Abstract
Biometrics has overcome a number of fundamental technological and psychological barriers and achieved a state that enables its reliable use in many practical applications. Simultaneously, the advance of the three underlying key technologies, electronics and photonics, and software engineering, has promoted the flourish of information systems and made our society more connected than ever. Among many large information systems, the Internet certainly is the most remarkable one mainly due to its wide service variability and accessibility. Although the scientific community has struggled to make the Internet secure, the security level is still far from desirable. This chapter focuses some Internet Security issues that involve biometrics, that is, biometrics applications and services in the Internet. First of all, we presented some important aspects regarding the security problems in telecommunications networks and the Internet. Then, a brief presentation of biometrics technologies with emphasis on biometric encryption and standardization is given. In the sequel, a description of a biometric application in the Internet, named the Personal Identification Network, is given. Finally we provide a brief report about other biometric applications in the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
] J. Ashbourn. Biometrics — Advanced Identity Verification. Springer, London, 2000.
D. Zhang. Automated Biometrics: Technologies & Systems, Kluwer Academic Publisher, USA, 2000.
A. Jain, R. Bolle and S. Pankanti. Biometrics — Personal Identification in Networked Society. Kluwer, 1999.
O. Ureche and R. Plamondon. Document Transport, Transfer, and Exchange: Security and Commercial Aspects. Proc. of International Conference on Document Analysis and Recognition. In Proc. of ICDAR, Bangalore, pages 585–588, September 1999.
D. Maio and D. Maltoni. A Secure Protocol for Electronic Commerce based on Fingerprints and Encryption. In Proc. of ISAS, 4, pages 519–525, 1999.
I. Ricarte. Introduction to Web Processing Mechanisms. (In Portuguese) http://www.dca.fee.unicamp.br/~ricarte
I. Ricarte. Hypertext Transfer Protocol — HTTP/1.1’. (In Portuguese) http://www.isi.edu/in-note/erc1616.txt
A. Dumas. Programming Winsock. Axcel Books, 1995.
A.S. Tenenbaum. Computer Networks. Third Edition, Prentice Hall, New Jersey, 1996.
M. Campione. The Java Tutorial: Object-oriented Programming for the Internet. Addison-Wesley, Reading, MA, 1996.
K. Hafner and M. Lyon. Where Wizards Stay Up Late — The Origins of the Internet. Touchstone, 1996.
W. Stallings. Cryptography and Network Security — Principles and Practice. Second Edition, Prentice-Hall, 1999.
G. Simmons. A Survey of Information Authentication, ed. Contemporary Cryptology: The Science of Information Integrity. Piscataway, NJ: IEEE Press, 1992.
S. Lewis and T. Steigerwalt. Biometric Encryption. http://www.emory.edu/BUSINESS/et/biometric/index.htm.
A.J. Menezes, P.C. van Oorschot and S.A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
D. Polemi. Biometric Techniques: Review and Evaluation of Biometric Techniques for Identification and Authentication, including an Appraisal of the Areas where They Are Most Applicable. Final Report, Institute of Communication and Computer Systems, National Technical University of Athens, April 1997.
[17] H.M. Wood. The Use of Passwords for Controlled Access to Computer Resource. National Bureau of Standards Special Publication 500-9, US Dept. of Commerce/NBS.
J. Newton. Reducing Plastic Counterfeiting. IEE Conference Publication, IEE Stevenage, England, no. 408, pages 198–201, 1995.
R.O. Duda, and P.E. Hart. Pattern Classification and Scene Analysis. John Wiley & Sons, 1973.
R. Schalkoff. Pattern Recognition — Statistical, Structural and Neural Approaches. John Wiley & Sons, 1992.
G. Hachez, F. Koeune, and J. Quisquater. Biometrics, Access Control, Smart Cards: a not so Simple Combination. Proc. of 4th Working Conf. on Smart Card Research and Advanced Applications, Bristol-UK, 273–278, September 2000.
J. Dougman. Biometric Decision Landscapes. Technical Report TR482, University of Cambridge, 1999.
[23] R.L. Mendell. Biometrics: The Tightrope Security Portal. http://securityportal.com/articles/biometrics20010220.html
J. Stapleton. Biometrics. PKI Forum, May 2001. http://www.pkiforum.org
M. Peyravian, S.M. Matyas, A. Roginsky and N. Zunic. Generation of RSA Keys That Are Guaranteed to be Unique for Each User. Computer & Security, vol. 19, no. 3, pages 282–288, 2000.
S.M. Matyas Jr. and J. Stapleton, A Biometric Standard for Information Management and Security. Computer & Security, vol. 19, pages 428–441, 2000.
BioAPI: http://www.bioAPI.organd/orwww.bioapi.com.
International Biometric Industry Association (IBIA): http://www.ibia.org.
ANSI B10.8 Working Group for Driver License/Identification: http://www.aamva.org.
ISO Joint Technical Committee 1 (JCT1) Subcommittee 17: http://www.iso.ch.
Biometric Consortium: http://www.biometrics.org.
ISO Technical Committee 68 (TC68) Subcommittee 2: http://www.tc68.org.
T. Pegoraro. Robust Voice Recognition Algorithms Applied to Speaker Verification. MS Thesis, FEEC-Unicamp, April, 2000. (In Portuguese)
M. C. Fairhurst. Signature Verification Revisited: Promoting Practical Exploitation of Biometric Technology. Electronics and Communication Engineering Journal, pages 273–280, 1997.
A.K. Jain, L. Hong, and S. Pankanti. Biometrics: Promising Frontiers for Emerging Identification Market. Communications of ACM, 91–98, February 2000.
L.L. Lee, T. Berger, and E. Aviczer. Reliable On-line Human Siganture Verification Systems. IEEE Trans. Pattern Recognition and Machine Intelligence, vol. 18, no. 6, pages 643–647, 1996.
M.G. Lizarraga. Biometrie Personal Identification via the Internet with Emphasis on Static Signature Verification. Ph.D. Thesis, State University of Campinas, Aug. 2000. (In Portuguese)
LRPRC — Laboratory of Pattern Recongition and Communication Networks, School of Electrical and Computing Engineering, State University of Campinas. http://www.lrprc.feeunicamp.br/id
J. Boyd. Net-Based Fingerprint Security Arrives. Tech Web News, February 6, 1998. http://www.content.techweb.com/wire/story/TWB19980206S0006
http://www.microsoft.com/PressPass/2000/May00/BiometricsPR.asp
A.K. Jain, S. Prabhakar, and A. Ross. Biometrics-based web access. Technical Report MSU-CPS-98-33, Michigan State University, 1998.
http://webusers.anet-stl.com/~wrogers/biometrics/
M. Speir. BioNetrix delivers layered biometrics suit. http://www.fcw.com/fcw/articles/2000/0905/web-biobf2-06-05-00.asp.
J. Partanen, Authentication on the Web. Seminar on Network Security, Helsinki University of Technology, 1997. http://www.tml.jut.fi/Opinnot/Tik-110.501/1997/Web-authentication.html.
Y. Qi and B. Hunt, Signature Verification Using Global and Grid Features. Pattern Recognition, vol. 27, no. 12, pages 1621–1629, 1994.
R. Bajaj, S. Chaudhury, Signature Verification Using Multiple Neural Classifiers. Pattern Recognition vol. 30, no. 1, pages 1–7, 1997.
L. Cordella, P. Foggia, C. Sansone and M. Vento, Document validation by signature: a serial multi-expert approach, In Proc. of ICDAR, Bangalore, pages 601–604, September 1999.
M. G. Lizárraga. An Automatic System for Static Signature Consultation and Verification. MS. Thesis, State University of Campinas -UNICAMP, 1996. (In Portuguese)
R. Sabourin and G. Genest. Off-line signature verification by local granulometric size distributions. IEEE Trans on Pattern Analysis and Machine Intelligence vol. 19, no. 9, pages 976–988, 1997,
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media New York
About this chapter
Cite this chapter
Ling, L.L., Lizárraga, M.G. (2002). Biometrics on the Internet: Security Applications and Services. In: Zhang, D. (eds) Biometric Solutions. The Springer International Series in Engineering and Computer Science, vol 697. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1053-6_6
Download citation
DOI: https://doi.org/10.1007/978-1-4615-1053-6_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-5371-3
Online ISBN: 978-1-4615-1053-6
eBook Packages: Springer Book Archive