Advertisement

Abstract

The biometric technologies measure a variety of anatomical, physiological and behavioural characteristics, to distinguish individual and to check that the image or signal presented is that of a real face, iris, fingerprint, palm and voice. Measurements of a living entity will vary and highly dependent on environmental conditions and user behaviour.

Keywords

Biometric System Fingerprint Image Iris Recognition Automate Teller Machine Biometric Measurement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alonso-Fernandez, F., Fierrez-Aguilar, J., and Ortega-Garcia, J., 2005, A Review of Schemes for Fingerprint Image Quality Computation: Biometrics Research Laboratory, ATVS, Escuela Politecnica Superior: Universidad Autonoma de Madrid Avda, Spain.Google Scholar
  2. B & J Biometrics, Inc., 2006, Releases New Ultra Biometric Fingerprnt Encryption Mouse, 2006, Press Release: http://www.biometrics-bj.com; http://news.thomasnet.com/fullstory/501662; and http://fingerprint.nist.gov/minexO4 (February 20, 2007).Google Scholar
  3. Baby R.E., Cabezas M., Walsoe de Reca E.N., 2000, ‘Electronic nose: a useful tool for monitoring environmental contamination’, Sensors and Actuators, Volume B 69, pp. 214–218.Google Scholar
  4. Biometrics Consortium, 2005, Introduction to Biometrics, http://www.biometrics.htm (February 20, 2007).Google Scholar
  5. Bourgeois, W., and Stuetz, R.M., 2000, ‘Measuring wastewater quality using a sensor array: prospects for real-time monitoring’, Water SCI Techno, Volume. 41(12), pp. 107–112.Google Scholar
  6. Brown, C. C., Zhang, X., Mersereau, R.M., and Clements M., 2002, ‘Automatic Speech Reading with Application to Speaker Verification’, ICASSP International Conference on Acoustics, Speech and Signal Processing (ICASSP).Google Scholar
  7. Chirillo. S and Blaul. S, 2003, Implementing Biometric Security, John Wiley, Canada.Google Scholar
  8. Davies, S.G., 1994, ‘Touching the big brother: how biometric will fuse flesh and machine’, Information technology and people, 7(4), http://biometrics.cse.msu.edu/publications.html#genbio (March 21, 2007).Google Scholar
  9. Érdi, P., and Barna, G., 1991, ‘Neurodynamic Approach to Odor Processing’, Proceeding of IEEE International Joint Conference on Neural Networks, (IJCNN’91), Seattle, WA, USA.Google Scholar
  10. Garcia-Salicetti, S., Beumier, S. Garcia-Salicetti, Beumier, C., Chollet, G., Dorizzi, B., Leroux-Les Jardins, J., Lunter, J., Ni, Y., Petrovska-Delacretaz, D., 2003, ‘BIOMET: a Multimodal Person Authentication Database Including Face, Voice, Fingerprint, Hand and Signature Modalities’, Proceedings of 4th International Conference on Audio and Video-Based Biometric Person Authentication, pp. 845–853, Guildford, UK.Google Scholar
  11. Hong, L and Jain, A.K., 1998, ‘Integrating faces and fingerprints for personal identification’, IEEE Transactions on PAMI, vol. 20, http://biometrics.cse.msu.edu/publications.html#genbio (March 17, 2007).Google Scholar
  12. Hong, L., 1998, Automatic personal identification using fingerprints, PhD Thesis: Michigan State University.Google Scholar
  13. Huopio, S., 1998, Biometric identification: Seminar on Network security, Authorization & Access control in open Network Environment, www.tml.tkk.fi/Opinnot/Tik-110.501/1998/papers/12biometric/biometric.htm (March 30, 2007).Google Scholar
  14. Jain A, Griess F D, and Connell S D, 2002, Online Signature Verification, Pattern Recognition, vol. 35, No 12, December.Google Scholar
  15. Jain, A., Hong, L., and Pankanti, S., 2000, ‘Biometric Identification’, Communications of the ACM: Vol. 43. No. 2.Google Scholar
  16. Jain, A.K., Bolle, R., and Pankanti, S., 1999, Personal Identification in Networked society, Kluwer Academic Publisher.Google Scholar
  17. Jain, AK, Hong, L, Pankanti, S and Bolle, R., 1997, ‘An identity authentication system using fingerprints’, Proceedings of the IEEE, vol. 85, http://biometricscse.msu.edu/publications.html#genbio (March 7, 2007).Google Scholar
  18. Lee, H.C. and Gaesslen, R.E., 2001, Advances in Fingerprint Technology, Elsevier, New York.Google Scholar
  19. Li, Z., and Hopfield, J. J., 1989, ‘Modeling the Olfactory Bulb and its Neural Oscillatory Processing’, Biological Cybernetics, Volume 61, pp. 379–392.MATHCrossRefGoogle Scholar
  20. Ly Van, B., Blouet, R., Renouard, S., Garcia-Salicetti, S., Dorizzi, B., Chollet, G., 2003, ‘Signature with text-dependent and text-independent speech for robust identity verification’, Workshop on Multimodal User Authentication, Santa Barbara, USA.Google Scholar
  21. Maltoni, D., Maio, D., Jain, A., and Prabhakar, S., 2003, Handbook of Fingerprint Recognition, New York: Springer Verlag.MATHGoogle Scholar
  22. McLachlan, G.J., 1992, Discriminant Analysis and statistical Pattern Recognition, Wiley, New York.Google Scholar
  23. Moenssens, A, A., 1971, Fingerprint Techniques, Chilton Book Co.Google Scholar
  24. Nakamoto, T., et al., 1992, ‘Gas/Odour Identification by Semiconductor Gas Sensor Array and an Analog Artificial Neural Network Circuit’, IEEE Proceeding of International Conference of Microelectronics (MIEL92), pp. 1–9.Google Scholar
  25. Nakamoto, T., Nakahira, Y., Hiramatsu, H., 2001, ‘Odor recorder using active odor sensing system’, Sensors and Actuators, vol. B 76, pp. 465–469.Google Scholar
  26. Nanvati, S., Thieme, M, 2002, Biometrics-Identity Verification in a networked World, John Wiley and Sons Inc.Google Scholar
  27. Newham, E (1995) Tthe biometric Report. SJB Services, New York, http://sjb.co.uk (February 27, 2007).Google Scholar
  28. Pankanti, S., Prabhakar, S., and Jain, A.K., 2002, ‘Individuality of fingerprints’, IEEE Transactions on pattern analysis and machine intelligence, vol.24, no.8, http://biometrics.cse.msu.edu/publications.html#genbio (March 27, 2007).Google Scholar
  29. Prabhakar, S., and Jain, A.K., (2002), ‘Decision-level fusion in fingerprint verification’, Pattern Recognition, vol.35, no. 4.Google Scholar
  30. Retica Systems, 2005, Eye Technology-Retinal Biometric Technology, Online at: http://www.retica.com/site/technology/index.html (February 19, 2007)Google Scholar
  31. Ross, A., and Jain, A.K., 2003, ‘Information fusion in biometries’, Pattern Recognition Letters 24,13, September.Google Scholar
  32. Ross, A., and Jain, A.K., 2004, ‘Multibiometric Systems’, Communications of the ACM, 2004, Vol. 47, No. 1.Google Scholar
  33. Ross, A.A., 2003, Information fusion in fingerprint authentication, PhD Thesis: Michigan State University.Google Scholar
  34. Sandström, M. Liveness detection in fingerprint recognition systems, Linköpig University Electronic Press, Thesis, June 2004, http://www.ep.liu.se (March 22, 2007).Google Scholar
  35. Technews, 2005, ‘Biometric systems based on capacitance sensing technology’, Security Solutions, http://securitysa.com/article.asp?pklArticleid=1774&pklIssueID=248&pklCaeryID=21 (January 31, 2007).Google Scholar
  36. Temel, T., and Karlik B., 2007, ‘An Improved Odor Recognition System Using Learning Vector Quantization with a New Discriminant Analysis’, Proceeding of the International Conference on Digital communication and Computer Applications, (DCCA 2007), Jordan.Google Scholar
  37. Womack, M. 1994, ‘The Eyes Have It’, Sensor Review, Volume 14, No 4.Google Scholar
  38. Woodward D. John, Orlans M. Nicholas, Higgins T. Peter, 2003, Biometrics: Identity Assurance in the Information Age, McGraw Hill.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Personalised recommendations