Research Overview And Biometric Technologies


The purpose of this study is to identify the key impacts of biometric security applications and ways of minimising the risk liability of individual biometrics profile that would be kept in the database system/server. The term biometrics was derived from the Greek words bio (life) and metric (to measure). The concept of biometrics is dated back to over a thousand years where potters in East Asia placed their fingers on their wares as an early form of branding. In the 14th century explorer Joao de Barros reported that the Chinese merchants were stamping children’s palm prints and footprints on paper with ink to distinguish the young children from one another. This is one of the earliest known cases of biometrics in use and is still being used today.


Smart Card Biometric Data Biometric System Fingerprint Image Iris Recognition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Biometrics Resource Centre, 2000, Biometric Standards and Current Standard-Related Activities, (February 21, 2007).Google Scholar
  2. Campbell, P, Calvert, B and Boswell, S (2003) Security guides to network security fundamentals: Cisco learning institute.Google Scholar
  3. Chirillo. S & Blaul. S, 2003, Implementing Biometric Security, John Wiley. Canada.Google Scholar
  4. Desmarais, N., 2000, Body language, security and E-commerce, Library Hi Tech, 18(1):61–74.Google Scholar
  5. Garfinkel, S., 2000, Database Nation: The Death of Privacy in the 21st Century, O’Rielly & Associates.Google Scholar
  6. Hong, L., 1998, Automatic personal identification using fingerprints, PhD Thesis: Michigan State University.Google Scholar
  7. Howarth F., 2000, Standardisation Issues in Biometrics, Information security, (February 27, 2007).Google Scholar
  8. IHS Inc., 2005, European Commission IDs Biometrics Challenges, The complete report is titled Biometrics at the Frontiers: Assessing the Impact on Society: Source —European Commission Directorate General Joint Research Centre (JRC), (March 21, 2007)Google Scholar
  9. Jain, A.K., Bolle, R., and Pankanti, S., 1999, Personal Identification in Networked society, Kluwer Academic Publisher.Google Scholar
  10. Nalini, R.K., Senior, A., and Ruud, B.M., 1999, Automated biometrics; IBM Thomas J. Watson Research Centre Yorktown Heights, USA.Google Scholar
  11. Ross, A.A., 2003, Information fusion in fingerprint authentication, PhD Thesis: Michigan State University.Google Scholar
  12. Secguide, 2001, Biometric Technologies, (March 17, 2007).Google Scholar
  13. Shoniregun, C. A., 2005, Impacts and Risk Assessment of Technology for Internet Security: Enable information Small-medium Enterprises (TEISMEs), Springer New York, USA.Google Scholar
  14. Wayman, L, J., 2000, National Biometric Test Centre collected works (1997—2000), Version 1.2, San Jose State University, USA.Google Scholar
  15. White, M., 2001, Networking in a networked economy, Finance on Windows, SummerGoogle Scholar
  16. Woodward D. John, Orlans M. Nicholas, Higgins T. Peter, 2003, Biometrics: Identity Assurance in the Information Age, McGraw Hill.Google Scholar
  17. Zhang, D., Jing, X., and Yang, J., 2006, Biometric image discrimination technologies, Idea Group Inc publications, Hershey, USA.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Personalised recommendations