Biometric Recognition: Overview and Recent Advances
The emerging requirements of reliable and highly accurate personal identification in a number of government and commercial applications (e.g., international border crossings, access to buildings, laptops and mobile phones) have served as an impetus for a tremendous growth in biometric recognition technology. Biometrics refers to the automatic recognition of an individual by using anatomical or behavioral traits associated with that person. By using biometrics, it is possible to recognize a person based on who you are, rather than by what you possess (e.g., an ID card) or what you remember (e.g., a password). Besides bolstering security, biometric systems also enhance user convenience by alleviating the need to design and remember multiple complex passwords. In spite of the fact that the first automatic biometric recognition system based on fingerprints, called AFIS, was installed by law enforcement agencies over 40 years back, biometric recognition continues to remain a very difficult pattern recognition problem. A biometric system has to contend with problems related to non-universality of biometric (failure to enroll rate), limited degrees of freedom (finite error rate), large intra-class variability, and spoof attacks (system security). This paper presents an overview of biometrics, its advantages and limitations, state-of-the-art error rates and current research in representation, fusion and security issues.
Unable to display preview. Download preview PDF.
- 1.Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics 14, 4–20 (2004)Google Scholar
- 2.Wayman, J.L., Jain, A.K., Maltoni, D., Maio, D. (eds.): Biometric Systems, Technology, Design and Performance Evaluation. Springer, Heidelberg (2005)Google Scholar
- 5.Daugman, J.: Recognizing Persons by their Iris Patterns. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics: Personal Identification in Networked Society, pp. 103–122. Kluwer Academic Publishers, London, UK (1999)Google Scholar
- 6.Jain, A.K., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Security. Kluwer Academic Publishers, Dordrecht (1999)Google Scholar
- 7.Biometric System Laboratory - University of Bologna: FVC 2006: The Fourth International Fingerprint Verification Competition Available at http://bias.csr.unibo.it/fvc2006/default.asp
- 8.Wilson, C., Hicklin, A.R., Bone, M., Korves, H., Grother, P., Ulery, B., Micheals, R., Zoepfl, M., Otto, S., Watson, C.: Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report. Technical Report NISTIR 7123, NIST (2004)Google Scholar
- 9.Phillips, P.J., Scruggs, W.T., OToole, A.J., Flynn, P.J., Bowyer, K.W., Schott, C.L., Sharpe, M.: FRVT 2006 and ICE 2006 Large-Scale Results. Technical Report NISTIR 7408, NIST (2007)Google Scholar
- 10.Przybocki, M., Martin, A.: NIST Speaker Recognition Evaluation Chronicles. In: Odyssey: The Speaker and Language Recognition Workshop, Toledo, Spain, pp. 12–22 (2004)Google Scholar
- 12.Ross, A., Nandakumar, D., Jain, A.K.: Handbook of Multibiometrics. Springer, Heidelberg (2006)Google Scholar
- 16.Buhan, I., Hartel, P.: The State of the Art in Abuse of Biometrics. Technical Report TR-CTIT-05-41, Centre for Telematics and Information Technology, University of Twente (2005)Google Scholar
- 19.Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, p. 408 (2002)Google Scholar
- 20.Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault Using Password. In: Proceedings of Second International Conference on Biometrics, Seoul, South Korea, pp. 927–937 (2007)Google Scholar
- 21.Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Technical Report 235, Cryptology ePrint Archive (2006)Google Scholar