Skip to main content

Biometrics on the Internet: Security Applications and Services

  • Chapter
Biometric Solutions

Abstract

Biometrics has overcome a number of fundamental technological and psychological barriers and achieved a state that enables its reliable use in many practical applications. Simultaneously, the advance of the three underlying key technologies, electronics and photonics, and software engineering, has promoted the flourish of information systems and made our society more connected than ever. Among many large information systems, the Internet certainly is the most remarkable one mainly due to its wide service variability and accessibility. Although the scientific community has struggled to make the Internet secure, the security level is still far from desirable. This chapter focuses some Internet Security issues that involve biometrics, that is, biometrics applications and services in the Internet. First of all, we presented some important aspects regarding the security problems in telecommunications networks and the Internet. Then, a brief presentation of biometrics technologies with emphasis on biometric encryption and standardization is given. In the sequel, a description of a biometric application in the Internet, named the Personal Identification Network, is given. Finally we provide a brief report about other biometric applications in the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ] J. Ashbourn. Biometrics — Advanced Identity Verification. Springer, London, 2000.

    Google Scholar 

  2. D. Zhang. Automated Biometrics: Technologies & Systems, Kluwer Academic Publisher, USA, 2000.

    Book  Google Scholar 

  3. A. Jain, R. Bolle and S. Pankanti. Biometrics — Personal Identification in Networked Society. Kluwer, 1999.

    Google Scholar 

  4. O. Ureche and R. Plamondon. Document Transport, Transfer, and Exchange: Security and Commercial Aspects. Proc. of International Conference on Document Analysis and Recognition. In Proc. of ICDAR, Bangalore, pages 585–588, September 1999.

    Google Scholar 

  5. D. Maio and D. Maltoni. A Secure Protocol for Electronic Commerce based on Fingerprints and Encryption. In Proc. of ISAS, 4, pages 519–525, 1999.

    Google Scholar 

  6. I. Ricarte. Introduction to Web Processing Mechanisms. (In Portuguese) http://www.dca.fee.unicamp.br/~ricarte

  7. I. Ricarte. Hypertext Transfer Protocol — HTTP/1.1’. (In Portuguese) http://www.isi.edu/in-note/erc1616.txt

  8. A. Dumas. Programming Winsock. Axcel Books, 1995.

    Google Scholar 

  9. A.S. Tenenbaum. Computer Networks. Third Edition, Prentice Hall, New Jersey, 1996.

    Google Scholar 

  10. M. Campione. The Java Tutorial: Object-oriented Programming for the Internet. Addison-Wesley, Reading, MA, 1996.

    Google Scholar 

  11. K. Hafner and M. Lyon. Where Wizards Stay Up Late — The Origins of the Internet. Touchstone, 1996.

    Google Scholar 

  12. W. Stallings. Cryptography and Network Security — Principles and Practice. Second Edition, Prentice-Hall, 1999.

    Google Scholar 

  13. G. Simmons. A Survey of Information Authentication, ed. Contemporary Cryptology: The Science of Information Integrity. Piscataway, NJ: IEEE Press, 1992.

    Google Scholar 

  14. S. Lewis and T. Steigerwalt. Biometric Encryption. http://www.emory.edu/BUSINESS/et/biometric/index.htm.

  15. A.J. Menezes, P.C. van Oorschot and S.A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.

    Google Scholar 

  16. D. Polemi. Biometric Techniques: Review and Evaluation of Biometric Techniques for Identification and Authentication, including an Appraisal of the Areas where They Are Most Applicable. Final Report, Institute of Communication and Computer Systems, National Technical University of Athens, April 1997.

    Google Scholar 

  17. [17] H.M. Wood. The Use of Passwords for Controlled Access to Computer Resource. National Bureau of Standards Special Publication 500-9, US Dept. of Commerce/NBS.

    Google Scholar 

  18. J. Newton. Reducing Plastic Counterfeiting. IEE Conference Publication, IEE Stevenage, England, no. 408, pages 198–201, 1995.

    Google Scholar 

  19. R.O. Duda, and P.E. Hart. Pattern Classification and Scene Analysis. John Wiley & Sons, 1973.

    Google Scholar 

  20. R. Schalkoff. Pattern Recognition — Statistical, Structural and Neural Approaches. John Wiley & Sons, 1992.

    Google Scholar 

  21. G. Hachez, F. Koeune, and J. Quisquater. Biometrics, Access Control, Smart Cards: a not so Simple Combination. Proc. of 4th Working Conf. on Smart Card Research and Advanced Applications, Bristol-UK, 273–278, September 2000.

    Google Scholar 

  22. J. Dougman. Biometric Decision Landscapes. Technical Report TR482, University of Cambridge, 1999.

    Google Scholar 

  23. [23] R.L. Mendell. Biometrics: The Tightrope Security Portal. http://securityportal.com/articles/biometrics20010220.html

  24. J. Stapleton. Biometrics. PKI Forum, May 2001. http://www.pkiforum.org

  25. M. Peyravian, S.M. Matyas, A. Roginsky and N. Zunic. Generation of RSA Keys That Are Guaranteed to be Unique for Each User. Computer & Security, vol. 19, no. 3, pages 282–288, 2000.

    Article  Google Scholar 

  26. S.M. Matyas Jr. and J. Stapleton, A Biometric Standard for Information Management and Security. Computer & Security, vol. 19, pages 428–441, 2000.

    Article  Google Scholar 

  27. BioAPI: http://www.bioAPI.organd/orwww.bioapi.com.

  28. International Biometric Industry Association (IBIA): http://www.ibia.org.

  29. ANSI B10.8 Working Group for Driver License/Identification: http://www.aamva.org.

  30. ISO Joint Technical Committee 1 (JCT1) Subcommittee 17: http://www.iso.ch.

  31. Biometric Consortium: http://www.biometrics.org.

  32. ISO Technical Committee 68 (TC68) Subcommittee 2: http://www.tc68.org.

  33. T. Pegoraro. Robust Voice Recognition Algorithms Applied to Speaker Verification. MS Thesis, FEEC-Unicamp, April, 2000. (In Portuguese)

    Google Scholar 

  34. M. C. Fairhurst. Signature Verification Revisited: Promoting Practical Exploitation of Biometric Technology. Electronics and Communication Engineering Journal, pages 273–280, 1997.

    Google Scholar 

  35. A.K. Jain, L. Hong, and S. Pankanti. Biometrics: Promising Frontiers for Emerging Identification Market. Communications of ACM, 91–98, February 2000.

    Google Scholar 

  36. L.L. Lee, T. Berger, and E. Aviczer. Reliable On-line Human Siganture Verification Systems. IEEE Trans. Pattern Recognition and Machine Intelligence, vol. 18, no. 6, pages 643–647, 1996.

    Article  Google Scholar 

  37. M.G. Lizarraga. Biometrie Personal Identification via the Internet with Emphasis on Static Signature Verification. Ph.D. Thesis, State University of Campinas, Aug. 2000. (In Portuguese)

    Google Scholar 

  38. LRPRC — Laboratory of Pattern Recongition and Communication Networks, School of Electrical and Computing Engineering, State University of Campinas. http://www.lrprc.feeunicamp.br/id

  39. J. Boyd. Net-Based Fingerprint Security Arrives. Tech Web News, February 6, 1998. http://www.content.techweb.com/wire/story/TWB19980206S0006

  40. http://www.microsoft.com/PressPass/2000/May00/BiometricsPR.asp

  41. A.K. Jain, S. Prabhakar, and A. Ross. Biometrics-based web access. Technical Report MSU-CPS-98-33, Michigan State University, 1998.

    Google Scholar 

  42. http://webusers.anet-stl.com/~wrogers/biometrics/

    Google Scholar 

  43. http://www.cybersign.com/

  44. M. Speir. BioNetrix delivers layered biometrics suit. http://www.fcw.com/fcw/articles/2000/0905/web-biobf2-06-05-00.asp.

  45. http://www.cybersign.com/Litronics.html

  46. J. Partanen, Authentication on the Web. Seminar on Network Security, Helsinki University of Technology, 1997. http://www.tml.jut.fi/Opinnot/Tik-110.501/1997/Web-authentication.html.

  47. Y. Qi and B. Hunt, Signature Verification Using Global and Grid Features. Pattern Recognition, vol. 27, no. 12, pages 1621–1629, 1994.

    Article  Google Scholar 

  48. R. Bajaj, S. Chaudhury, Signature Verification Using Multiple Neural Classifiers. Pattern Recognition vol. 30, no. 1, pages 1–7, 1997.

    Article  Google Scholar 

  49. L. Cordella, P. Foggia, C. Sansone and M. Vento, Document validation by signature: a serial multi-expert approach, In Proc. of ICDAR, Bangalore, pages 601–604, September 1999.

    Google Scholar 

  50. M. G. Lizárraga. An Automatic System for Static Signature Consultation and Verification. MS. Thesis, State University of Campinas -UNICAMP, 1996. (In Portuguese)

    Google Scholar 

  51. R. Sabourin and G. Genest. Off-line signature verification by local granulometric size distributions. IEEE Trans on Pattern Analysis and Machine Intelligence vol. 19, no. 9, pages 976–988, 1997,

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer Science+Business Media New York

About this chapter

Cite this chapter

Ling, L.L., Lizárraga, M.G. (2002). Biometrics on the Internet: Security Applications and Services. In: Zhang, D. (eds) Biometric Solutions. The Springer International Series in Engineering and Computer Science, vol 697. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1053-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-1053-6_6

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-5371-3

  • Online ISBN: 978-1-4615-1053-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics