Biometrics for Security in E-Commerce

  • David Zhang
  • Yu Li

Abstract

The advance of technology is always inspired by the practical applications, and the emergence of automatic biometrics technology is rooted in the requirement for real-world security applications. Whether this new technology can last for a long time will be decided by how well it can solve security problems. Although biometric technology is at the development stage, it has been implemented in various applications and some of them work well. Along with the widespread application of biometrics technology, more funds and more attention are being given to this ascending technology [4.1–4.4, 4.20–4.22, 4.24, 4.32, 4.34].

Keywords

Migration Retina Marketing Dition Malaysia 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [4.1]
    International Biometrics Industry Association (IBIA). http://www.ibia.org
  2. [4.2]
    ] International Biometrics Group (IBG). http://www.biometricgroup.com
  3. [4.3]
    ] The Biometrics Consortium. http://www.biometrics.org
  4. [4.4]
    ] Biometrics Research. http://biometrics.cse.msu.edu
  5. [4.5]
    ] S. Liu, M. Silverman: A practical guide to biometric security technology. IEEE Computer Society, IT Pro — Security. http://www.computer.org/itpro/homepage/Jan_Feb/security3.htm
  6. [4.6]
    ] East Shore Technologies. http://www.east-shore.com
  7. [4.7]
    ] Fingerprint Technologies. http://www.fingerprint.com
  8. [4.8]
    ] FingerPrint USA. http://www.fpusa.com
  9. [4.9]
    ] Biometrics Reports. http://biometric-consulting.com
  10. [4.10]
    ] The Biometrics Consulting Group, LLC. http://www.afb.org.uk
  11. [4.11]
    ] Association for Biometrics (AfB), UK. http://www.aba.asn.au
  12. [4.12]
    ] Australian Biotechnology Association. http://www.fstc.org
  13. [4.13]
    ] Financial Services Technology Consortium. Biometrics fraud prevention. http://www.fstc.org/Google Scholar
  14. [4.14]
    ] Security Industry Association (SIA). http://www.siaonline.org
  15. [4.15]
    ] The Human Identification Project. http://www.asti.dost.gov.ph
  16. [4.16]
    ] GSA’s SmartGov. http://policyworks.gov/smartgovGoogle Scholar
  17. [4.17]
    ] Biometrics in Human Services User Group. http://www.bioapi.org
  18. [4.18]
    ] Biometrics and Security. http://vvww.infosyssec.org/infosyssec/biometl.htm
  19. [4.19]
    A. K. Jain, et al. (eds.) (1998) Biometrics: personal identification in networked society. Kluwer, Boston.Google Scholar
  20. [4.20]
    B. Miller (1994): Vital signs of identity. IEEE Spectrum 32 (2): 22–30.CrossRefGoogle Scholar
  21. [4.21]
    D. Zhang (2000) Automated biometrics: technologies and systems. Kluwer, Boston.CrossRefGoogle Scholar
  22. [4.22]
    D. Zhang (ed.) (2002) Biometrics solutions for authentication in an e-world. Kluwer, Boston.Google Scholar
  23. [4.23]
    M. Eleccion (1973) Automatic fingerprint identification. IEEE Spectrum 10 (9): 36–45.CrossRefGoogle Scholar
  24. [4.24]
    G. Lawton (1998) Biometrics: a new era in security. Computer 16–18.Google Scholar
  25. [4.25]
    A. Jain, et al. (1997) On-line fingerprint verification. IEEE Trans PAMI 19 (4): 302–313.CrossRefGoogle Scholar
  26. [4.26]
    J.P. Campbell (1997) Speaker recognition: a tutorial. Proc IEEE 85 (9): 1437–1462.CrossRefGoogle Scholar
  27. [4.27]
    L. Hong, et al. (1998) Integrating faces and fingerprints for personal identification. IEEE Trans PAMI 20 (12): 1295–1307.CrossRefGoogle Scholar
  28. [4.28]
    J. Daugman (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans PAMI 15: 1148–1161.CrossRefGoogle Scholar
  29. [4.29]
    Y. Zhang, D. Zhang (2000) A novel text-independent speaker verification method based on the global speaker model. IEEE Trans SMC (Part A) 30 (5): 598–602.Google Scholar
  30. [4.30]
    D. Sims (1994) Biometrics recognition: our hands, eyes and faces give us away. IEEE Comput Graphics and Apps.Google Scholar
  31. [4.31]
    J. D. Woodward (1997) Biometrics: privacy’s foe or privacy’s friend? Proc IEEE 85 (9): 1480–1492.CrossRefGoogle Scholar
  32. [4.32]
    A. Davis (1997) The body as password. Wired, July Issue.Google Scholar
  33. [4.33]
    D. R. Richards (1995) Rules of thumb for biometrics systems. Security Manage, October Issue.Google Scholar
  34. [4.34]
    G. Lawton (1998) Biometrics: a new era in security. IEEE Computer, August Issue.Google Scholar
  35. [4.35]
    R. Mandelbaum (1994) Vital signs of identity. IEEE Spectrum, February Issue.Google Scholar
  36. [4.36]
    M. Golfarelli, D. Maio, D. Maltoni (1997) On the error-reject trade-off in biometrics verification systems. IEEE Trans PAMI 19 (7): 786–796.CrossRefGoogle Scholar
  37. [4.37]
    R. P. Wildes (1997) Iris recognition: an emerging biometrics technology. Proc IEEE 85 (9): 1348–1363.CrossRefGoogle Scholar
  38. [4.38]
    C. Seal, D. McCartney, M. Gifford (1997) Iris recognition for user validation. British Telecommunications Engineering 16.Google Scholar
  39. [4.39]
    A. K. Jain, H. Lin, P. Harath, R. Bolle (1997) An identity-authentication system using fingerprints. Proc IEEE 85 (9): 1365–1388.CrossRefGoogle Scholar
  40. [4.40]
    A. Jain, H. Lin, R. Bolle (1997) On-line fingerprint verification. IEEE Trans PAMI 19 (4): 302–313.CrossRefGoogle Scholar
  41. [4.41]
    A. R. Roddy, J. D. Stosz (1997) Fingerprint features: statistical analysis and system performance estimates. Proc IEEE 85(9): 1390–1421. [4.42] http://www.nwfusion.com/research/biometrics.html
  42. [4.43]
    http://www.veridicom.com/technology/Biometric%20Applications.pdf
  43. [4.44]
    http://www.iris-scan.com/iris_recognition_applications.htm
  44. [4.45]
    http://www.biometritech.com/features/deploywp4.htm
  45. [4.46]
  46. [4.47]
    http://www.fcw.com/geb/articles/2002/0311/web-face-03–04–02
  47. [4.48]
    http://hydria.u-strasbg.frGoogle Scholar
  48. [4.49]
    http://www.computer.org/itpro/homepage/jan_feb01/security3b.htm

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • David Zhang
    • 1
  • Yu Li
    • 2
  1. 1.Department of ComputingHong Kong Polytechnic UniversityHong KongChina
  2. 2.Department of Computer Science and TechnologyHarbin Institute of TechnologyChina

Personalised recommendations