Overview

Chapter

Abstract

Recently, biometrics technology is one of the hot research topics in the IT field because of the demands for accurate personal identification or verification to solve security problems in various applications. This chapter gives an all-around introduction to biometrics technologies, and the new trend: multispectral biometrics.

Keywords

Biometrics Multispectral biometrics Identification Verification 

References

  1. Barbu T (2009) Comparing various voice recognition techniques. In: IEEE proceedings of the 5-th conference on speech technology and human-computer dialogue, pp 1–6 (doi: 10.1109/SPED.2009.5156172)
  2. Baygin M (2012) Real time voice recognition based smart home application. In: IEEE 20th signal processing and communications applications conference (SIU), pp 1–4Google Scholar
  3. Berry J (1994) The history and development of fingerprinting. In: Lee HC, Gaensslen RE (eds) Advances in fingerprint technology. CRC Press, Florida, pp 1–39Google Scholar
  4. Biometrics: Technologies and Global Markets (2010) http://www.bccresearch.com/market-research/information-technology/biometrics-technologies-markets-ift042c.html. Accessed 30 November 2014
  5. Campbell J (1997) Speaker recognition: a tutorial. Proc IEEE 85:1437–1462CrossRefGoogle Scholar
  6. Cappelli R, Lumini A, Maio D, Maltoni D (1999) Fingerprint classification by directional image partitioning. IEEE Trans Pattern Anal Mach Intell 21:402–421. doi: 10.1109/34.765653 CrossRefGoogle Scholar
  7. Cole RA, Mariani J, Uszkoret H, Zaenen A, Zue A (1997) Survey of the state of the art in human language technology. Cambridge University Press, CambridgeGoogle Scholar
  8. Daugman JG (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15:1148–1161. doi: 10.1109/34.244676 CrossRefGoogle Scholar
  9. Daugman JG (2003) The importance of being random: statistical principles of iris recognition. Pattern Recogn 36(2):279–291CrossRefGoogle Scholar
  10. Facial recognition system (2015) http://en.wikipedia.org/wiki/Facial_recognition_system. Accessed 25 February 2015
  11. Fujitsu Laboratories Limited (2002) Biometric mouse with palm vein pattern recognition technology. http://pr.fujitsu.com/en/news/2002/08/28.html. Accessed 4 July 2003
  12. Fujitsu Laboratories Limited (2011a) Fujitsu PalmSecure selected as a “world changing idea” for 2011 by Scientific American Magazine. http://www.fujitsu.com/us/services/biometrics/palm-vein/SA_news.html. Accessed 18 July 2012
  13. Fujitsu Laboratories Limited (2011b) PalmSecure—Fujitsu’s world-leading authentication technology. http://www.fujitsu.com/emea/products/biometr-ics/intro.html. Accessed 18 July 2012
  14. Fujitsu Limited (2014) Contactless palm vein authentication. http://www.fujitsu.com/jp/group/frontech/en/solutions/business-technology/security/palmsecure/sensor/. Accessed 30 Nov 2014
  15. Hand Geometry (2014) http://en.wikipedia.org/wiki/Hand_geometry. Accessed 30 Nov 2014
  16. Infrared Filter (2014) http://www.maxmax.com/aXRayIRExamplesSecurity.htm. Accessed 30 Nov 2014
  17. Jain A, Pankanti S (2001) Automated fingerprint identification and imaging systems. In: Lee HC, Gaensslen RE (eds) Advances in fingerprint technology, 2nd ed. CRC Press, New YorkGoogle Scholar
  18. Jain AK, Hong L, Bolle R (1997) On-line fingerprint verification. IEEE Trans Pattern Anal Mach Intell 19:302–314. doi: 10.1109/34.587996 CrossRefGoogle Scholar
  19. Jain AK, Bolle RM, Pankanti S (1999) Biometrics: personal identification in networked society. Hardbound, BostonCrossRefGoogle Scholar
  20. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol Spec Issue Image Video-Based Biometrics 14:4–20. doi: 10.1109/TCSVT.2003.818349 CrossRefGoogle Scholar
  21. Karu K, Jain AK (1996) Fingerprint classification. Pattern Recogn 29:389–404. doi: 10.1016/0031-3203(95)00106-9 CrossRefGoogle Scholar
  22. Kinnunen T, Li H (2010) An overview of text-independent speaker recognition: from features to supervectors. Speech Commun 52:12–40. doi: 10.1016/j.specom.2009.08.009 CrossRefGoogle Scholar
  23. Li SZ, Jain AK (2009) Encyclopedia of biometrics. Springer, USCrossRefGoogle Scholar
  24. Maio D, Maltoni D (1997) Direct gray-scale minutiae detection in fingerprints. IEEE Trans Pattern Anal Mach Intell 19:27–40. doi: 10.1109/34.566808 CrossRefGoogle Scholar
  25. Mastali N (2010) Authentication of subjects and devices using biometrics and identity management systems for persuasive mobile computing: a survey paper. In: IEEE fifth international conference on broadband and biomedical communications, pp 1–6 (doi: 10.1109/IB2COM.2010.5723618)
  26. McGuire D (2002) Virginia beach installs face-recognition cameras. The Washington Post. http://www.washingtonpost.com/ac2/wp-dyn/A19946-2002Jul3. Accessed 14 May 2003
  27. Mexican Government (2003) Face recognition technology to eliminate duplicate voter registrations in upcoming presidential elections. http://www.shareholder.com/identix/ReleaseDetail.cfm?ReleaseID=53264. Accessed 15 May 2003
  28. Miller B (1994) Vital signs of identity. IEEE Spectr 31:22–30. doi: 10.1109/6.259484 CrossRefGoogle Scholar
  29. Mexican Government (2003) Face recognition technology to eliminate duplicate voter registrations in upcoming presidential elections. http://www.shareholder.com/identix/ReleaseDetail.cfm?ReleaseID=53264. Accessed 15 May 2003
  30. Motorists to give fingerpint (2006) http://news.bbc.co.uk/2/hi/uk/6170070.stm#text. Accessed 30 Nov 2014
  31. Pankanti S, Bolle RM, Jain A (2000) Biometrics: the future of identification. IEEE Comput 33:46–49. doi: 10.1109/2.820038 CrossRefGoogle Scholar
  32. Ratha N, Karu K, Chen S, Jain AK (1996) A real-time matching system for large fingerprint databases. IEEE Trans Pattern Anal Mach Intell 18:799–813. doi: 10.1109/34.531800 CrossRefGoogle Scholar
  33. Sammut C, Squires B (1995) Automatic speaker recognition: an application of machine learning. In: Proceeding of the 12th international conference on machine learningGoogle Scholar
  34. Sanchez-Reillo R, Sanchez-Marcos A (2000) Access control system with hand geometry verification and smart cards. IEEE Aerosp Electron Syst Mag 15:45–48. doi: 10.1109/62.825671 CrossRefGoogle Scholar
  35. Sanchez-Reillo R, Sanchez-Avilla C, Gonzalez-Marcos A (2000) Biometric identification through hand geometry measurements. IEEE Trans Pattern Anal Mach Intell 22:1168–1171. doi: 10.1109/34.879796 CrossRefGoogle Scholar
  36. Signature recognition (2015) http://en.wikipedia.org/wiki/Signature_recognition. Accessed 25, 2015
  37. Signature Verification (2002) http://biometrics.sabanciuniv.edu/signature.html. Accessed 18 July 2012
  38. The Future of Biometrics (2009) http://www.acuity-mi.com/FOB_Report.php. Accessed 30 Nov 2014
  39. What is Biometrics (2009) http://biometrics.cse.msu.edu/info/index.html. Accessed 30 Nov 2014
  40. Zhang D (2000) Automated biometrics: technologies and systems. Hardbound, BostonCrossRefGoogle Scholar
  41. Zhang X, Wang K, Wang Y (2011) A survey of on-line signature verification. In: Proceeding of Chinese conference on biometric recognition, pp 141–149Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Biometrics Research CentreThe Hong Kong Polytechnic UniversityHung HomHong Kong SAR
  2. 2.Shenzhen Key Laboratory of Broadband Network & Multimedia, Graduate School at ShenzhenTsinghua UniversityShenzhenChina
  3. 3.University of Shanghai for Science and TechnologyShanghaiChina

Personalised recommendations