Skip to main content

Introduction to Biometrics

  • Chapter
Automated Biometrics

Abstract

In this chapter, we give an overall perception to biometrics technologies and systems. First, the background of biometrics is introduced in Section 1.1. After some basic concepts, taxonomy and history of biometrics are described in Section 1.2. Section 1.3 discusses the principle and performance evaluation of biometrics systems. Next, biometrics applications are briefly reviewed. A whole book perspective is finally given in Section 1.5.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. Roethenbaugh, “Biometrics Explained,” Available: http://www.icsa.net/services/consortia/cbd-c/sec4.html.

  2. E. Newham, “The Biometrics Report,” New York: SJB Services, 1995. Available: http://www.sjb.co.co.uk

    Google Scholar 

  3. R. Clarke, “Human Identification In Information Systems: Management Challenges And Public Policy Issues,” Info. Technol. People, vol. 7, no. 4, pp. 6–37, 1994.

    Article  Google Scholar 

  4. D. Sims, “Biometrics Recognition: Our Hands, Eyes and Faces Give Us Away,” IEEE Computer Graphics and Applications, 0272-17-16/94, 1994.

    Google Scholar 

  5. J.D. Woodward, “Biometrics: Privacy’s Foe or Privacy’s Friend?,” Proc. IEEE Special Issue on Automated Biometrics,vol. 85, no. 9, pp. 1480–1492, 1997.

    Google Scholar 

  6. B. Carter, “Biometrics Technologies, What They Are and How They Work,” in Proc. CTST′97, Orlando, EL, 1997.

    Google Scholar 

  7. R. Chandrasekaran, “Brave New Whorl: ID System Using The Human Body Are Here, But Privacy Issues Persist,” Washington Post, Mar. 30, 1997.

    Google Scholar 

  8. A. Davis, “The Body as Password,” Wired, July 1997.

    Google Scholar 

  9. D.R. Richards, “Rules of Thumb For Biometrics Systems,” Security Manage, Oct. 1, 1995.

    Google Scholar 

  10. G. Lawton, “Biometrics: A New Era in Security,” IEEE Computer, pp. 16–18, Aug. 1998.

    Google Scholar 

  11. R. Mandelbaum, “Vital Signs of Identity,” IEEE Spectrum, pp. 22–30, Feb. 1994.

    Google Scholar 

  12. Association for Biometrics (AFB) and International Computer Security Association (ICSA), 1998 Glossary of Biometrics Terms, http://www.afb.org.uk/glossuk/.html, 1998.

  13. M. Golfarelli, D. Maio and D. Maltoni, “On the Error-Reject Trade-Off in Biometrics Verification Systems,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 786–796, 1997.

    Article  Google Scholar 

  14. R.P. Wildes, “Iris Recognition: An Emerging Biometrics Technology,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1348–1363, 1997.

    Google Scholar 

  15. D. McMordie, “Texture Analysis of the Human Iris for High Security Authentication,” Available: http://www.ee.mcgill.ca/~mcmordie/iris/iris.ps, 1997.

  16. C. Seal, D. McCartney and M. Gifford, “Iris Recognition for User Validation,” British Telecommunications Engineering, vol. 16, July 1997.

    Google Scholar 

  17. A.K. Jain, H. Lin, P. Harath and R. Bolle, “An Identity-Authentication System Using Fingerprints,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1365–1388, 1997.

    Google Scholar 

  18. A. Jain, H. Lin and R. Bolle, “On-line Fingerprint Verification,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp. 302–313, 1997.

    Article  Google Scholar 

  19. A.R. Roddy and J.D. Stosz, “Fingerprint Features: Statistical Analysis and System Performance Estimates,” Proc. IEEE Special issue on automated biometrics, vol. 85, no. 9, pp. 1390–1421, 1997.

    Google Scholar 

  20. M. Kawagoe and A. Tojo, “Fingerprint Pattern Classification,” Pattern Recognition, vol. 17, no. 3, pp. 295–303, 1984.

    Article  Google Scholar 

  21. D. Zhang and W. Shu, “Two Novel Characteristics in Palmprint Verification: Datum Point Invariance and Line Feature Matching,” Pattern Recognition, vol. 32, pp. 691–702, 1999.

    Article  Google Scholar 

  22. W. Shu and D. Zhang, “Automated Personal Identification by Palmprint,” Optical Engineering, vol. 37, no. 8, pp. 2359–2362, 1998.

    Article  Google Scholar 

  23. W. Shu and D. Zhang, “Palmprint Verification: An Implementation of Biometrics Technology,” Proc. of ICPR′98, vol. I, pp. 219–221, Brisbane AUSTRALIA, 1998.

    Google Scholar 

  24. K.C. Yow and R. Clipolla, “Feature-based Human Face Detection,” Image and Vision Computing, vol. 15, pp. 713–735, 1997.

    Article  Google Scholar 

  25. J. Zhang, Y. Yan and M. Lades, “Face Recognition: Eigenface, Elastic Matching and Neural Nets,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1423–1435, 1997.

    Google Scholar 

  26. R. Chellappa, C.L. Wilson and A. Sirohey, “Human and Machine Recognition of Faces: A Survey,” Proceedings of the IEEE, vol. 83, no. 5, pp. 705–740, 1995.

    Article  Google Scholar 

  27. N.Z. Tishby, “On the Application of Mixture Hidden Markov Models to Text Independent Speaker Recognition,” IEEE Trans. Signal Processing, vol. 39, no. 3, March 1991.

    Google Scholar 

  28. R.P. Ramachandran, M.S. Zilovic and R.J. Mammone, “A Comparative Study of Robust Linear Predictive Analysis Methods with Applications to Speaker Identification,” IEEE Transactions Speech and Audio Processing, vol. 3, no. 2, March 1995.

    Google Scholar 

  29. J.P. Campbell, “Speaker Recognition: A Tutorial,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1437–1462, 1997.

    Google Scholar 

  30. D.A. Reynolds and R.C. Rose, “Robust Text-Independent Speaker Identification Using Gaussian Mixture Speaker Models,” IEEE Trans. Speech and Audio Processing, vol. 3, no. 1, January 1995.

    Google Scholar 

  31. K. Huang and H. Yan, “Off-Line Signature Verification Based on Geometric Feature Extraction and Neural Network Classification,” Pattern Recognition, vol. 30, no. 1, pp. 9–17, 1997.

    Article  Google Scholar 

  32. R. Bajaj and S. Chaudhury, “Signature Verification Using Multiple Neural Classifiers,” Pattern Recognition, vol. 30, no. 1, pp. 1–7, 1997.

    Article  Google Scholar 

  33. Q.Z. Wu, S.Y. Lee and I.C. Jou, “On-Line Signature Verification Based on Split-and-Merge Matching Mechanism,” Pattern Recognition Letters, vol. 18, pp. 665–673, 1997.

    Article  Google Scholar 

  34. Proc. of IEEE, Special Issue on Automated Biometrics, vol. 85, no. 9, Sept. 1997.

    Google Scholar 

  35. W. Shen, M. Surette and R. Khanna, “Evaluation of Automated Biometrics-Based Identification And Verification Systems,” Proc. IEEE Special Issue on Automated Biometrics, vol. 85, no. 9, pp. 1464–1478, 1997.

    Google Scholar 

  36. J.G. Daugman and G.O. Williams, “A Proposed Standard for Biometrics Decidability,” in Proc.CardTech/SecureTech Conf., Atlanta, GA, pp. 223–234, 1996.

    Google Scholar 

  37. J.G. Daugman, “High Confidence Visual Recognition of Persons By a Test of Statistical Independence,” IEEE Trans, on PAMI, vol. 15, 1993.

    Google Scholar 

  38. W.W. Boles, “A Security System Based on Human Iris Identification Using Wavelet Transform,” First International Conference on Knowledge-Based Intelligent Electronic Systems, Adelaide, 21–23 May 1997.

    Google Scholar 

  39. G.O. Williams, “Iris Recognition Technology,” IEEE, 0-7803-3537-6-9/96, 1996.

    Google Scholar 

  40. K. Morita, K. Asai, “Automatic Fingerprint Identification Terminal for Personal Verification,” Hybrid Image Processing, vol. 638, 1986.

    Google Scholar 

  41. X. Shen, M. Cheng, Q. Shi, and G. Qiu, “A New Automated Fingerprint Identification System,” Journals of Computer Science & Technology, vol. 4, no. 4, 1989.

    Google Scholar 

  42. L. O’Gorman, J. V. Nickerson, “An Approach to Fingerprint Filter Design,” Pattern Recognition, vol. 22, no. 1, pp. 29–38, 1989.

    Article  Google Scholar 

  43. Q. Xiao, H. Raafat, “Fingerprint Image Postprocessing: A Combined Statistical and Structural Approach,” Pattern Recognition, vol. 24, no. 10, pp. 985–992, 1991.

    Article  Google Scholar 

  44. Q. Xiao, H. Raafat, “Combining Statistical and Structural Information for Fingerprint Image Processing, Classification and Identification,” Pattern Recognition: Architectures, Algorithms and Applications, 1991.

    Google Scholar 

  45. V.S. Sprinivasan, N.N. Murthy, “Detection of Singular Points in Fingerprint Images,” Pattern Recognition, vol. 25, no. 2, pp. 139–153, 1992.

    Article  Google Scholar 

  46. N. K. Ratha, S. Chen, and A. K. Jain, “Adaptive Flow Orientation-based Feature Extraction in Fingerprint Images,” Pattern Recognition, vol. 28, no. 11, pp. 1657–1672, 1995.

    Article  Google Scholar 

  47. S. Igaki, S. Eguchi, F. Yamagishi, H. Ikeda, and T. Inagaki, “Real-time Fingerprint Sensor Using a Hologram,” Applied Optics, vol. 31, no. 11, April 1992.

    Google Scholar 

  48. M.R. Verma, A.K. Majumdar, and B. Chatterjee, “Edge Detection in Fingerprints,” Pattern Recognition, vol. 20, no. 5, pp. 513–523, 1987.

    Article  Google Scholar 

  49. L. Coetzee, E. C. Botha, “Fingerprint Recognition in Low Quality Images,” Pattern Recognition, vol. 26, no. 10, pp. 1441–1460, 1993.

    Article  Google Scholar 

  50. B.M. Mehtre, “Fingerprint Image Analysis for Automatic Identification,” Machine Vision and Application, 1993.

    Google Scholar 

  51. D. Maio, D. Maltoni, “A Structural Approach to Fingerprint Classification,” IEEE, Proceedings of ICPR′96, 1996.

    Google Scholar 

  52. M.T. Leung, W.E. Engeler, and D Frank, “Fingerprint Image Processing Using Neural Network,” IEEE Region 10 Conference on Computer and Commnicatin Systems, Hong Kong, Sept. 1990.

    Google Scholar 

  53. Y. Shan, P. Shi, and J. Li, “Fingerprint Preclassification Using Key-Points,” International Symposium on Speech, Image Processing and Neural Networks, Hong Kong, 13–16 April 1994.

    Google Scholar 

  54. Shmurun, V. Bjorn, S. Tarn, and M. Holler, “Extraction of Fingerprint Orientation Maps Using A Radial Basis Function Recognition Accelerator,” IEEE, 0-7803-1901-X/94, 1994.

    Google Scholar 

  55. W. Chang, H. S. Soliman, and A. H. Sung, “Fingerprint Image Compression by Natural Clustering Neural Network,” IEEE, 0-8186-6950-0/94, 1994.

    Google Scholar 

  56. M. Kamijo, “Classifying Fingerprint Images using Neural Network: Deriving the Classification State,” IEEE, 0-7803-0999-5/93, 1993.

    Google Scholar 

  57. J. W. Lee, I. S. Kweon, “Extraction of Line Features in A Noisy Image,” Pattern Recognition, vol. 30, no. 10, pp. 1651–1660, 1997.

    Article  Google Scholar 

  58. B.M. Mehtre, N.N. Urthy, S. Kapoor, and B. Chatterjee, “Segmentation of Fingerprint Images Using the Directional Image,” Pattern Recognition, vol. 20, no. 4, pp. 429–435, 1987.

    Article  Google Scholar 

  59. A.K. Hrechak, J.A. Mchugh, “Automated Fingerprint Recognition Using Structural Matching,” Pattern Recognition, vol. 23, no. 8, pp. 893–904, 1990.

    Article  Google Scholar 

  60. L. Wu, Z. Xie, “On Fingerprint Theorems,” IEEE, CH2614-6/88/0000/1216, 1988.

    Google Scholar 

  61. D.K. Isenor, S.G. Zaky, “Fingerprint Identification Using Graph Matching,” Pattern Recognition, vol. 19, no. 2, pp. 113–122, 1986.

    Article  Google Scholar 

  62. L. Coetzee, E.C. Botha, “Preprocessing of Two-dimentional Fingerprint Images for Fingerprint Recognition,” IEEE, TH0370-7/91/0000-0069, 1991.

    Google Scholar 

  63. N.K. Ratha, K. Karu, S. Chen, and A.K. Jain, “A Real Time Matching System for Large Fingerprint Databases,” IEEE Trans. on PAMI, vol. 18, no. 8, Aug. 1996.

    Google Scholar 

  64. J.F. Keegan, “How Can You Tell if Two Line Drawings Are the Same,” Computer Graphics Image Processing, vol. 6, no. 1, pp. 90–92, 1997.

    Article  MathSciNet  Google Scholar 

  65. R.A. McLaughlin, M.D. Alder, C.J.S. DeSilva, “Inference of Structure: Hands,” Pattern Recognition Letters, Oct. 1994.

    Google Scholar 

  66. P. Baltscheffsky, P. Anderson, “The Palmprint Project: Automatic Identity Verification by Hand Geometry,” International Carnahan Conference on Security Technology, Gothenburg, Sweden, Aug. 12-14, 1986.

    Google Scholar 

  67. E. Mandler, “Advanced Preprocessing Technique for On-Line Recognition of Handprinted Symbols,” Computer Recognition and Human Production of Handwriting, pp. 19–36, 1989.

    Google Scholar 

  68. I.A. Essa, A.P. Pentland, “Coding, Analysis, Interpretation, and Recognition of Facial Expressions,” IEEE Transactions on PAMI, vol. 19, no. 7, July 1997.

    Google Scholar 

  69. S.H. Jeng, H.Y. Liao, C.C. Han, M. Y. Chern, and Y. T. Liu, “Facial Feature Detection Using Geometrical Face Model: An Efficient Approach,” Pattern Recognition, vol. 31, no. 3, pp. 273–282, 1998.

    Article  Google Scholar 

  70. Q. Chen, H. Wu, and M. Yachida, “Face Detection by Fuzzy Pattern Matching,” IEEE, 0-8186-704208/95, 1995.

    Google Scholar 

  71. A. Tankus, Y. Yeshurun, and N. Intrator, “Face Detection by Direct Convexity Estimation,” Pattern Recognition Letters, vol. 18, pp. 913–922, 1997.

    Article  Google Scholar 

  72. N. Foeder, X. Li, “Accuracy Analysis for Facial Feature Detection,” Pattern Recognition, vol. 29, no. 1, pp. 143–157, 1996.

    Article  Google Scholar 

  73. J. Huang, S. Gutta, and H. Wechsler, “Detection of Human Faces Using Decision Trees,” IEEE, 0-8186-7713-9/96, 1996.

    Google Scholar 

  74. C.L. Huang, C.W. Chen, “Human Facial Feature Extraction for Face Interpretation and Recognition,” Pattern Recognition, vol. 25 no. 12, pp. 1435–1444, 1992.

    Article  Google Scholar 

  75. R. Herpers, M. Michaelis, K.H. Lichtenauer, and G. Sommer, “Edge and Keypoint Detection in Facial Regions,” IEEE, 0-8186-7713-9/96, 1996.

    Google Scholar 

  76. T.F. Cootes and C.J. Taylor, “Locating Faces Using Statistical Feature Detectors,” IEEE, 0-8186-7713-9/96, 1996.

    Google Scholar 

  77. K.C. Yow, R. Cipolla, “Detection of Human Faces under Scale, Orientation and Viewpoint Variations,” IEEE, 0-8186-7713-9/96, 1996.

    Google Scholar 

  78. A.J. Colmenarez, T.S. Huang, “Maximum Likelihood Face Detection,” IEEE, 0-8186-7713-9/96, 1996.

    Google Scholar 

  79. B. Takacs, H. Wechsler, “Visual Filters for Face Recognition,” IEEE, 0-8186-7713-9/96, 1996.

    Google Scholar 

  80. M.S. Lew, “Information Theoretic View-Based and Modular Face Detection,” IEEE, 0-8186-7713-9/96, 1996.

    Google Scholar 

  81. R.C. Rose, E.M. Hofstetter, and D.A. Reynolds, “Integrated Models of Signal and Background with Application to Speaker Identification in Noise,” IEEE Trans. on Speech and Audio Processing, vol. 2, no. 2, April 1994.

    Google Scholar 

  82. Q. Lin, E. Jan, C. Che, and J. Flanagan, “Speaker Identification in Teleconferencing Environments Using Microphone Arrays and Neural Networks,” Esca Workshop on Automatic Speaker Recognition, Identification and Verification.

    Google Scholar 

  83. S. Furui and M.M. Sondhi (eds.), Advances in Speech Signal Processing, Marcel Dekker, NY, 1992.

    Google Scholar 

  84. S. Dutta, “Algorithimic Approach to Automatic Speech Recognition Technique,” IEEE, CH2998-3/91/0000-1233, 1991.

    Google Scholar 

  85. R. Sabourin, G. Genest, and F.J. Preteux, “Off-line Signature Verification by Local Granulometric Size Distributions,” IEEE Trans. on PAMI. vol. 19, no. 9, Sept. 1997.

    Google Scholar 

  86. R. Sabourin, R. Plamondon, L. Beaumier, “Structural Interpretation of Handwritten Signature Images,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 8, no. 3, 1994.

    Google Scholar 

  87. G. Dimauro, S. impedovo, G. Pirlo, “Component-Oriented Algorithms for Signature Verification,” Internationaljournal of Pattern Recognition and Artificial Intelligence, vol. 8, no. 3, pp. 771–793, 1994.

    Article  Google Scholar 

  88. K. Huang, “On-line Signature Verification Based on Dynamic Segmentation and Global and Local Matching,” Optical Engineering, vol. 34, no. 12, Dec. 1995.

    Google Scholar 

  89. R. Martens, L. Claesen, “On-line Signature Verification by Dynamic Time-Warping,” IEEE, Proceedings of ICPR ′96,1015-4651/96, 1996

    Google Scholar 

  90. M. Parizeau, R. Plamondon, “What Types of Scripts Can Be Used for Personal Identity Verification?, ” Computer Recognition and Human Production of Handwriting, pp. 77–90, 1989.

    Google Scholar 

  91. M. Ammar, Y. Yoshida, and T. Fukumura, “Feature Extraction and Selection for Simulated Signature Verification,” Computer Recognition and Human Production of Handwriting, pp. 61–76, 1989.

    Google Scholar 

  92. N.A. Murshed, R. Sabourin, F. Bortolozzi, “A Cognition Approach to Off-line Signature Verification,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 11, no. 5, pp. 801–825, 1997.

    Article  Google Scholar 

  93. G. Dimauro, S. Impedovo, G. Pirlo, and A. Salzo, “A Multi-Expert Signature Verification System for Bankcheck Processing,” International Journal of Pattern Recognition and Artificial Intelligence, vol.11, no. 5, pp. 827–844, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer Science+Business Media New York

About this chapter

Cite this chapter

Zhang, D.D. (2000). Introduction to Biometrics. In: Automated Biometrics. The International Series on Asian Studies in Computer and Information Science, vol 7. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-4519-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-4519-4_1

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-7038-3

  • Online ISBN: 978-1-4615-4519-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics