Advertisement

An Introduction to Biometric Data Analysis

Biometrics is a fascinating field. What other area of science or engineering combines aspects of biology, statistics, forensics, human behavior, design, privacy and security - and also spans everything from the simple door lock to huge government systems? This diversity is compounded by the wide biological and behavioral variation in people, making it an intriguing challenge to evaluate, configure and operate a biometric installation. However, regardless of the biometric type, the fundamentals of how match decisions are made are common to all biometrics. These unifying features allow an introduction and discussion of biometrics through a common framework.

This chapter provides a snapshot of biometric systems and analysis techniques. It previews the contents of the rest of the book, providing a concise introduction to all the main topics. The goals of this chapter are to:
  • Introduce the history of biometric science (Sect. 1.2).

  • Discuss how biometrics fit into an identity management framework (Sect. 1.3).

  • Discuss desirable aspects to consider when choosing a biometric (Sect. 1.4).

  • List the components and forms of biometric data (Sect. 1.5).

  • Provide an overview of biometric systems (Sect. 1.6).

  • Give high level descriptions of the major biometric graphs (Sect. 1.7).

  • Introduce aspects of biometric privacy (Sect. 1.8).

Keywords

Face Recognition Biometric Data Biometric System Iris Recognition False Match 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Biometrics: Who’s watching you? http://www.eff.org/wp/biometrics-whos-watching-you (2003)
  2. 2.
  3. 3.
    Caslon analytics: Indigenous marks. http://www.caslon.com.au/indigenousmarknote1.htm (2007)
  4. 4.
    Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer-Verlag (2003)Google Scholar
  5. 5.
    Boyer, R.S.: Automated Reasoning: Essays in Honor of Woody Bledsoe. Kluwer Academic Publishers Group (1991)Google Scholar
  6. 6.
    Chen, X., Flynn, P.J., Bowyer, K.W.: Visible -light and infrared face recogni-tion.In: ACM Workshop on Multimodal User Authentication (2003)Google Scholar
  7. 7.
    Cole, S.A.: History of fingerprint pattern recognition.In: Ratha, N., Bolle, R. (eds.)Automatic Fingerprint Recognition Systems, pp. 1–25. Springer (2004)Google Scholar
  8. 8.
    Dessimoz, D., Richiardi, J., Champod, C., Drygajlo, A.: Multimodal biometrics for identity documents. Tech. Rep. PFS 341-08.05 Version 2.0, Universite de Lausanne (2005)Google Scholar
  9. 9.
    Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. In: Proceedings of ICSLP-98 (1998)Google Scholar
  10. 10.
    J.Cook, Chandran, V., C.Fookes: 3d face recognition using log-gabor templates. In: Proceedings British Machine Vision Conference (2006)Google Scholar
  11. 11.
    Joseph P. Campell, J.: Speaker recognition: A tutorial. In: Proceedings of IEEE, vol. 85 (1997)Google Scholar
  12. 12.
    Kanade, T.: Computer recognition of human faces. In: InterdisciplinarySystems Research, vol. 47 (1977)Google Scholar
  13. 13.
    Kirby, M., Sirovich, L.: Low-dimensional procedure for the characterization of human faces. In: J. Opt. Soc. Am, vol. 4, pp. 519–524 (1987)CrossRefGoogle Scholar
  14. 14.
    Kohonen, T.: Self-organization and Associative Memory. Springer-Verlag, Berlin (1989)Google Scholar
  15. 15.
    Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: Fingerprint verification competition. IEEE Trans. Pattern Anal. Mach. Intell. 24(3), 402–412 (2002)CrossRefGoogle Scholar
  16. 16.
    Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of Fingerprint Recognition.Springer (2003)Google Scholar
  17. 17.
    NIST: The facialrecognition technology (FERET) database. http://www.itl.nist.gov/iad/humanid/feret/ (2008)
  18. 18.
    Pentland, A., Turk, M.: Eigenfaces for recognition. In: Journal of Cognitive Neuroscience, vol. 3, pp. 71–86 (1991)CrossRefGoogle Scholar
  19. 19.
    Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face-recognition algorithms (2000)Google Scholar
  20. 20.
    Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.: The FERET database and evaluation procedure for face recognition algorithms (1998)Google Scholar
  21. 21.
    Pruzansky, S.: Pattern-matching procedure for automatic talker recognition. In: J. Acoust. Soc. Amer., vol. 35, pp. 354–358 (1963)CrossRefGoogle Scholar
  22. 22.
    Woodward, J.: Biometrics: privacy’s foe or privacy’s friend? Proceedings of the IEEE 85(9), 1480–1492 (1997)CrossRefGoogle Scholar
  23. 23.
    Yeung, D.C.S.: Forensic and security lab. http://www.ntu.edu.sg/sce/labs/forse/ppt/ForSe-overview.ppt (2008)

Copyright information

© Springer-Verlag US 2009

Personalised recommendations