Advertisement

Biometric Recognition: How Do I Know Who You Are?

  • Anil K. Jain
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3617)

Abstract

Reliable person recognition is an integral component of identity management systems. Biometrics offers a natural and reliable solution to the problem of identity determination by recognizing individuals based on their physiological and/or behavioral characteristics that are inherent to the person. Although biometric systems have been successfully deployed in a number of civilian applications, current biometric systems are not perfect. In this paper, we describe the various obstacles that prevent biometric systems from achieving foolproof automatic person recognition. We also show that using multiple biometric modalities can alleviate some of the problems faced by unimodal biometric systems. Finally, we present the vulnerabilities of biometric systems and discuss solutions to protect biometric systems from some common attacks.

Keywords

Biometric Data Biometric System Face Recognition System Biometric Template Biometric Trait 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics 14, 4–20 (2004)Google Scholar
  2. 2.
    Wayman, J.L., Jain, A.K., Maltoni, D., Maio, D. (eds.): Biometric Systems, Technology, Design and Performance Evaluation. Springer, Heidelberg (2005)Google Scholar
  3. 3.
    Uludag, U., Jain, A.K.: Multimedia Content Protection via Biometrics-based Encryption. In: Proceedings of IEEE International Conference on Multimedia and Expo, Baltimore, USA, July 2003, vol. III, pp. 237–240 (2003)Google Scholar
  4. 4.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. In: Proceedings of IEEE, Special Issue on Multimedia Security for Digital Rights Management, vol. 92, pp. 948–960 (2004)Google Scholar
  5. 5.
    Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)zbMATHGoogle Scholar
  6. 6.
    Li, S., Jain, A.K. (eds.): Handbook of Face Recognition. Springer, Heidelberg (2005)zbMATHGoogle Scholar
  7. 7.
    Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2004: Third Fingerprint Verification Competition. In: Proceedings of International Conference on Biometric Authentication, Hong Kong, China, pp. 1–7 (2004)Google Scholar
  8. 8.
    Wilson, C., Hicklin, A.R., Korves, H., Ulery, B., Zoepfl, M., Bone, M., Grother, P., Micheals, R.J., Otto, S., Watson, C.: Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report. NIST Internal Report 7123 (2004), available at http://fpvte.nist.gov/report/ir_7123_summary.pdf
  9. 9.
    Philips, P.J., Grother, P., Micheals, R.J., Blackburn, D.M., Tabassi, E., Bone, J.M.: FRVT2002: Overview and Summary (2002), Available at http://www.frvt.org/FRVT2002/documents.htm
  10. 10.
    Reynolds, D.A., Campbell, W., Gleason, T., Quillen, C., Sturim, D., Torres-Carrasquillo, P., Adami, A.: The 2004 MIT Lincoln Laboratory Speaker Recognition System. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Philadelphia, PA, vol. 1, pp. 177–180 (2005)Google Scholar
  11. 11.
    Jain, A.K., Ross, A.: Multibiometric Systems. Communications of the ACM, Special Issue on Multimodal Interfaces 47, 34–40 (2004)Google Scholar
  12. 12.
    Chen, Y., Dass, S.C., Jain, A.K.: Fingerprint Quality Indices for Predicting Authentication Performance. In: Proceedings of Fifth International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA), New York, U.S.A (2005) (to appear)Google Scholar
  13. 13.
    NIST report to the United States Congress: Summary of NIST Standards for Biometric Accuracy, Tamper Resistance, and Interoperability (2002), Available at ftp://sequoyah.nist.gov/pub/nist_internal_reports/NISTAPP_Nov02.pdf
  14. 14.
    News, B.: Long lashes thwart ID scan trial (2004), Available at http://news.bbc.co.uk/2/hi/uk_news/politics/3693375.stm
  15. 15.
    Golfarelli, M., Maio, D., Maltoni, D.: On the Error-Reject Tradeoff in Biometric Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 786–796 (1997)CrossRefGoogle Scholar
  16. 16.
    Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial “Gummy” Fingers on Fingerprint Systems. In: Optical Security and Counterfeit Deterrence Techniques IV. Proceedings of SPIE, vol. 4677, pp. 275–289 (2002)Google Scholar
  17. 17.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: An Analysis of Minutiae Matching Strength. In: Proceedings of Third International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA), Sweden, pp. 223–228 (2001)Google Scholar
  18. 18.
    Hong, L., Jain, A.K., Pankanti, S.: Can Multibiometrics Improve Performance? In: Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies, New Jersey, U.S.A., pp. 59–64 (1999)Google Scholar
  19. 19.
    Dass, S.C., Nandakumar, K., Jain, A.K.: A Principled Approach to Score Level Fusion in Multimodal Biometric Systems. In: Proceedings of Fifth International Conference on Audio- and Video-based Biometric Person Authentication (AVBPA), New York, U.S.A. (2005) (to appear)Google Scholar
  20. 20.
    Jain, A.K., Nandakumar, K., Lu, X., Park, U.: Integrating Faces, Fingerprints and Soft Biometric Traits for User Recognition. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 259–269. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  21. 21.
    Pankanti, S., Prabhakar, S., Jain, A.K.: On the Individuality of Fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 1010–1025 (2002)CrossRefGoogle Scholar
  22. 22.
    Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1493–1498 (2003)Google Scholar
  23. 23.
    Ratha, N., Connell, J., Bolle, R.: Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal 40, 614–634 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Anil K. Jain
    • 1
  1. 1.Department of Computer Science and EngineeringMichigan State UniversityU.S.A.

Personalised recommendations