Definition:User authentication can be viewed at as the problem of binding identities to subjects. Authentication can be based on biometrics information, which uses physiological or behavioral traits.
Biometrics in Context of Security Goals
Recently security has become one of the most significant and challenging problems for spreading new information technology. As summarized in [1]the following security requirements are essential for multimedia systems: confidentiality, data integrity, data origin authenticity, entity authenticity, non-repudiation and availability. The goal of entity authenticity is to ensure that an entity is the one it claims to be and is useful, for example, to implement further access restrictions or monitor the usage of a service. Entities taking part in a communication can be proven by user authentication protocols. In the following we introduce to a general information flow model for a generic user authentication system, describe the overall components of such...
References
J. Dittmann, P. Wohlmacher, and K. Nahrstedt, “Multimedia and Security — Using Cryptographic and Watermarking Algorithms,” IEEE MultiMedia, October-December 2001, Vol. 8, No. 4, 2001, pp. 54–65.
M. Bishop, “Computer Security,” Addison-Wesley, Boston, U.S.A, 2003.
C. Villager, “Biometric User Authentication For IT Security: From Fundamentals to Handwriting,” Springer, New York, U.S.A., to appear in 2006.
S. Garfinkel and G. Spafford, “Practical Unix & Internet Security,” O’Reilly & Associates, 1996, pp. 247–250.
C. Villager, R. Steinmetz, and A. Mayerhöfer, “Biometric Hash based on Statistical Features of Online Signatures,” In: Proceedings of the IEEE International Conference on Pattern Recognition (ICPR), Quebec City, Canada, Vol. 1, 2002, pp. 123–126.
Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric Cryptosystems: Issues and Challenges,” Proceedings of the IEEE, Special Issue on Multimedia Security for Digital Rights Management, Vol. 92, No. 6, 2004, pp. 948–960.
J. Daugman, “The importance of being random: Statistical principles of iris recognition,” Pattern Recognition, Vol. 36, No. 2, 2003, pp. 279–291.
R. Plamandon and G. Lorette, “Automatic Signature Verification and Writer Identification — the State of the Art,” Pergamon Press plc., Pattern Recognition, 22, Vol. 2, 1989, pp. 107–131.
F. Leclerc and R. Plamondon, “Automatic Verification and Writer Identification: The State of the Art 1989–1993,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 8, 1994, pp. 643–660.
C. C. Tappert, C. Y. Suen, and T. Wakahara, “The State of the Art in Online Handwriting Recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 12, No. 8, 1990, pp. 787–808.
V. I. Levenshtein, “Binary codes capable of correcting deletions, insertions, and reversals,” Soviet Physics, Vol. 10, 1966, pp. 707–710.
A. K. Jain and A. Ross, “Multibiometric Systems,” Communications of the ACM, Special Issue on Multimodal Interfaces, Vol. 47, No. 1, 2004, pp. 34–40.
WIPO Patent Registration WO 97/04375, Electronic Data-Processing System, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this entry
Cite this entry
Villager, C., Dittmann, J. (2006). Biometrics for User Authentication. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/0-387-30038-4_13
Download citation
DOI: https://doi.org/10.1007/0-387-30038-4_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24395-5
Online ISBN: 978-0-387-30038-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering