Skip to main content

Biometric Authentication — Security and Usability

  • Chapter

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT,volume 100)

Abstract

We would like to outline our opinions about the usability of biometric authentication systems. We outline the position of biometrics in the current field of computer security in the first section of our paper. The second chapter introduces a more systematic view of the process of biometric authentication — a layer model (of the biometric authentication process). The third section discusses the advantages and disadvantages of biometric authentication systems. We also propose a classification of biometric systems that would allow us to compare the biometrics systems reasonably, along similar lines to Common Criteria [1] or FIPS 140–1/2 [4]. We conclude this paper with some suggestions where we would suggest to use biometric systems and where not.

Keywords

  • authentication
  • biometrics
  • classification
  • evaluation
  • security.

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35612-9_23

References

  1. Common Criteria for Information Technology Security Evaluation, v 2.1, 1999.

    Google Scholar 

  2. Department of Defense (1985). Trusted Computer System Evaluation Criteria.

    Google Scholar 

  3. Jain, A., Bolle, R. and Pankanti S. (1999). BIOMETRICS: Personal Identification in Networked Society. Kluwer Academic Publishers.

    Google Scholar 

  4. National Institute of Standards and Technology (1994 and 2001 ). Security Requirements for Cryptographic Modules, FIPS PUB 140–1 /2.

    Google Scholar 

  5. Newham, E. (1995). The biometric report. SBJ Services.

    Google Scholar 

  6. Maty, V., Iiuha, Z. (2000). Biometric Authentication Systems. Technical report. http://www.ecom-monitor.com/papers/biometricsTR2000.pdf.

    Google Scholar 

  7. Mansfield, T. (2001) Biometric Product Testing - Final Report, National Physical Laboratory, 2001, http://www.npl.co.uk/.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2002 IFIP International Federation for Information Processing

About this chapter

Cite this chapter

Matyáš, V., Říha, Z. (2002). Biometric Authentication — Security and Usability. In: Jerman-Blažič, B., Klobučar, T. (eds) Advanced Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 100. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35612-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-35612-9_17

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4757-4405-7

  • Online ISBN: 978-0-387-35612-9

  • eBook Packages: Springer Book Archive