Skip to main content

Introduction to Biometrics

  • Chapter
Biometrics

Abstract

Biometrics deals with identification of individuals based on their biological or behavioral characteristics. Biometrics has lately been receiving attention in popular media, it is widely believed that biometrics will become a significant component of the identification technology as (i) the prices of biometrics sensors continue to fall (ii) the underlying technology becomes more mature, and (iii) the public becomes aware of the strengths and limitations of biometrics. This chapter provides an overview of the biometrics technology and its applications and introduces the research issues underlying the biometrics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. “Technology recognition systems homepage,” http://www.betac.com/~imagemap/subs?-155,150, 1997.

    Google Scholar 

  2. J. Rice, “Veincheck homepage,” http://innotts.co.uk/~joerice/, 1997.

    Google Scholar 

  3. M. Burge and W. Burger, “Ear biometrics for machine vision,” in 21 st Workshop of Austrian Association for Pattern Recognition, http://www.cast.uni-linz.ac.at/st/vision/-Papers/oagm-97/, (Hallstatt), ÖAGM, Verlag R Oldenbourg, May 1997.

    Google Scholar 

  4. Federal Bureau of Investigation Educational Internet Publication, “DNA testing,” http://www.fbi.gov/kids/dna/dna.htm, 1997.

    Google Scholar 

  5. A. Moenssens, Fingerprint Techniques. Chilton Book Company, London, 1971.

    Google Scholar 

  6. P. Sinha and T. Poggio, “I think I know that face...,” Nature, Vol. 384, No. 6608, p. 406, 1996.

    Article  Google Scholar 

  7. A. Jain, L. Hong, S. Pankanti, and R. Bolle, “On-line identity authentication system using fingerprints,” Proceedings of IEEE (Special Issue on Automated Biometrics), Vol. 85, pp. 1365–1388, September 1997.

    Google Scholar 

  8. L. Hong, Y. Wan, and A. Jain, “Fingerprint image enhancement: Algorithm and performance evaluation,” IEEE Trans. Pattern Analysis and Machine Intelligence, 1998 (To appear).

    Google Scholar 

  9. R. E. Smith, “The true terror is in the card,” in The New York Times Magazine, September 8, 1996, pp. 58.

    Google Scholar 

  10. J. D. Woodward, “Biometrics: Privacy’s foe or privacy’s friend?,” Proceedings of the IEEE (Special Issue on Automated Biometrics), Vol. 85, pp. 1480–1492, September 1997.

    Article  Google Scholar 

  11. L. Lange and G. Leopold, “Digital identification: It’s now at our fingertips,” EEtimes at http://techweb.cmp.com/eet/823/, March 24, Vol. 946, 1997.

    Google Scholar 

  12. G. Stein, “Sacred emily,” in The Oxford Book of American Light Verse (W. Harmon, ed.), pp. 286–294, Oxford University Press. 1979.

    Google Scholar 

  13. J. R. Parks, “Personal identification — biometrics,” in Information Security (D. T. Lindsay and W. L. Price, eds.), pp. 181–191, North Holland: Elsevier Science, 1991.

    Google Scholar 

  14. R. G. D. Steel and J. H. Torrie, Principles and Procedures of Statistics: A Biometrical Approach (McGraw-Hill Series in Probability and Statistics), New York: McGraw-Hill, third ed., 1996.

    Google Scholar 

  15. R. Clarke, “Human identification in information systems: Management challenges and public policy issues,” Information Technology & People, Vol. 7, No. 4, pp. 6–37, 1994.

    Article  Google Scholar 

  16. E. Newham, The Biometric Report, http://www.sjb.com/: SJB Services, New York, 1995.

    Google Scholar 

  17. S. Furui, “Recent advances in speaker recognition,” in Lecture Notes in Computer Science 1206, Proceedings of Audio-and Video Biometric Person Authentication AVBPA’ 97, First International Conference, Crans-Montana, Switzerland, March 12–14, pp. 237–252, Springer-Verlag, Berlin, 1997.

    Google Scholar 

  18. F. J. Prokoski, R. B. Riedel, and J. S. Coffin, “Identification of individuals by means of facial thermography,” in Proceedings of The IEEE 1992 International Carnahan Conference on Security Technology: Crime Countermeasures, Atlanta, GA, USA 14–16 Oct., pp. 120–125, IEEE, 1992.

    Google Scholar 

  19. F. J. Prokoski, “NC-TEST: noncontact thermal emissions screening technique for drug and alcohol detection,” in Proc. SPIE: Human Detection and Positive Identification: Methods and Technologies (L. A. Alyea and D. E. Hoglund, eds.), Vol. 2932, pp. 136–148.

    Google Scholar 

  20. M. Turk and A. Pentland, “Eigenfaces for recognition”, Journal of Cognitive Neuroscience, Vol. 3, No. 1, pp. 71–86, 1991.

    Google Scholar 

  21. D. Swets and J. J. Weng, “Using discriminant eigenfeatures for image retrieval,” IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 18, pp. 831–836, August 1996.

    Article  Google Scholar 

  22. J. J. Atick, P. A. Griffin, and A. N. Redlich, “Statistical approach to shape from shading: Reconstruction of 3-dimensional face surfaces from single 2-dimensional images,” Neural Computation, Vol. 8, pp. 1321–1340, August 1996.

    Google Scholar 

  23. P. J. Phillips, P. J. Rauss, and S. Z. Der, “The FERET (Face Recognition Technology) evaluation methodology,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 97, June 17–19, (San Juan, Puerto Rico), 1997.

    Google Scholar 

  24. J. G. Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 15, No. 11, pp. 1148–1161, 1993.

    Article  Google Scholar 

  25. T. Julian, L. A. Vontver, and D. Dumesic, Review of Obstetrics & Gynecology. Stanford, CT: Appleton and Lange, 1995.

    Google Scholar 

  26. D. Cunado, M. S. Nixon, and J. N. Carter, “Using gait as a biometric, via phase-weighted magnitude spectra,” in Lecture Notes in Computer Science 1206, Proceedings of Audio-and Video-Biometric Person Authentication AVBPA’97, First International Conference, Crans-Montana, Switzerland, March 12–14 (J. Bigun, G. Chollet, and G. Borgefors, eds.), pp. 95–102, Springer-Verlag, Berlin, 1997.

    Google Scholar 

  27. S. A. Bleha and M. Obaidat, “Computer users verification using the perceptron algorithm,” IEEE Trans. Systems Man Cybernetics, Vol. 23, pp. 900–902, 1993.

    Article  Google Scholar 

  28. V. Nalwa, “Automatic on-line signature verification,” Proceedings of the IEEE, Vol. 85, pp. 213–239, February 1997.

    Article  Google Scholar 

  29. British Technology Group, “Automatic signature verification using acoustic emissions,” http://www.btgusa.com/security/prodl.html, 1997.

    Google Scholar 

  30. T. A. Dickinson, J. White, J. S. Kauer, and D. R. Walt, “A chemical-detecting system based on a cross-reactive optical sensor array,” Nature, Vol. 382, pp. 697–700, 1996.

    Article  Google Scholar 

  31. M. Howard, “Artificial nose may be able to sniff out land mines,” http://www.tufts.edu/communications/tech.html, 1997.

    Google Scholar 

  32. RAYCO Security, “Eyedentify retina biometric reader,” http://www.raycosecurity.com/-hirsch/EyeDentify.html, 1997.

    Google Scholar 

  33. “Biometric Technology Today,” http://www.sjb.co.uk/, November 1996.

    Google Scholar 

  34. Biomet Partners Inc., “Positive verification of a person’s identity: Digi-2 3-dimensional finger geometry,” http://www.webconsult.ch/biomet.htm, 1997.

    Google Scholar 

  35. S. C. Davies, “Touching big brother: How biometric technology will fuse flesh and machine,” Information Technology & People, Vol. 7, No. 4, pp. 60–69, 1994.

    Article  Google Scholar 

  36. B. Miller, “Vital signs of identity,” IEEE Spectrum, Vol. 31, No. 2, pp. 22–30, 1994.

    Article  Google Scholar 

  37. H. T. F. Rhodes, Alphonse Bertillon: Father of Scientific Detection. Abelard-Schuman, New York, 1956.

    Google Scholar 

  38. America Online, “Biometrics in news,” http://members.aol.com/biometric/news.html, 1997.

    Google Scholar 

  39. J. Bigun, C. Chollet, and C. Borgefors, (editors), Lecture Notes in Computer Science 1206, Proceedings of Audio-and Video-Biometric Person Authentication AVBPA’97, First International Conference, Crans-Montana, Switzerland, March 12–14. Springer-Verlag, Berlin, 1997.

    Google Scholar 

  40. “Asian Conference on Computer Vision: Special Session on Biometrics, January 8–11, Hong Kong,” http://www.vic.ust.hk/accv98, 1998.

    Google Scholar 

  41. Proceedings of Biometric Consortium Eighth Meeting, San Jose, California. June 1996.

    Google Scholar 

  42. Proceedings of Biometric Consortium Ninth Meeting, Crystal City, Virginia. April 1997.

    Google Scholar 

  43. “31st Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, November 2–5,” http://dubhe.cc.nps.navy.mil/asilomar/, 1997.

    Google Scholar 

  44. “Workshop on Automatic Identification and Technology, November 6–7, Stony Brook, NY,” http://www.cs.sunysb.edu/simtheo/waiat, 1998.

    Google Scholar 

  45. “Face Recognition: From Theory to Applications, NATO Advanced Study Institute (ASI) Program, June 23–July 4, Stirling, Scotland, UK,” http://chagall.gmu.edu/faces97-/natoasi/, 1997.

    Google Scholar 

  46. CardTech/SecurTech: Technology and Applications. May 1997.

    Google Scholar 

  47. “Biometricon’97, Arlington, VA, March 13–14,” http://www.ncsa.com/cbdc/cbdc-c.html, 1997.

    Google Scholar 

  48. “The Biometric Consortium,” <http://www.biometrics.org/>.

    Google Scholar 

  49. “Commercial Biometrics Developer Consortium (CBDC),” http//www.ncsa.com/cbdc/, 1997.

    Google Scholar 

  50. Proceedings of the IEEE (Special Issue on Automated Biometrics), Vol. 85, September 1997.

    Google Scholar 

  51. “Biometric Technology Today,” <http://www.sjb.co.uk/>.

    Google Scholar 

  52. “Automatic I. D. News homepage,” http://www.autoidnews.com/, 1997.

    Google Scholar 

  53. D. Mintie, “Welfare ID at the point of transaction using fingerprint and 2D bar codes,” in Proc. CardTech/SecurTech, Volume II: Applications, (Atlanta, Georgia), pp. 469–476, May 1996.

    Google Scholar 

  54. “INS Passenger Accelerated Service System (INSPASS),” http://www.biometrics.org:8080/~BC/REPORTS/INSPASS.html, 1996.

    Google Scholar 

  55. S. Hunt, “National ID programs around the world,” in Proc. CardTech/SecurTech, Vol. II: Applications, (Atlanta, Georgia), pp. 509–520, May 1996.

    Google Scholar 

  56. R. Bolle, N. Ratha, and S. Pankanti, “Research issues in biometrics,” in Proceedings of Asian Conference on Computer Vision: Special Session on Biometrics, January, 8–11, Hong Kong, (http://www.vic.ust.hk/accv98),.

    Google Scholar 

  57. Mytec Technologies, “Access control applications using optical computing,” http//www.mytec.com/, 1997.

    Google Scholar 

  58. R. Bahuguna, “Fingerprint verification using hologram matched filterings,” in Proceedings Biometric Consortium Eighth Meeting, (San Jose, California), June 1996.

    Google Scholar 

  59. Federal Bureau of Investigation, The Science of Fingerprints: Classification and Uses. Washington, D.C.: U.S. Government Printing Office, 1984.

    Google Scholar 

  60. J. G. Daugman and G. O. Williams, “A proposed standard for biometric decidability,” in Proc. CardTech/SecureTech Conference, (Atlanta, CA), pp. 223–234, 1996.

    Google Scholar 

  61. J. P. Campbell, L. A. Alyea, and J. S. Dunn, “Biometric security: Government applications and operations,” http://www.biometrics.org/, 1996.

    Google Scholar 

  62. J. Kittler, Y. P. Li, J. Matas, and M. U. Ramos Sanchez, “Combining evidence in multimodal personal identity recognition systems,” in Lecture Notes in Computer Science 1206, Proceedings of Audio-and Video-Biometric Person Authentication AVBPA’97, First International Conference, Crans-Montana, Switzerland, March 12–14, pp. 327–334, Springer-Verlag, Berlin, 1997.

    Google Scholar 

  63. R. Brunelli and D. Falavigna, “Person identification using multiple cues,” IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 10, pp. 955–966, October 1995.

    Article  Google Scholar 

  64. U. Dieckmann, P. Lankensteiner, R. Schamburger, B. Froba, and S. Meller, “SESAM: A biometric person identification system using sensor fusion,” in Lecture Notes in Computer Science 1206, Proceedings of Audio-and Video-Biometric Person Authentication A VBPA’ 97, First International Conference, Crans-Montana, Switzerland, March 12–14, pp. 301–310, Springer-Verlag, Berlin, 1997.

    Google Scholar 

  65. E. S. Bigun, J. Bigun, B. Due, and S. Fischer, “Expert conciliation for multi modal person authentication system by Bayesian statistics,” in Lecture Notes in Computer Science 1206, Proceedings of Audio-and Video-Biometric Person Authentication AVBPA’ 97, First International Conference, Crans-Montana, Switzerland, March 12–14, pp. 291–300, Springer-Verlag, Berlin, 1997.

    Google Scholar 

  66. L. Hong and A. Jain, “Integrating faces and fingerprints for personal identification,” in Proceedings of Asian Conference on Computer Vision: Special Session on Biometrics, January, 8–11, Hong Kong, (http://www.vic.ust.hk/accv98), 1998.

    Google Scholar 

  67. R. R. Tenney and N. R. Sandell, “Structures for distributed decision making,” IEEE Trans, on Systems, Man, and Cybernetics, Vol. 11, pp. 517–526, August 1981.

    Article  MATH  Google Scholar 

  68. R. R. Tenney and N. R. Sandell, “Strategies for distributed decision making,” IEEE Trans. on Systems, Man, and Cybernetics, Vol. 11, pp. 527–538, August 1981.

    MATH  Google Scholar 

  69. S. J. McPhee, M. A. Papadakis, L. M. Tierney, and R. Gonzales, Current Medical Diagnosis and Treatment. Stamford, CT: Appleton and Lange, 1997.

    Google Scholar 

  70. K. Inman, and N. Rudin, An Introduction to Forensic DNA Analysis. CRC Press, Boca Raton, Florida, 1997.

    Google Scholar 

  71. H. Cummins and C. Midlo, Finger Prints, Palms and Soles, Dover, New York, 1961.

    Google Scholar 

  72. J. Berry, “The history and development of fingerprinting,” H. C. Lee and R. E. Gaensslen, Eds., Advances in Fingerprint Technology, CRC Press, London, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Jain, A., Bolle, R., Pankanti, S. (1996). Introduction to Biometrics. In: Jain, A.K., Bolle, R., Pankanti, S. (eds) Biometrics. Springer, Boston, MA. https://doi.org/10.1007/0-306-47044-6_1

Download citation

  • DOI: https://doi.org/10.1007/0-306-47044-6_1

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-28539-9

  • Online ISBN: 978-0-306-47044-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics