Advertisement

Introduction

  • Issa TraoreEmail author
  • Mohammad S. Obaidat
  • Isaac Woungang
Chapter

Abstract

The last decade has seen a dramatic increase in the adoption rate of biometric technologies. This is driven by significant improvement in the enabling technologies (e.g., sensors) and the data processing capabilities (i.e., computing power, algorithms, to name a few). Advances in mobile computing, with the appearance of smart devices, and the increasing needs of security in critical areas such as finance and government are major drivers of the biometric security field. In the last decade, the population operating, using directly, or impacted indirectly by biometric solutions has grown dramatically.

References

  1. 1.
    Global Biometric System Market Analysis & Trends - Industry Forecast to 2025. (Research and Markets, Guinness Centre, Taylors Lane, Dublin 8, Ireland), http://www.researchandmarkets.com/publication/medpaeb/420980
  2. 2.
    J. Pearsall, B. Trumble (eds.), The Oxford English Reference Dictionary, 2nd edn. (Oxford University Press, Oxford, 1996)Google Scholar
  3. 3.
    A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. Spec. Issue Image- Video-Based Biomet. 14(1), 4–20 (2004)CrossRefGoogle Scholar
  4. 4.
    W.W. Bledsoe Man-machine facial recognition: report on a large-scale experiment. Technical report PRI-22. Panoramic Research Inc., California (1966)Google Scholar
  5. 5.
    R. Sanchez-Reillo, C. Sanchez-Avila, A. Gonzalez-Marcos, Biometric identification through hand geometry measurements. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1168–1171 (2000)CrossRefGoogle Scholar
  6. 6.
    G. Aguilar, et al. Fingerprint recognition. Internet monitoring and protection, 2007. ICIMP 2007. Second international conference on. IEEE, 2007Google Scholar
  7. 7.
    G. Guo, M.J. Jones, Iris extraction based on intensity gradient and texture difference. Applications of computer vision, 2008. WACV 2008. IEEE workshop on. IEEE, 2008Google Scholar
  8. 8.
    J. Wu, J. Konrad, P. Ishwar. Dynamic time warping for gesture-based user identification and authentication with Kinect. Acoustics, speech and signal processing (ICASSP), 2013 I.E. international conference on. IEEE, 2013Google Scholar
  9. 9.
    J.A. Markowitz, Voice biometrics. Commun. ACM 43(9), 66–73 (2000)CrossRefGoogle Scholar
  10. 10.
    J. Kasprzak, B. Leczynska, Cheiloscopy, in Human Identification on the Basis of Lip Trace (in Polish), (KGP, Warsaw, 2001)Google Scholar
  11. 11.
    Odinaka, Ikenna, et al. ECG biometrics: a robust short-time frequency analysis. Information forensics and security (WIFS), 2010 I.E. international workshop on. IEEE, 2010Google Scholar
  12. 12.
    A. Ahmed, I. Traore, A new biometric technology based on mouse dynamics. IEEE transactions on dependable and secure computing 4.3 (2007)CrossRefGoogle Scholar
  13. 13.
    A.A.E. Ahmed, I. Traore, Free text recognition of keystrokes. IEEE Trans. Cybernet. 44(4), 458–472 (2014)CrossRefGoogle Scholar
  14. 14.
    E.M. Newton, L. Sweeney, B. Malin, Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17, 232–243 (2005)CrossRefGoogle Scholar
  15. 15.
    I. Traore, A. A. E. Ahmed (eds.), Continuous Authentication Based on Biometrics: Data, Models, and Metrics (IGI Global, Hershey. ISBN 978-1-61350-129, 2012)Google Scholar
  16. 16.
    W. Payne, Biometrics: a Double Edged Sword - Security and Privacy (SANS Institute, 2002). https://www.sans.org/reading…/biometrics-double-edged-sword-security-privacy-137
  17. 17.
    S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: security and privacy concerns. IEEE Secur. Priv. 99(2), 33–42 (2003)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Issa Traore
    • 1
    Email author
  • Mohammad S. Obaidat
    • 2
    • 3
  • Isaac Woungang
    • 4
  1. 1.Department of Electrical and Computer EngineeringUniversity of Victoria – UVICVictoriaCanada
  2. 2.King Abdullah II School of Information TechnologyAmmanJordan
  3. 3.University of JordanAmmanJordan
  4. 4.Department of ComputerRyerson UniversityTorontoCanada

Personalised recommendations