Biometric Recognition: Overview and Recent Advances

  • Anil K. Jain
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4756)

Abstract

The emerging requirements of reliable and highly accurate personal identification in a number of government and commercial applications (e.g., international border crossings, access to buildings, laptops and mobile phones) have served as an impetus for a tremendous growth in biometric recognition technology. Biometrics refers to the automatic recognition of an individual by using anatomical or behavioral traits associated with that person. By using biometrics, it is possible to recognize a person based on who you are, rather than by what you possess (e.g., an ID card) or what you remember (e.g., a password). Besides bolstering security, biometric systems also enhance user convenience by alleviating the need to design and remember multiple complex passwords. In spite of the fact that the first automatic biometric recognition system based on fingerprints, called AFIS, was installed by law enforcement agencies over 40 years back, biometric recognition continues to remain a very difficult pattern recognition problem. A biometric system has to contend with problems related to non-universality of biometric (failure to enroll rate), limited degrees of freedom (finite error rate), large intra-class variability, and spoof attacks (system security). This paper presents an overview of biometrics, its advantages and limitations, state-of-the-art error rates and current research in representation, fusion and security issues.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics 14, 4–20 (2004)Google Scholar
  2. 2.
    Wayman, J.L., Jain, A.K., Maltoni, D., Maio, D. (eds.): Biometric Systems, Technology, Design and Performance Evaluation. Springer, Heidelberg (2005)Google Scholar
  3. 3.
    Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)MATHGoogle Scholar
  4. 4.
    Li, S., Jain, A.K. (eds.): Handbook of Face Recognition. Springer, Heidelberg (2005)MATHGoogle Scholar
  5. 5.
    Daugman, J.: Recognizing Persons by their Iris Patterns. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics: Personal Identification in Networked Society, pp. 103–122. Kluwer Academic Publishers, London, UK (1999)Google Scholar
  6. 6.
    Jain, A.K., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Security. Kluwer Academic Publishers, Dordrecht (1999)Google Scholar
  7. 7.
    Biometric System Laboratory - University of Bologna: FVC 2006: The Fourth International Fingerprint Verification Competition Available at http://bias.csr.unibo.it/fvc2006/default.asp
  8. 8.
    Wilson, C., Hicklin, A.R., Bone, M., Korves, H., Grother, P., Ulery, B., Micheals, R., Zoepfl, M., Otto, S., Watson, C.: Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report. Technical Report NISTIR 7123, NIST (2004)Google Scholar
  9. 9.
    Phillips, P.J., Scruggs, W.T., OToole, A.J., Flynn, P.J., Bowyer, K.W., Schott, C.L., Sharpe, M.: FRVT 2006 and ICE 2006 Large-Scale Results. Technical Report NISTIR 7408, NIST (2007)Google Scholar
  10. 10.
    Przybocki, M., Martin, A.: NIST Speaker Recognition Evaluation Chronicles. In: Odyssey: The Speaker and Language Recognition Workshop, Toledo, Spain, pp. 12–22 (2004)Google Scholar
  11. 11.
    Pankanti, S., Prabhakar, S., Jain, A.K.: On the Individuality of Fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 1010–1025 (2002)CrossRefGoogle Scholar
  12. 12.
    Ross, A., Nandakumar, D., Jain, A.K.: Handbook of Multibiometrics. Springer, Heidelberg (2006)Google Scholar
  13. 13.
    Hong, L., Jain, A.K.: Integrating Faces and Fingerprints for Personal Identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 20, 1295–1307 (1998)CrossRefGoogle Scholar
  14. 14.
    Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy Magazine 1(2), 33–42 (2003)CrossRefGoogle Scholar
  15. 15.
    Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security 1(2), 125–143 (2006)CrossRefGoogle Scholar
  16. 16.
    Buhan, I., Hartel, P.: The State of the Art in Abuse of Biometrics. Technical Report TR-CTIT-05-41, Centre for Telematics and Information Technology, University of Twente (2005)Google Scholar
  17. 17.
    Teoh, A.B.J., Goh, A., Ngo, D.C.L.: Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence 28(12), 1892–1901 (2006)CrossRefGoogle Scholar
  18. 18.
    Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)CrossRefGoogle Scholar
  19. 19.
    Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, p. 408 (2002)Google Scholar
  20. 20.
    Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault Using Password. In: Proceedings of Second International Conference on Biometrics, Seoul, South Korea, pp. 927–937 (2007)Google Scholar
  21. 21.
    Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Technical Report 235, Cryptology ePrint Archive (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Anil K. Jain
    • 1
  1. 1.Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48824USA

Personalised recommendations