Applications of Biometrics


Many of the inherent limitations, which are peculiar to biometrics technologies, are discussed in previous chapters. Any organisation considering introducing biometrics systems must determine their requirements and choose the system which best meets their needs. Throughout the development process consultations should be made between developers, managers and the users to detect any problems and concerns, which should be resolved immediately before implementation. Any biometric system installed must be ethically sound.


Facial Recognition Smart Card Biometric Data Biometric System Identity Card 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Atos, 2005, UK Passport Service Biometrics Enrolment Trial, Management Summary, UK Passport Service, May.Google Scholar
  2. Cardwatch., 2005, Card Fraud Overview,, (November 11, 2006).Google Scholar
  3. Davies S.G., 1994, ‘Touching Big Brother — How Biometric Technology Will Fuse Flesh and Machine’, Information Technology and People, Volume 7, No 4, 1994, pp 38–47, MCB University Press 0959-3845CrossRefGoogle Scholar
  4. Horizon, 2005, Making Millions the Easy Way, BBC-Science-Horizon,, (November 21, 2006).Google Scholar
  5. ICAO TAG MRTD/NTWG., 2004, Biometric Deployment of Machine Readable Passports — Technical Report, International Civil Aviation Authority, (March 6 2007).Google Scholar
  6. Ingram, B., 1999, Fingering a new checkout technology, Supermarket Business, Oct 15, Volume 54, Issue 10.Google Scholar
  7. Iridian Technologies, 2005, Selected case studies,, (March 21, 2007).Google Scholar
  8. Jain A.K. et al., 1998, Biometric Based Web Access, MSU Technical Report,, (January 1, 2006).Google Scholar
  9. Krawczyk S. Jain A.K. 2005, ‘Securing Electronic Records using Biometric Authentication’, Proceedings of the Audio-and Video-Based Biometric Person Authentication (AVBPA 2005), pp 1110–1119, Rye Brook, NY, (August 2, 2007).Google Scholar
  10. Mann P., 2004, ‘Woori Bank Deploys Biometrics at ATMs’, Biometric Technology Today, September.Google Scholar
  11. Mearian, L., 2002, ‘Banks eye biometrics to deter consumer fraud’, Computerworld, Jan 28, 2002, Volume 36, Issue 5.Google Scholar
  12. Rejman-Greene, M. 2003, ‘A framework for the development of biometric systems’, Biometric Technology Today, Volume 11, Issue 1, January 2003.Google Scholar
  13. Rragami L., Edwards N.H., 2003, ‘Securing Web Services with Biometrics’, Business Technology Today, May 2003 Volume 11, Issue 5.Google Scholar
  14. Shoniregun, C, A., 2005, Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES), Springer, New York, USA.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Personalised recommendations