Advertisement

Introduction to Biometrics

  • Anil K. Jain
  • Arun Ross

Keywords

Smart Card Equal Error Rate Speaker Recognition Biometric Data Biometric System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Bolle, J. Connell, S. Pankanti, N. Ratha, and A. Senior. The Relationship Between the ROC Curve and the CMC. In Proceedings of Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), pages 15–20, Buffalo, USA, October 2005.Google Scholar
  2. J. P. Campbell. Speaker Recognition: a Tutorial. Proceedings of the IEEE, 85(9):1437–1462, September 1997.Google Scholar
  3. J. Daugman. Recognizing Persons by their Iris Patterns. In A. K. Jain, R. Bolle, and S. Pankanti, editors, Biometrics: Personal Identification in Networked Society, pages 103–122. Kluwer Academic Publishers, London, UK, 1999.Google Scholar
  4. J. Daugman. How Iris Recognition Works? IEEE Transactions on Circuits and Systems for Video Technology, 14(1):21–30, 2004.CrossRefGoogle Scholar
  5. S. Davies. Touching Big Brother: How Biometric Technology Will Fuse Flesh and Machine. Information Technology and People, 7(4), 1994.Google Scholar
  6. G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds. Sheep, Goats, Lambs and Wolves: A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation. In CD-ROM Proceedings of the Fifth International Conference on Spoken Language Processing (ICSLP), Sydney, Australia, November/December 1998.Google Scholar
  7. J. Egan. Signal Detection Theory and ROC Analysis. Academic Press, New York, 1975.Google Scholar
  8. C. L. Fancourt, L. Bogoni, K. J. Hanna, Y. Guo, R. P. Wildes, N. Takahashi, and U. Jain. Iris Recognition at a Distance. In Fifth International Conference on Audio-and Video-based Biometric Person Authentication (AVBPA), pages 1–13, Rye Brook, USA, July 2005.Google Scholar
  9. P. Grother and P. J. Phillips. Models of Large Population Recognition Performance. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), volume 2, pages 68–75, Washington D.C., USA, June/July 2004.Google Scholar
  10. W. R. Harrison. Suspect Documents, their Scientific Examination. Nelson-Hall Publishers, 1981.Google Scholar
  11. International Biometric Group. Independent Testing of Iris Recognition Technology: Final Report. Available at http://www.biometricgroup.com/reports/public/ITIRT.html, May 2005.Google Scholar
  12. A. K. Jain, R. Bolle, and S. Pankanti, editors. Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999.Google Scholar
  13. A. K. Jain, A. Ross, and S. Prabhakar. An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image-and Video-Based Biometrics, 14(1):4–20, January 2004.Google Scholar
  14. S. Kenny and J. J. Borking. The Value of Privacy Engineering. The Journal of Information, Law and Technology (JILT), 7(1):, 2002.Google Scholar
  15. S. Kent and L. Millett. Who Goes There? Authentication Technologies through the Lens of Privacy. National Academy Press, 2003.Google Scholar
  16. L. Lee, T. Berger, and E. Aviczer. Reliable On-Line Human Signature Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(6):643–647, June 1996.CrossRefGoogle Scholar
  17. S. Z. Li and Anil K. Jain, editors. Handbook of Face Recognition. Springer-Verlag, 2005.Google Scholar
  18. D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain. FVC2004: Third Fingerprint Verification Competition. In Proceedings of International Conference on Biometric Authentication (ICBA), pages 1–7, Hong Kong, China, July 2004.Google Scholar
  19. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar. Handbook of Fingerprint Recognition. Springer-Verlag, 2003.Google Scholar
  20. A. J. Mansfield and J. L. Wayman. Best Practices in Testing and Reporting Performance of Biometric Devices, Version 2.01. Technical Report NPL Report CMSC 14/02, National Physical Laboratory, August 2002.Google Scholar
  21. A. Martin, G. Doddington, T. Kam, M. Ordowski, and M. Przybocki. The DET Curve in Assessment of Detection Task Performance. In Proceedings of the Fifth European Conference on Speech Communication and Technology, volume 4, pages 1895–1898, Rhodes, Greece, September 1997.Google Scholar
  22. F. Monrose and A. Rubin. Authentication Via Keystroke Dynamics. In Proceedings of Fourth ACM Conference on Computer and Communications Security, pages 48–56, Zurich, Switzerland, April 1997.Google Scholar
  23. H. Moon and P. J. Phillips. Computational and Performance Aspects of PCA-based Face Recognition Algorithms. Perception, 30(5):303–321, 2001.CrossRefGoogle Scholar
  24. V. S. Nalwa. Automatic On-Line Signature Verification. Proceedings of the IEEE, 85(2):215–239, February 1997.Google Scholar
  25. National Institute of Standards and Technology. NIST Biometric Scores Set. Available at http://http://www.itl.nist.gov/iad/894.03/biometricscores.Google Scholar
  26. M. Negin, T. A. Chmielewski, M. Salganicoff, T. A. Camus, U. M. C. von Seelan, P. L. Venetianer, and G. G. Zhang. An Iris Biometric System for Public and Personal Use. IEEE Computer, 33(2):70–75, February 2000.Google Scholar
  27. M. S. Nixon, J. N. Carter, D. Cunado, P. S. Huang, and S. V. Stevenage. Automatic Gait Recognition. In A. K. Jain, R. Bolle, and S. Pankanti, editors, Biometrics: Personal Identification in Networked Society, pages 231–249. Kluwer Academic Publishers, London, UK, 1999.Google Scholar
  28. L. O’Gorman. Seven Issues with Human Authentication Technologies. In Proc. of Workshop on Automatic Identification Advanced Technologies (AutoID), pages 185–186, Tarrytown, USA, March 2002.Google Scholar
  29. L. O’Gorman. Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE, 91(12):2019–2040, December 2003.Google Scholar
  30. P. J. Phillips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone. FRVT2002: Overview and Summary. Available at http://www.frvt.org/FRVT2002, March 2003.Google Scholar
  31. N. Poh and S. Bengio. An Investigation of F-ratio Client-Dependent Normalisation on Biometric Authentication Tasks. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), volume 1, pages 721–724, Philadelphia, USA, March 2005.Google Scholar
  32. S. Prabhakar, S. Pankanti, and A. K. Jain. Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy Magazine, 1(2):33–42, March-April 2003.CrossRefGoogle Scholar
  33. M. Przybocki and A. Martin. NIST Speaker Recognition Evaluation Chronicles. In Odyssey: The Speaker and Language Recognition Workshop, pages 12–22, Toledo, Spain, May 2004.Google Scholar
  34. M. Rejman-Greene. Privacy Issues in the Application of Biometrics: A European Perspective. In J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, editors, Biometric Systems: Technology, Design and Performance Evaluation, pages 335–359. Springer, 2005.Google Scholar
  35. J. A. Swets, W. P. Tanner, and T. G. Birdsall. Decision Processes in Perception. Psychological Review, 68(5):301–340, 1961.CrossRefGoogle Scholar
  36. J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, editors. Biometric Systems: Technology, Design and Performance Evaluation. Springer, 2005.Google Scholar
  37. C. Wilson, A. R. Hicklin, M. Bone, H. Korves, P. Grother, B. Ulery, R. Micheals, M. Zoepfl, S. Otto, and C. Watson. Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report. NIST Technical Report NISTIR 7123, National Institute of Standards and Technology, June 2004.Google Scholar
  38. D. Zhang, A. W.-K. Kong, J. You, and M. Wong. Online Palmprint Identification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(9):1041–1050, 2003.CrossRefGoogle Scholar
  39. R. Zunkel. Hand Geometry Based Authentication. In A. K. Jain, R. Bolle, and S. Pankanti, editors, Biometrics: Personal Identification in Networked Society, pages 87–102. Kluwer Academic Publishers, London, UK, 1999.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Anil K. Jain
    • 1
  • Arun Ross
    • 2
  1. 1.Department of Computer Science and EngineeringMichigan State UniversityEast LansingUSA
  2. 2.Lane Department of Computer Science & Electrical EngineeringWest Virginia UniversityMorgantownUSA

Personalised recommendations