BioAW 2004: Biometric Authentication pp 195-204 | Cite as
Architectures for Biometric Match-on-Token Solutions
Abstract
Biometric Authentication Systems face several problems related to the security and the users’ potential rejection. Most of those problems comes from the high sensitivity of biometric data (whose manipulation could damage the system security or the users’ privacy), and the feeling of governmental control when central databases are used. The authors have been working in providing solutions to these problems, by promoting the idea of using tokens that could perform the biometric verification internally, not allowing the template to travel through communication lines, nor the memory of an open terminal. To achieve this, a general architecture, based on a set of requirements previously defined, will be outlined. At the end, directives for the implementation of such an architecture using smartcards and USB-Tokens will be given.
Keywords
Feature Vector Smart Card Security Mechanism Speaker Recognition Biometric DataPreview
Unable to display preview. Download preview PDF.
References
- 1.Campbell Jr., J.P.: Speaker Recognition: A Tutorial. Proceedings of the IEEE 85(9), 1437–1462 (1997)CrossRefGoogle Scholar
- 2.Daugman, J.G.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Trans. on Pattern Analysis and Machine Intelligence 15(11), 1148–1161 (1993)CrossRefGoogle Scholar
- 3.Maio, D., Maltoni, D.: Direct Gray-Scale Minutiae Detection in Fingerprints. IEEE Trans. on Pattern Analysis and Machine Intelligence 19(1) (January 1997)Google Scholar
- 4.Jain, A.K., Hong, L., Pankanti, S., Bolle, R.: An Identity-Authentication System Using Fingerprints. Proceedings of the IEEE 85(9) (September 1997)Google Scholar
- 5.Jain, A.K., Bolle, R., Pankanti, S., et al.: Biometrics: Personal Identificacion in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)Google Scholar
- 6.Reynolds, D.A., Rose, R.C.: Robust Text-Independent Speaker Identification Using Gaus-sian Mixture Speaker Models. IEEE Trans. on Speech and Audio Processing 3(1), 72–83 (1995)CrossRefGoogle Scholar
- 7.Sanchez-Reillo, R., Gonzalez-Marcos, A.: Access Control System with Hand Geometry Verification and Smart Cards. In: Proc. 33rd Annual 1999 International Carnahan Conference on Security Technology, Madrid, Spain, October 5-7, pp. 485–487 (1999)Google Scholar
- 8.Sanchez-Reillo, R., Sanchez-Avila, C., Gonzalez-Marcos, A.: Biometric Identification through Hand Geometry Measurements. IEEE Trans. on Pattern Analysis and Machine Intelligence 22(10), 1168–1171 (2000)CrossRefGoogle Scholar
- 9.Sanchez-Reillo, R.: Securing Information and Operations in a Smart Card through Biometrics. In: Proc. 34rd Annual 2000 International Carnahan Conference on Security Technology, Ottawa, Canada, October 23-25, pp. 52–55 (2000)Google Scholar
- 10.Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1995)Google Scholar
- 11.Sun Microsystems, Inc., http://java.sun.com/products/javacard
- 12.Zoreda, J.L., Oton, J.M.: Smart Cards. Artech House, Norwood (1995)Google Scholar