Abstract
In this chapter, we give an overall perception to biometrics technologies and systems. First, the background of biometrics is introduced in Section 1.1. After some basic concepts, taxonomy and history of biometrics are described in Section 1.2. Section 1.3 discusses the principle and performance evaluation of biometrics systems. Next, biometrics applications are briefly reviewed. A whole book perspective is finally given in Section 1.5.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
G. Roethenbaugh, “Biometrics Explained,” Available: http://www.icsa.net/services/consortia/cbd-c/sec4.html.
E. Newham, “The Biometrics Report,” New York: SJB Services, 1995. Available: http://www.sjb.co.co.uk
R. Clarke, “Human Identification In Information Systems: Management Challenges And Public Policy Issues,” Info. Technol. People, vol. 7, no. 4, pp. 6–37, 1994.
D. Sims, “Biometrics Recognition: Our Hands, Eyes and Faces Give Us Away,” IEEE Computer Graphics and Applications, 0272-17-16/94, 1994.
J.D. Woodward, “Biometrics: Privacy’s Foe or Privacy’s Friend?,” Proc. IEEE Special Issue on Automated Biometrics,vol. 85, no. 9, pp. 1480–1492, 1997.
B. Carter, “Biometrics Technologies, What They Are and How They Work,” in Proc. CTST′97, Orlando, EL, 1997.
R. Chandrasekaran, “Brave New Whorl: ID System Using The Human Body Are Here, But Privacy Issues Persist,” Washington Post, Mar. 30, 1997.
A. Davis, “The Body as Password,” Wired, July 1997.
D.R. Richards, “Rules of Thumb For Biometrics Systems,” Security Manage, Oct. 1, 1995.
G. Lawton, “Biometrics: A New Era in Security,” IEEE Computer, pp. 16–18, Aug. 1998.
R. Mandelbaum, “Vital Signs of Identity,” IEEE Spectrum, pp. 22–30, Feb. 1994.
Association for Biometrics (AFB) and International Computer Security Association (ICSA), 1998 Glossary of Biometrics Terms, http://www.afb.org.uk/glossuk/.html, 1998.
M. Golfarelli, D. Maio and D. Maltoni, “On the Error-Reject Trade-Off in Biometrics Verification Systems,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 786–796, 1997.
R.P. Wildes, “Iris Recognition: An Emerging Biometrics Technology,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1348–1363, 1997.
D. McMordie, “Texture Analysis of the Human Iris for High Security Authentication,” Available: http://www.ee.mcgill.ca/~mcmordie/iris/iris.ps, 1997.
C. Seal, D. McCartney and M. Gifford, “Iris Recognition for User Validation,” British Telecommunications Engineering, vol. 16, July 1997.
A.K. Jain, H. Lin, P. Harath and R. Bolle, “An Identity-Authentication System Using Fingerprints,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1365–1388, 1997.
A. Jain, H. Lin and R. Bolle, “On-line Fingerprint Verification,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp. 302–313, 1997.
A.R. Roddy and J.D. Stosz, “Fingerprint Features: Statistical Analysis and System Performance Estimates,” Proc. IEEE Special issue on automated biometrics, vol. 85, no. 9, pp. 1390–1421, 1997.
M. Kawagoe and A. Tojo, “Fingerprint Pattern Classification,” Pattern Recognition, vol. 17, no. 3, pp. 295–303, 1984.
D. Zhang and W. Shu, “Two Novel Characteristics in Palmprint Verification: Datum Point Invariance and Line Feature Matching,” Pattern Recognition, vol. 32, pp. 691–702, 1999.
W. Shu and D. Zhang, “Automated Personal Identification by Palmprint,” Optical Engineering, vol. 37, no. 8, pp. 2359–2362, 1998.
W. Shu and D. Zhang, “Palmprint Verification: An Implementation of Biometrics Technology,” Proc. of ICPR′98, vol. I, pp. 219–221, Brisbane AUSTRALIA, 1998.
K.C. Yow and R. Clipolla, “Feature-based Human Face Detection,” Image and Vision Computing, vol. 15, pp. 713–735, 1997.
J. Zhang, Y. Yan and M. Lades, “Face Recognition: Eigenface, Elastic Matching and Neural Nets,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1423–1435, 1997.
R. Chellappa, C.L. Wilson and A. Sirohey, “Human and Machine Recognition of Faces: A Survey,” Proceedings of the IEEE, vol. 83, no. 5, pp. 705–740, 1995.
N.Z. Tishby, “On the Application of Mixture Hidden Markov Models to Text Independent Speaker Recognition,” IEEE Trans. Signal Processing, vol. 39, no. 3, March 1991.
R.P. Ramachandran, M.S. Zilovic and R.J. Mammone, “A Comparative Study of Robust Linear Predictive Analysis Methods with Applications to Speaker Identification,” IEEE Transactions Speech and Audio Processing, vol. 3, no. 2, March 1995.
J.P. Campbell, “Speaker Recognition: A Tutorial,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1437–1462, 1997.
D.A. Reynolds and R.C. Rose, “Robust Text-Independent Speaker Identification Using Gaussian Mixture Speaker Models,” IEEE Trans. Speech and Audio Processing, vol. 3, no. 1, January 1995.
K. Huang and H. Yan, “Off-Line Signature Verification Based on Geometric Feature Extraction and Neural Network Classification,” Pattern Recognition, vol. 30, no. 1, pp. 9–17, 1997.
R. Bajaj and S. Chaudhury, “Signature Verification Using Multiple Neural Classifiers,” Pattern Recognition, vol. 30, no. 1, pp. 1–7, 1997.
Q.Z. Wu, S.Y. Lee and I.C. Jou, “On-Line Signature Verification Based on Split-and-Merge Matching Mechanism,” Pattern Recognition Letters, vol. 18, pp. 665–673, 1997.
Proc. of IEEE, Special Issue on Automated Biometrics, vol. 85, no. 9, Sept. 1997.
W. Shen, M. Surette and R. Khanna, “Evaluation of Automated Biometrics-Based Identification And Verification Systems,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1464–1478, 1997.
J.G. Daugman and G.O. Williams, “A Proposed Standard for Biometrics Decidability,” in Proc.CardTech/SecureTech Conf., Atlanta, GA, pp. 223–234, 1996.
J.G. Daugman, “High Confidence Visual Recognition of Persons By a Test of Statistical Independence,” IEEE Trans, on PAMI, vol. 15, 1993.
W.W. Boles, “A Security System Based on Human Iris Identification Using Wavelet Transform,” First International Conference on Knowledge-Based Intelligent Electronic Systems, Adelaide, 21–23 May 1997.
G.O. Williams, “Iris Recognition Technology,” IEEE, 0-7803-3537-6-9/96, 1996.
K. Morita, K. Asai, “Automatic Fingerprint Identification Terminal for Personal Verification,” Hybrid Image Processing, vol. 638, 1986.
X. Shen, M. Cheng, Q. Shi, and G. Qiu, “A New Automated Fingerprint Identification System,” Journals of Computer Science & Technology, vol. 4, no. 4, 1989.
L. O’Gorman, J. V. Nickerson, “An Approach to Fingerprint Filter Design,” Pattern Recognition, vol. 22, no. 1, pp. 29–38, 1989.
Q. Xiao, H. Raafat, “Fingerprint Image Postprocessing: A Combined Statistical and Structural Approach,” Pattern Recognition, vol. 24, no. 10, pp. 985–992, 1991.
Q. Xiao, H. Raafat, “Combining Statistical and Structural Information for Fingerprint Image Processing, Classification and Identification,” Pattern Recognition: Architectures, Algorithms and Applications, 1991.
V.S. Sprinivasan, N.N. Murthy, “Detection of Singular Points in Fingerprint Images,” Pattern Recognition, vol. 25, no. 2, pp. 139–153, 1992.
N. K. Ratha, S. Chen, and A. K. Jain, “Adaptive Flow Orientation-based Feature Extraction in Fingerprint Images,” Pattern Recognition, vol. 28, no. 11, pp. 1657–1672, 1995.
S. Igaki, S. Eguchi, F. Yamagishi, H. Ikeda, and T. Inagaki, “Real-time Fingerprint Sensor Using a Hologram,” Applied Optics, vol. 31, no. 11, April 1992.
M.R. Verma, A.K. Majumdar, and B. Chatterjee, “Edge Detection in Fingerprints,” Pattern Recognition, vol. 20, no. 5, pp. 513–523, 1987.
L. Coetzee, E. C. Botha, “Fingerprint Recognition in Low Quality Images,” Pattern Recognition, vol. 26, no. 10, pp. 1441–1460, 1993.
B.M. Mehtre, “Fingerprint Image Analysis for Automatic Identification,” Machine Vision and Application, 1993.
D. Maio, D. Maltoni, “A Structural Approach to Fingerprint Classification,” IEEE, Proceedings of ICPR′96, 1996.
M.T. Leung, W.E. Engeler, and D Frank, “Fingerprint Image Processing Using Neural Network,” IEEE Region 10 Conference on Computer and Commnicatin Systems, Hong Kong, Sept. 1990.
Y. Shan, P. Shi, and J. Li, “Fingerprint Preclassification Using Key-Points,” International Symposium on Speech, Image Processing and Neural Networks, Hong Kong, 13–16 April 1994.
Shmurun, V. Bjorn, S. Tarn, and M. Holler, “Extraction of Fingerprint Orientation Maps Using A Radial Basis Function Recognition Accelerator,” IEEE, 0-7803-1901-X/94, 1994.
W. Chang, H. S. Soliman, and A. H. Sung, “Fingerprint Image Compression by Natural Clustering Neural Network,” IEEE, 0-8186-6950-0/94, 1994.
M. Kamijo, “Classifying Fingerprint Images using Neural Network: Deriving the Classification State,” IEEE, 0-7803-0999-5/93, 1993.
J. W. Lee, I. S. Kweon, “Extraction of Line Features in A Noisy Image,” Pattern Recognition, vol. 30, no. 10, pp. 1651–1660, 1997.
B.M. Mehtre, N.N. Urthy, S. Kapoor, and B. Chatterjee, “Segmentation of Fingerprint Images Using the Directional Image,” Pattern Recognition, vol. 20, no. 4, pp. 429–435, 1987.
A.K. Hrechak, J.A. Mchugh, “Automated Fingerprint Recognition Using Structural Matching,” Pattern Recognition, vol. 23, no. 8, pp. 893–904, 1990.
L. Wu, Z. Xie, “On Fingerprint Theorems,” IEEE, CH2614-6/88/0000/1216, 1988.
D.K. Isenor, S.G. Zaky, “Fingerprint Identification Using Graph Matching,” Pattern Recognition, vol. 19, no. 2, pp. 113–122, 1986.
L. Coetzee, E.C. Botha, “Preprocessing of Two-dimentional Fingerprint Images for Fingerprint Recognition,” IEEE, TH0370-7/91/0000-0069, 1991.
N.K. Ratha, K. Karu, S. Chen, and A.K. Jain, “A Real Time Matching System for Large Fingerprint Databases,” IEEE Trans. on PAMI, vol. 18, no. 8, Aug. 1996.
J.F. Keegan, “How Can You Tell if Two Line Drawings Are the Same,” Computer Graphics Image Processing, vol. 6, no. 1, pp. 90–92, 1997.
R.A. McLaughlin, M.D. Alder, C.J.S. DeSilva, “Inference of Structure: Hands,” Pattern Recognition Letters, Oct. 1994.
P. Baltscheffsky, P. Anderson, “The Palmprint Project: Automatic Identity Verification by Hand Geometry,” International Carnahan Conference on Security Technology, Gothenburg, Sweden, Aug. 12-14, 1986.
E. Mandler, “Advanced Preprocessing Technique for On-Line Recognition of Handprinted Symbols,” Computer Recognition and Human Production of Handwriting, pp. 19–36, 1989.
I.A. Essa, A.P. Pentland, “Coding, Analysis, Interpretation, and Recognition of Facial Expressions,” IEEE Transactions on PAMI, vol. 19, no. 7, July 1997.
S.H. Jeng, H.Y. Liao, C.C. Han, M. Y. Chern, and Y. T. Liu, “Facial Feature Detection Using Geometrical Face Model: An Efficient Approach,” Pattern Recognition, vol. 31, no. 3, pp. 273–282, 1998.
Q. Chen, H. Wu, and M. Yachida, “Face Detection by Fuzzy Pattern Matching,” IEEE, 0-8186-704208/95, 1995.
A. Tankus, Y. Yeshurun, and N. Intrator, “Face Detection by Direct Convexity Estimation,” Pattern Recognition Letters, vol. 18, pp. 913–922, 1997.
N. Foeder, X. Li, “Accuracy Analysis for Facial Feature Detection,” Pattern Recognition, vol. 29, no. 1, pp. 143–157, 1996.
J. Huang, S. Gutta, and H. Wechsler, “Detection of Human Faces Using Decision Trees,” IEEE, 0-8186-7713-9/96, 1996.
C.L. Huang, C.W. Chen, “Human Facial Feature Extraction for Face Interpretation and Recognition,” Pattern Recognition, vol. 25 no. 12, pp. 1435–1444, 1992.
R. Herpers, M. Michaelis, K.H. Lichtenauer, and G. Sommer, “Edge and Keypoint Detection in Facial Regions,” IEEE, 0-8186-7713-9/96, 1996.
T.F. Cootes and C.J. Taylor, “Locating Faces Using Statistical Feature Detectors,” IEEE, 0-8186-7713-9/96, 1996.
K.C. Yow, R. Cipolla, “Detection of Human Faces under Scale, Orientation and Viewpoint Variations,” IEEE, 0-8186-7713-9/96, 1996.
A.J. Colmenarez, T.S. Huang, “Maximum Likelihood Face Detection,” IEEE, 0-8186-7713-9/96, 1996.
B. Takacs, H. Wechsler, “Visual Filters for Face Recognition,” IEEE, 0-8186-7713-9/96, 1996.
M.S. Lew, “Information Theoretic View-Based and Modular Face Detection,” IEEE, 0-8186-7713-9/96, 1996.
R.C. Rose, E.M. Hofstetter, and D.A. Reynolds, “Integrated Models of Signal and Background with Application to Speaker Identification in Noise,” IEEE Trans. on Speech and Audio Processing, vol. 2, no. 2, April 1994.
Q. Lin, E. Jan, C. Che, and J. Flanagan, “Speaker Identification in Teleconferencing Environments Using Microphone Arrays and Neural Networks,” Esca Workshop on Automatic Speaker Recognition, Identification and Verification.
S. Furui and M.M. Sondhi (eds.), Advances in Speech Signal Processing, Marcel Dekker, NY, 1992.
S. Dutta, “Algorithimic Approach to Automatic Speech Recognition Technique,” IEEE, CH2998-3/91/0000-1233, 1991.
R. Sabourin, G. Genest, and F.J. Preteux, “Off-line Signature Verification by Local Granulometric Size Distributions,” IEEE Trans. on PAMI. vol. 19, no. 9, Sept. 1997.
R. Sabourin, R. Plamondon, L. Beaumier, “Structural Interpretation of Handwritten Signature Images,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 8, no. 3, 1994.
G. Dimauro, S. impedovo, G. Pirlo, “Component-Oriented Algorithms for Signature Verification,” Internationaljournal of Pattern Recognition and Artificial Intelligence, vol. 8, no. 3, pp. 771–793, 1994.
K. Huang, “On-line Signature Verification Based on Dynamic Segmentation and Global and Local Matching,” Optical Engineering, vol. 34, no. 12, Dec. 1995.
R. Martens, L. Claesen, “On-line Signature Verification by Dynamic Time-Warping,” IEEE, Proceedings of ICPR ′96,1015-4651/96, 1996
M. Parizeau, R. Plamondon, “What Types of Scripts Can Be Used for Personal Identity Verification?, ” Computer Recognition and Human Production of Handwriting, pp. 77–90, 1989.
M. Ammar, Y. Yoshida, and T. Fukumura, “Feature Extraction and Selection for Simulated Signature Verification,” Computer Recognition and Human Production of Handwriting, pp. 61–76, 1989.
N.A. Murshed, R. Sabourin, F. Bortolozzi, “A Cognition Approach to Off-line Signature Verification,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 11, no. 5, pp. 801–825, 1997.
G. Dimauro, S. Impedovo, G. Pirlo, and A. Salzo, “A Multi-Expert Signature Verification System for Bankcheck Processing,” International Journal of Pattern Recognition and Artificial Intelligence, vol.11, no. 5, pp. 827–844, 1997.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer Science+Business Media New York
About this chapter
Cite this chapter
Zhang, D.D. (2000). Introduction to Biometrics. In: Automated Biometrics. The International Series on Asian Studies in Computer and Information Science, vol 7. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-4519-4_1
Download citation
DOI: https://doi.org/10.1007/978-1-4615-4519-4_1
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-7038-3
Online ISBN: 978-1-4615-4519-4
eBook Packages: Springer Book Archive