Abstract
This paper summarizes results from a study [36] carried by the author under the European Commission DGXIII (Infosec’96)1 programme. These results are objective since they are based on the literature and not on manufacturers claims.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Adlrer F.H. “Physiology of the Eye”: Clinical Application, 4th ed., London: The C.V. Msoby Company, 1965
Anon, (ed.) “Colloquium on Electronic Images and Image Processing in Security and Forensic Science” IEE Colloquium (Digest), n. 087,1990
Ashboum J. “Practical Implementation of biometrics based on hand geometry ” IEE Colloquium (Digest) n. 100,1994
Baltscheffsky P, Anderson P. “Palmprint Project: Automatic Identity Verification by Hand Geometry” Proceedings 1986 International Carnaham Conference on Security Technology: Electronic Crime Countermeasures, 1986
Betch D. “DNA Fingerprinting in Human Health and Society” Biotechnology Information Series (Bio-6)
Biometric Technology Today, SJB Services, Somerset, England (http://www.sjb.co.uk)
Bleha S., Slivinsky C., Hussien B. “Computer Access Security Systems using keystroke dynamics” IEEE Transactions on Pattern Analysis and Machine Intelligence, 1990; 12:1217–1222
Bright R. “Smartcards: Principles, Practice, Applications” New York: Ellis Horwood, Ltd, 1988
Campbell J, Alyea L., Dunn J. “Biometric Security: Government Applications and Operations” http://www.vitro.bloomington.in.us:8080/~BC/
Carback R. “Reducing Manpower intensive tasks through automation of security technologies” IEEE Annual International Carnahan Conference on Security Technology, Proceedings 1995, pp.331–339
Chip Architecture for Smart Cards and Secure Portable Devices (CASCADE) Esprit Project EP8670, Data Sheet 1995
Cross J.M., Smith C.L. “Thermographic imaging of the subcutaneous vascular network of the back of the hand for biometric identification” IEEE Annual International Carnahan Conference on Security Technology, Proceedings of the 29th Annual 1995 International Carnahan Conference on Security Technology, pp. 20–35
Daugman J. “High confidence visual recognition of persons by a test of statistical independence” IEEE Transactions on Pattern Analysis and Machine Intelligence 1993; 15:.1148–1161
Davies D.W., Price W.L.“ Security for Computer Networks” John Wiley & Sons, 1984
Davson H. “Davson Physiology of the Eye” 5th ed. London, Macmillan, 1990
Feustel T., Velius G. “Speaker identity verification over telephone line: where we are and where we are going” Proc. 1989 Int. Carnaham Conf. Secur. Publ. by IEEE, pp. 181–182
Fumell S.M., Morrissey J.P., Sanders P.W., Stockel C.T. “Applications of keystroke analysis for improved login security and continues user authentication” Proceedings of Information Systems Security (edited by S. Katsikas, D. Gritzalis), pp.283–294, 1996
Galton G. “Personal Identification and Description” Nature 1988; 173–177
General Accounting Office “Electronic Benefits Transfer, Use of Biometrics to Deter Fraud in the Nationwide EBT program”, USA, 1995
George M.H., King R.A. “Robust speaker verification biometric” IEEE Annual International Carnahan Conference on Security Technology, Proceedings of the 29th Annual 1995 International Carnahan Conference on Security Technology, pp. 41–46
Hamilton D.J.,. Whelan J., McLaren A, Maclntyre I, Tizzard A “Low cost dynamic signature verification system” IEE Conference Publication 1995; 408:202–206
Hays R.TNSPASS Jan 1996 <http://www.vitro.bloomington.in.us
Holmes, J. Wright L., Maxwell, R. “A performance evaluation of Biometric identification Devices” Sandia National Laboratories, U.S.A, 1991
Jouce R. and Gupta G. “Identity Authentication based on keystroke Latencies” Communications of the ACM, 1990:30:168–176
King R.A., Gosling W. Electronics Letters, 1978; 14: 456–457
Klopp C “More options for physical access control” Comput. Secur, 1990; 9:.229–232
Konen W. “Neural information processing in real world face recognition applications” IEEE Expert, 1996; 11:, 7–8
Lynch M.R., Gaunt R.G. “Application of Linear Weight Neural Networks to fingerprint recognition” IEE Conference Publication, 1995; 409:.139–142
Markowitz J. “Speaker Verification, Who’s there?” PC AI Intelligent Solutions for Desktop Computers, 1995; 9:24–26
Marsh P. “Biometric Behavior is smart and secure” New Electronics 1996; 9 :25–26
Mercer J. “Design and strategies for optobiometric identification” Proceedings of SPIE-The International Society for Optical Engineering 1996; 2659:60–66
Mintie D. “Biometrics in Human Services User Group Newletter” vol.1, no. 1, July 1996
Morgan D.P., Scofield C.L. “Neural Networks and Speech Processing” Mass., U.S.A.: Kluwer Academic Publishers 1991
Newham E. “The Biometric Report” SJB Services, UK 1995; 405:198–201
Newton J.“Reducing plastic counterfeiting” IEE Conference Publication 1995
Polemi D. “Review and Evaluation of Biometric Techniques for Identification and Authentication, including an appraisal of the areas where they are most applicable”, Infosec (DGXIII) Programme, 1996, http://www.cordis.lu/infosec
Rice J.“Quality approach to biometric imaging” IEE Colloquium (Digest) n. 100, Apr. 1994
Rohen J. “Morphology and Pathology of the trabecular network in the structure of the eye”, Smelser, Ed. N.Y.: Academic Press 1961; 335–341
Scott W. “Defense skills applied to biometric ID” Aviation week and Space Technology, v. 141, n. 16, p.54
Sidlauskas D. A new concept in biometric identification 3-Dimensional Hand Geometry, Nucl. Mater. Manage 1987; 16:442–447
Spanish Government Agency Wins Outstanding Smart card Application Award at CTST’96 Awards Banquet. May 1996. CardFlash, RAM Research Group
Stockel A “Securing data and financial transactions ” IEEE Annual International Carnahan Conference on Security Technology, Proceedings 1995; 397–401
Timms S.R., King R.A.“Speaker verification utilising artificial neural network and biometric functions derived from time encoded speech (TES) Data” ICCS/ISITA Singapore 1992;447– 449
Unisys Personal Identification Technology will be used to give Spaniers Access to Personal Information in Spain’s Healthcare Databases. March 1996. UNISYS WORLD Editorial Index. Publications & communications Inc
Wood H.M.“The use of passwords for controlled access to computer resources” National Bureau of Standards Special Publication 500–9, US Dept. of Commerce/NBS
Zunkel R. “Biometrics and Border Control” Security Technology & Design 1996; 22–27
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer-Verlag London Limited
About this paper
Cite this paper
Polemi, D. (1997). Biometric Techniques Applied In Security Technology. In: Daniel, P. (eds) Safe Comp 97. Springer, London. https://doi.org/10.1007/978-1-4471-0997-6_13
Download citation
DOI: https://doi.org/10.1007/978-1-4471-0997-6_13
Publisher Name: Springer, London
Print ISBN: 978-3-540-76191-4
Online ISBN: 978-1-4471-0997-6
eBook Packages: Springer Book Archive