Skip to main content

Large Scale Fingerprint Applications: Which Technology Should be Used?

  • Chapter
ISSE/SECURE 2007 Securing Electronic Business Processes
  • 799 Accesses

Abstract

This paper wants to support parties deploying large scale fingerprint based systems. Several issues on how to select the technology that is the appropriate one for their needs are discussed and recommendations are given; with special emphasis to the application of standards to ensure “global” interoperability.

What technology is available today? What can be used for large scale projects? What is necessary for different parts of these projects?

In real world applications, especially in cost intensive applications with a long life span, what ID applications tend to be, the application requirements should determine the technology to be used. What technology is available to address the needs of all these applications and programs? Which requirements should be fulfilled? Which standards should be applied? Which standards exist at all? Are there experiences in the filed that could and should be reused? This paper gives an overview on existing fingerprint standards and characterizes existing large scale projects which include biometric fingerprint subsystems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. National Institute for Standards and Technology, http://www.nist.gov

    Google Scholar 

  2. Federal Bureau of Investigations, http://www.fbi.gov

    Google Scholar 

  3. European Committee for Standardization, http://www.cen.eu

    Google Scholar 

  4. Bundesamt für Sicherheit in der Informationstechnik, http://www.bsi.bund.de/ zertifiz/tr/index.htm.

    Google Scholar 

  5. International Civil Aviation Organization, http://mrtd.icao.int/

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Wolf, A.M. (2007). Large Scale Fingerprint Applications: Which Technology Should be Used?. In: ISSE/SECURE 2007 Securing Electronic Business Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9418-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9418-2_28

  • Publisher Name: Vieweg

  • Print ISBN: 978-3-8348-0346-7

  • Online ISBN: 978-3-8348-9418-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics