Biometric Authentication

International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002 Proceedings

  • Massimo Tistarelli
  • Josef Bigun
  • Anil K. Jain
Conference proceedings BioAW 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2359)

Table of contents

  1. Front Matter
    Pages I-X
  2. Face Recognition I

    1. O. Déniz, M. Castrillón, J. Lorenzo, M. Hernández
      Pages 1-9
    2. Juneho Yi, Jongsun Kim, Jongmoo Choi, Junghyun Han, Eunseok Lee
      Pages 10-18
    3. Massimo Tistarelli, Andrea Lagorio, Enrico Grosso
      Pages 19-29
    4. Gian Luca Marcialis, Fabio Roli
      Pages 30-37
  3. Fingerprint Recognition

    1. Arun Ross, James Reisman, Anil Jain
      Pages 48-57
    2. Ruud M. Bolle, Andrew W. Senior, Nalini K. Ratha, Sharath Pankanti
      Pages 58-66
  4. Psychology and Biometrics

    1. Leonid Kompanets, Janusz Bobulski, Roman Wyrzykowski
      Pages 67-77
    2. Tetiana Valchuk, Roman Wyrzykowski, Leonid Kompanets
      Pages 78-89
  5. Face Detection and Localization

    1. M. Castrillón Santana, J. Lorenzo Navarro, J. Cabrera Gámez, F. M. Hernández Tejera, J. Méndez Rodríguez
      Pages 91-102
    2. Klaus J. Kirchberg, Oliver Jesorsky, Robert W. Frischholz
      Pages 103-111
    3. Hichem Sahbi, Nozha Boujemaa
      Pages 112-120
  6. Face Recognition II

    1. Hichem Sahbi, Nozha Boujemaa
      Pages 121-132
    2. Raffaele Cappelli, Dario Maio, Davide Maltoni
      Pages 133-141
  7. Gait and Signature Analysis

    1. L. Lee, W. E. L. Grimson
      Pages 143-154
    2. Chiraz BenAbdelkader, Ross Cutler, Larry Davis
      Pages 155-167
    3. Masato Kawamoto, Takayuki Hamamoto, Seiichiro Hangai
      Pages 168-175
  8. Classifiers for Recognition

    1. J. Gonzalez-Rodriguez, J. Fiérrez-Aguilar, J. Ortega-Garcia, J. J. Lucena-Molina
      Pages 177-185
    2. Carlos E. Thomaz, Duncan F. Gillies, Raul Q. Feitosa
      Pages 186-196

About these proceedings

Introduction

Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral characteristics. It associates an individual with a previously determined identity based on that individual s appearance or behavior. Because many physiological or behavioral characteristics (biometric indicators) are distinctive to each person, biometric identifiers are inherently more reliable and more capable than knowledge-based (e.g., password) and token-based (e.g., a key) techniques in differentiating between an authorized person and a fraudulent impostor. For this reason, more and more organizations are looking to automated identity authentication systems to improve customer satisfaction, security, and operating efficiency as well as to save critical resources. Biometric authentication is a challenging pattern recognition problem; it involves more than just template matching. The intrinsic nature of biometric data must be carefully studied, analyzed, and its properties taken into account in developing suitable representation and matching algorithms. The intrinsic variability of data with time and environmental conditions, the social acceptability and invasiveness of acquisition devices, and the facility with which the data can be counterfeited must be considered in the choice of a biometric indicator for a given application. In order to deploy a biometric authentication system, one must consider its reliability, accuracy, applicability, and efficiency. Eventually, it may be necessary to combine several biometric indicators (multimodal-biometrics) to cope with the drawbacks of the individual biometric indicators.

Keywords

Biometrics algorithmic learning biometric authentication biometric classification face recognition fingerprint fingerprint recognition handwriting recognition image-based face biometrics pattern recognition recognition

Editors and affiliations

  • Massimo Tistarelli
    • 1
  • Josef Bigun
    • 2
  • Anil K. Jain
    • 3
  1. 1.Computer Vision Laboratory, DIBEVUniversity of SassariSassariItaly
  2. 2.Halmstad UniversityHalmstadSweden
  3. 3.Department of Computer Science and EngineeringMichigan State UniversityEast LansingUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-47917-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-43723-9
  • Online ISBN 978-3-540-47917-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book