Skip to main content
Book cover

Safe Comp 97 pp 158–170Cite as

Biometric Techniques Applied In Security Technology

  • Conference paper

Abstract

This paper summarizes results from a study [36] carried by the author under the European Commission DGXIII (Infosec’96)1 programme. These results are objective since they are based on the literature and not on manufacturers claims.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adlrer F.H. “Physiology of the Eye”: Clinical Application, 4th ed., London: The C.V. Msoby Company, 1965

    Google Scholar 

  2. Anon, (ed.) “Colloquium on Electronic Images and Image Processing in Security and Forensic Science” IEE Colloquium (Digest), n. 087,1990

    Google Scholar 

  3. Ashboum J. “Practical Implementation of biometrics based on hand geometry ” IEE Colloquium (Digest) n. 100,1994

    Google Scholar 

  4. Baltscheffsky P, Anderson P. “Palmprint Project: Automatic Identity Verification by Hand Geometry” Proceedings 1986 International Carnaham Conference on Security Technology: Electronic Crime Countermeasures, 1986

    Google Scholar 

  5. Betch D. “DNA Fingerprinting in Human Health and Society” Biotechnology Information Series (Bio-6)

    Google Scholar 

  6. Biometric Technology Today, SJB Services, Somerset, England (http://www.sjb.co.uk)

    Google Scholar 

  7. Bleha S., Slivinsky C., Hussien B. “Computer Access Security Systems using keystroke dynamics” IEEE Transactions on Pattern Analysis and Machine Intelligence, 1990; 12:1217–1222

    Article  Google Scholar 

  8. Bright R. “Smartcards: Principles, Practice, Applications” New York: Ellis Horwood, Ltd, 1988

    Google Scholar 

  9. Campbell J, Alyea L., Dunn J. “Biometric Security: Government Applications and Operations” http://www.vitro.bloomington.in.us:8080/~BC/

    Google Scholar 

  10. Carback R. “Reducing Manpower intensive tasks through automation of security technologies” IEEE Annual International Carnahan Conference on Security Technology, Proceedings 1995, pp.331–339

    Google Scholar 

  11. Chip Architecture for Smart Cards and Secure Portable Devices (CASCADE) Esprit Project EP8670, Data Sheet 1995

    Google Scholar 

  12. Cross J.M., Smith C.L. “Thermographic imaging of the subcutaneous vascular network of the back of the hand for biometric identification” IEEE Annual International Carnahan Conference on Security Technology, Proceedings of the 29th Annual 1995 International Carnahan Conference on Security Technology, pp. 20–35

    Google Scholar 

  13. Daugman J. “High confidence visual recognition of persons by a test of statistical independence” IEEE Transactions on Pattern Analysis and Machine Intelligence 1993; 15:.1148–1161

    Article  Google Scholar 

  14. Davies D.W., Price W.L.“ Security for Computer Networks” John Wiley & Sons, 1984

    Google Scholar 

  15. Davson H. “Davson Physiology of the Eye” 5th ed. London, Macmillan, 1990

    Google Scholar 

  16. Feustel T., Velius G. “Speaker identity verification over telephone line: where we are and where we are going” Proc. 1989 Int. Carnaham Conf. Secur. Publ. by IEEE, pp. 181–182

    Google Scholar 

  17. Fumell S.M., Morrissey J.P., Sanders P.W., Stockel C.T. “Applications of keystroke analysis for improved login security and continues user authentication” Proceedings of Information Systems Security (edited by S. Katsikas, D. Gritzalis), pp.283–294, 1996

    Google Scholar 

  18. Galton G. “Personal Identification and Description” Nature 1988; 173–177

    Google Scholar 

  19. General Accounting Office “Electronic Benefits Transfer, Use of Biometrics to Deter Fraud in the Nationwide EBT program”, USA, 1995

    Google Scholar 

  20. George M.H., King R.A. “Robust speaker verification biometric” IEEE Annual International Carnahan Conference on Security Technology, Proceedings of the 29th Annual 1995 International Carnahan Conference on Security Technology, pp. 41–46

    Google Scholar 

  21. Hamilton D.J.,. Whelan J., McLaren A, Maclntyre I, Tizzard A “Low cost dynamic signature verification system” IEE Conference Publication 1995; 408:202–206

    Google Scholar 

  22. Hays R.TNSPASS Jan 1996 <http://www.vitro.bloomington.in.us

    Google Scholar 

  23. Holmes, J. Wright L., Maxwell, R. “A performance evaluation of Biometric identification Devices” Sandia National Laboratories, U.S.A, 1991

    Google Scholar 

  24. Jouce R. and Gupta G. “Identity Authentication based on keystroke Latencies” Communications of the ACM, 1990:30:168–176

    Article  Google Scholar 

  25. King R.A., Gosling W. Electronics Letters, 1978; 14: 456–457

    Article  Google Scholar 

  26. Klopp C “More options for physical access control” Comput. Secur, 1990; 9:.229–232

    Article  Google Scholar 

  27. Konen W. “Neural information processing in real world face recognition applications” IEEE Expert, 1996; 11:, 7–8

    Article  Google Scholar 

  28. Lynch M.R., Gaunt R.G. “Application of Linear Weight Neural Networks to fingerprint recognition” IEE Conference Publication, 1995; 409:.139–142

    Google Scholar 

  29. Markowitz J. “Speaker Verification, Who’s there?” PC AI Intelligent Solutions for Desktop Computers, 1995; 9:24–26

    Google Scholar 

  30. Marsh P. “Biometric Behavior is smart and secure” New Electronics 1996; 9 :25–26

    Google Scholar 

  31. Mercer J. “Design and strategies for optobiometric identification” Proceedings of SPIE-The International Society for Optical Engineering 1996; 2659:60–66

    Google Scholar 

  32. Mintie D. “Biometrics in Human Services User Group Newletter” vol.1, no. 1, July 1996

    Google Scholar 

  33. Morgan D.P., Scofield C.L. “Neural Networks and Speech Processing” Mass., U.S.A.: Kluwer Academic Publishers 1991

    Book  MATH  Google Scholar 

  34. Newham E. “The Biometric Report” SJB Services, UK 1995; 405:198–201

    Google Scholar 

  35. Newton J.“Reducing plastic counterfeiting” IEE Conference Publication 1995

    Google Scholar 

  36. Polemi D. “Review and Evaluation of Biometric Techniques for Identification and Authentication, including an appraisal of the areas where they are most applicable”, Infosec (DGXIII) Programme, 1996, http://www.cordis.lu/infosec

    Google Scholar 

  37. Rice J.“Quality approach to biometric imaging” IEE Colloquium (Digest) n. 100, Apr. 1994

    Google Scholar 

  38. Rohen J. “Morphology and Pathology of the trabecular network in the structure of the eye”, Smelser, Ed. N.Y.: Academic Press 1961; 335–341

    Google Scholar 

  39. Scott W. “Defense skills applied to biometric ID” Aviation week and Space Technology, v. 141, n. 16, p.54

    Google Scholar 

  40. Sidlauskas D. A new concept in biometric identification 3-Dimensional Hand Geometry, Nucl. Mater. Manage 1987; 16:442–447

    Google Scholar 

  41. Spanish Government Agency Wins Outstanding Smart card Application Award at CTST’96 Awards Banquet. May 1996. CardFlash, RAM Research Group

    Google Scholar 

  42. Stockel A “Securing data and financial transactions ” IEEE Annual International Carnahan Conference on Security Technology, Proceedings 1995; 397–401

    Google Scholar 

  43. Timms S.R., King R.A.“Speaker verification utilising artificial neural network and biometric functions derived from time encoded speech (TES) Data” ICCS/ISITA Singapore 1992;447– 449

    Google Scholar 

  44. Unisys Personal Identification Technology will be used to give Spaniers Access to Personal Information in Spain’s Healthcare Databases. March 1996. UNISYS WORLD Editorial Index. Publications & communications Inc

    Google Scholar 

  45. Wood H.M.“The use of passwords for controlled access to computer resources” National Bureau of Standards Special Publication 500–9, US Dept. of Commerce/NBS

    Google Scholar 

  46. Zunkel R. “Biometrics and Border Control” Security Technology & Design 1996; 22–27

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag London Limited

About this paper

Cite this paper

Polemi, D. (1997). Biometric Techniques Applied In Security Technology. In: Daniel, P. (eds) Safe Comp 97. Springer, London. https://doi.org/10.1007/978-1-4471-0997-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-0997-6_13

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-76191-4

  • Online ISBN: 978-1-4471-0997-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics