Biometric Recognition: How Do I Know Who You Are?
A wide variety of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user, and not anyone else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones and ATMs. In the absence of robust person recognition schemes, these systems are vulnerable to the wiles of an impostor. Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an individual’s identity based on who she is, rather than by what she possesses (e.g., an ID card) or what she remembers (e.g., a password). Although biometrics emerged from its extensive use in law enforcement to identify criminals, i.e., forensics, it is being increasingly used today to carry out person recognition in a large number of civilian applications (e.g., national ID card, e-passport and smart cards) ,. Most of the emerging applications can be attributed to increased security threats as well as fraud associated with various financial transactions (e.g., credit cards).
KeywordsSmart Card Biometric Data Legitimate User Biometric System Biometric Characteristic
- 1.Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology. Special Issue on Image- and Video-Based Biometrics 14, 4–20 (2004)Google Scholar
- 2.Wayman, J.L., Jain, A.K., Maltoni, D., Maio, D.: Biometric Systems, Technology, Design and Performance Evaluation. Springer, Heidelberg (2005)Google Scholar
- 5.Jain, A.K., Bolle, R., Pankanti, S.: Biometrics: Personal Identification in Networked Security. Kluwer Academic Publishers, Dordrecht (1999)Google Scholar
- 7.Philips, P.J., Grother, P., Micheals, R.J., Blackburn, D.M., Tabassi, E., Bone, J.M.: FRVT2002: Overview and Summary (2002), Available at http://www.frvt.org/FRVT2002/documents.htm
- 8.Reynolds, D.A., Campbell, W., Gleason, T., Quillen, C., Sturim, D., Torres-Carrasquillo, P., Adami, A.: The 2004 MIT Lincoln Laboratory Speaker Recognition System. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Philadelphia, PA (2005)Google Scholar
- 10.Ross, A., Jain, A.K.: Information Fusion in Biometrics. Pattern Recognition Letters, Special Issue on Multimodal Biometrics 24, 2115–2125 (2003)Google Scholar
- 12.Uludag, U., Jain, A.K.: Multimedia Content Protection via Biometrics-based Encryption. In: Proceedings of IEEE International Conference on Multimedia and Expo, Baltimore, USA, July 2003, vol. III, pp. 237–240 (2003)Google Scholar
- 13.Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proceedings of IEEE, Special Issue on Multimedia Security for Digital Rights Management 92, 948–960 (2004)Google Scholar