Integrating Information

  • Ruud M. Bolle
  • Jonathan H. Connell
  • Sharath Pankanti
  • Nalini K. Ratha
  • Andrew W. Senior
Chapter
Part of the Springer Professional Computing book series (SPC)

Abstract

For many applications there are additional non-biometric sources of information that can be used in person authentication. In other applications, the use of a single biometric is not sufficiently secure or does not provide sufficient coverage of the user population in that using only one biometric results in too many Failures to Acquire (high FTA rate), where it is simply impossible to sample the biometric of a subject. In both cases, the question becomes, How do we integrate multiple biometric (and non-biometric) sources of information (as in Figure 11.1) to make the overall application more accurate and hence more secure? In this chapter we describe a variety of techniques for doing so.

Keywords

Authentication Protocol Integrate Information Biometric System Fingerprint Image Speaker Verification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2004

Authors and Affiliations

  • Ruud M. Bolle
    • 1
  • Jonathan H. Connell
    • 1
  • Sharath Pankanti
    • 1
  • Nalini K. Ratha
    • 1
  • Andrew W. Senior
    • 1
  1. 1.IBM T.J. Watson Research CenterHawthorneUSA

Personalised recommendations