Abstract
The advance of technology is always inspired by the practical applications, and the emergence of automatic biometrics technology is rooted in the requirement for real-world security applications. Whether this new technology can last for a long time will be decided by how well it can solve security problems. Although biometric technology is at the development stage, it has been implemented in various applications and some of them work well. Along with the widespread application of biometrics technology, more funds and more attention are being given to this ascending technology [4.1–4.4, 4.20–4.22, 4.24, 4.32, 4.34].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
International Biometrics Industry Association (IBIA). http://www.ibia.org
] International Biometrics Group (IBG). http://www.biometricgroup.com
] The Biometrics Consortium. http://www.biometrics.org
] Biometrics Research. http://biometrics.cse.msu.edu
] S. Liu, M. Silverman: A practical guide to biometric security technology. IEEE Computer Society, IT Pro — Security. http://www.computer.org/itpro/homepage/Jan_Feb/security3.htm
] East Shore Technologies. http://www.east-shore.com
] Fingerprint Technologies. http://www.fingerprint.com
] FingerPrint USA. http://www.fpusa.com
] Biometrics Reports. http://biometric-consulting.com
] The Biometrics Consulting Group, LLC. http://www.afb.org.uk
] Association for Biometrics (AfB), UK. http://www.aba.asn.au
] Australian Biotechnology Association. http://www.fstc.org
] Financial Services Technology Consortium. Biometrics fraud prevention. http://www.fstc.org/
] Security Industry Association (SIA). http://www.siaonline.org
] The Human Identification Project. http://www.asti.dost.gov.ph
] GSA’s SmartGov. http://policyworks.gov/smartgov
] Biometrics in Human Services User Group. http://www.bioapi.org
] Biometrics and Security. http://vvww.infosyssec.org/infosyssec/biometl.htm
A. K. Jain, et al. (eds.) (1998) Biometrics: personal identification in networked society. Kluwer, Boston.
B. Miller (1994): Vital signs of identity. IEEE Spectrum 32 (2): 22–30.
D. Zhang (2000) Automated biometrics: technologies and systems. Kluwer, Boston.
D. Zhang (ed.) (2002) Biometrics solutions for authentication in an e-world. Kluwer, Boston.
M. Eleccion (1973) Automatic fingerprint identification. IEEE Spectrum 10 (9): 36–45.
G. Lawton (1998) Biometrics: a new era in security. Computer 16–18.
A. Jain, et al. (1997) On-line fingerprint verification. IEEE Trans PAMI 19 (4): 302–313.
J.P. Campbell (1997) Speaker recognition: a tutorial. Proc IEEE 85 (9): 1437–1462.
L. Hong, et al. (1998) Integrating faces and fingerprints for personal identification. IEEE Trans PAMI 20 (12): 1295–1307.
J. Daugman (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans PAMI 15: 1148–1161.
Y. Zhang, D. Zhang (2000) A novel text-independent speaker verification method based on the global speaker model. IEEE Trans SMC (Part A) 30 (5): 598–602.
D. Sims (1994) Biometrics recognition: our hands, eyes and faces give us away. IEEE Comput Graphics and Apps.
J. D. Woodward (1997) Biometrics: privacy’s foe or privacy’s friend? Proc IEEE 85 (9): 1480–1492.
A. Davis (1997) The body as password. Wired, July Issue.
D. R. Richards (1995) Rules of thumb for biometrics systems. Security Manage, October Issue.
G. Lawton (1998) Biometrics: a new era in security. IEEE Computer, August Issue.
R. Mandelbaum (1994) Vital signs of identity. IEEE Spectrum, February Issue.
M. Golfarelli, D. Maio, D. Maltoni (1997) On the error-reject trade-off in biometrics verification systems. IEEE Trans PAMI 19 (7): 786–796.
R. P. Wildes (1997) Iris recognition: an emerging biometrics technology. Proc IEEE 85 (9): 1348–1363.
C. Seal, D. McCartney, M. Gifford (1997) Iris recognition for user validation. British Telecommunications Engineering 16.
A. K. Jain, H. Lin, P. Harath, R. Bolle (1997) An identity-authentication system using fingerprints. Proc IEEE 85 (9): 1365–1388.
A. Jain, H. Lin, R. Bolle (1997) On-line fingerprint verification. IEEE Trans PAMI 19 (4): 302–313.
A. R. Roddy, J. D. Stosz (1997) Fingerprint features: statistical analysis and system performance estimates. Proc IEEE 85(9): 1390–1421. [4.42] http://www.nwfusion.com/research/biometrics.html
http://www.veridicom.com/technology/Biometric%20Applications.pdf
http://www.iris-scan.com/iris_recognition_applications.htm
http://www.biometritech.com/features/deploywp4.htm
http://www.vanguard-fire-security.com/security.htm
http://www.fcw.com/geb/articles/2002/0311/web-face-03–04–02
http://hydria.u-strasbg.fr
http://www.computer.org/itpro/homepage/jan_feb01/security3b.htm
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Zhang, D., Li, Y. (2003). Biometrics for Security in E-Commerce. In: Payment Technologies for E-Commerce. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-05322-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-662-05322-5_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-07887-3
Online ISBN: 978-3-662-05322-5
eBook Packages: Springer Book Archive