernet. 44(4), 458–472 (2014)
E.M. Newton, L. Sweeney, B. Malin, Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17, 232–243 (2005)
I. Traore, A. A. E. Ahmed (eds.), Continuous Authentication Based on Biometrics: Data, Models, and Metrics (IGI Global, Hershey. ISBN 978-1-61350-129, 2012)
W. Payne, Biometrics: a Double Edged Sword - Security and Privacy (SANS Institute, 2002). https://www.sans.org/reading…/biometrics-double-edged-sword-security-privacy-137
S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: security and privacy concerns. IEEE Secur. Priv. 99(2), 33–42 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Traore, I., Obaidat, M.S., Woungang, I. (2019). Introduction. In: Obaidat, M., Traore, I., Woungang, I. (eds) Biometric-Based Physical and Cybersecurity Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-98734-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-98734-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98733-0
Online ISBN: 978-3-319-98734-7
eBook Packages: EngineeringEngineering (R0)