Skip to main content

Biometrics for Security in E-Commerce

  • Chapter
Payment Technologies for E-Commerce

Abstract

The advance of technology is always inspired by the practical applications, and the emergence of automatic biometrics technology is rooted in the requirement for real-world security applications. Whether this new technology can last for a long time will be decided by how well it can solve security problems. Although biometric technology is at the development stage, it has been implemented in various applications and some of them work well. Along with the widespread application of biometrics technology, more funds and more attention are being given to this ascending technology [4.1–4.4, 4.20–4.22, 4.24, 4.32, 4.34].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International Biometrics Industry Association (IBIA). http://www.ibia.org

  2. ] International Biometrics Group (IBG). http://www.biometricgroup.com

  3. ] The Biometrics Consortium. http://www.biometrics.org

  4. ] Biometrics Research. http://biometrics.cse.msu.edu

  5. ] S. Liu, M. Silverman: A practical guide to biometric security technology. IEEE Computer Society, IT Pro — Security. http://www.computer.org/itpro/homepage/Jan_Feb/security3.htm

  6. ] East Shore Technologies. http://www.east-shore.com

  7. ] Fingerprint Technologies. http://www.fingerprint.com

  8. ] FingerPrint USA. http://www.fpusa.com

  9. ] Biometrics Reports. http://biometric-consulting.com

  10. ] The Biometrics Consulting Group, LLC. http://www.afb.org.uk

  11. ] Association for Biometrics (AfB), UK. http://www.aba.asn.au

  12. ] Australian Biotechnology Association. http://www.fstc.org

  13. ] Financial Services Technology Consortium. Biometrics fraud prevention. http://www.fstc.org/

    Google Scholar 

  14. ] Security Industry Association (SIA). http://www.siaonline.org

  15. ] The Human Identification Project. http://www.asti.dost.gov.ph

  16. ] GSA’s SmartGov. http://policyworks.gov/smartgov

    Google Scholar 

  17. ] Biometrics in Human Services User Group. http://www.bioapi.org

  18. ] Biometrics and Security. http://vvww.infosyssec.org/infosyssec/biometl.htm

  19. A. K. Jain, et al. (eds.) (1998) Biometrics: personal identification in networked society. Kluwer, Boston.

    Google Scholar 

  20. B. Miller (1994): Vital signs of identity. IEEE Spectrum 32 (2): 22–30.

    Article  Google Scholar 

  21. D. Zhang (2000) Automated biometrics: technologies and systems. Kluwer, Boston.

    Book  Google Scholar 

  22. D. Zhang (ed.) (2002) Biometrics solutions for authentication in an e-world. Kluwer, Boston.

    Google Scholar 

  23. M. Eleccion (1973) Automatic fingerprint identification. IEEE Spectrum 10 (9): 36–45.

    Article  Google Scholar 

  24. G. Lawton (1998) Biometrics: a new era in security. Computer 16–18.

    Google Scholar 

  25. A. Jain, et al. (1997) On-line fingerprint verification. IEEE Trans PAMI 19 (4): 302–313.

    Article  Google Scholar 

  26. J.P. Campbell (1997) Speaker recognition: a tutorial. Proc IEEE 85 (9): 1437–1462.

    Article  Google Scholar 

  27. L. Hong, et al. (1998) Integrating faces and fingerprints for personal identification. IEEE Trans PAMI 20 (12): 1295–1307.

    Article  Google Scholar 

  28. J. Daugman (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans PAMI 15: 1148–1161.

    Article  Google Scholar 

  29. Y. Zhang, D. Zhang (2000) A novel text-independent speaker verification method based on the global speaker model. IEEE Trans SMC (Part A) 30 (5): 598–602.

    Google Scholar 

  30. D. Sims (1994) Biometrics recognition: our hands, eyes and faces give us away. IEEE Comput Graphics and Apps.

    Google Scholar 

  31. J. D. Woodward (1997) Biometrics: privacy’s foe or privacy’s friend? Proc IEEE 85 (9): 1480–1492.

    Article  Google Scholar 

  32. A. Davis (1997) The body as password. Wired, July Issue.

    Google Scholar 

  33. D. R. Richards (1995) Rules of thumb for biometrics systems. Security Manage, October Issue.

    Google Scholar 

  34. G. Lawton (1998) Biometrics: a new era in security. IEEE Computer, August Issue.

    Google Scholar 

  35. R. Mandelbaum (1994) Vital signs of identity. IEEE Spectrum, February Issue.

    Google Scholar 

  36. M. Golfarelli, D. Maio, D. Maltoni (1997) On the error-reject trade-off in biometrics verification systems. IEEE Trans PAMI 19 (7): 786–796.

    Article  Google Scholar 

  37. R. P. Wildes (1997) Iris recognition: an emerging biometrics technology. Proc IEEE 85 (9): 1348–1363.

    Article  Google Scholar 

  38. C. Seal, D. McCartney, M. Gifford (1997) Iris recognition for user validation. British Telecommunications Engineering 16.

    Google Scholar 

  39. A. K. Jain, H. Lin, P. Harath, R. Bolle (1997) An identity-authentication system using fingerprints. Proc IEEE 85 (9): 1365–1388.

    Article  Google Scholar 

  40. A. Jain, H. Lin, R. Bolle (1997) On-line fingerprint verification. IEEE Trans PAMI 19 (4): 302–313.

    Article  Google Scholar 

  41. A. R. Roddy, J. D. Stosz (1997) Fingerprint features: statistical analysis and system performance estimates. Proc IEEE 85(9): 1390–1421. [4.42] http://www.nwfusion.com/research/biometrics.html

  42. http://www.veridicom.com/technology/Biometric%20Applications.pdf

  43. http://www.iris-scan.com/iris_recognition_applications.htm

  44. http://www.biometritech.com/features/deploywp4.htm

  45. http://www.vanguard-fire-security.com/security.htm

  46. http://www.fcw.com/geb/articles/2002/0311/web-face-03–04–02

  47. http://hydria.u-strasbg.fr

    Google Scholar 

  48. http://www.computer.org/itpro/homepage/jan_feb01/security3b.htm

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Zhang, D., Li, Y. (2003). Biometrics for Security in E-Commerce. In: Payment Technologies for E-Commerce. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-05322-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-05322-5_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-07887-3

  • Online ISBN: 978-3-662-05322-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics