Encyclopedia of Biometrics

2009 Edition
| Editors: Stan Z. Li, Anil Jain

Fraud Reduction, Applications

  • Victor Minchih Lee
Reference work entry
DOI: https://doi.org/10.1007/978-0-387-73003-5_909



Fraud is conventionally defined as the deliberate perversion or withholding of veracity in order to induce another to surrender something of value. In the context of biometrics, the item of value is typically an identity or a privilege associated with an identity.

For the purposes of this entry, fraud reduction in a biometric applications context refers to the use of biometric technology’s duplicate detection capabilities to deter, inhibit, and mitigate fraud. Duplicate detection refers to the discovery of multiple identities claimed by a single, given individual.


For numerous decades, individuals have sought to misrepresent their identities for the sake of obtaining benefits and privileges to which they are not properly entitled. Such fraud can be costly – both financially and politically. For fiscal year 2007/2008, the United Kingdom’s Department for Work and...

This is a preview of subscription content, log in to check access.


  1. 1.
    UK Department for Work and Pensions, Information Directorate: Fraud and Error in the Benefit System: October 2006 to September 2007 (May 2008)Google Scholar
  2. 2.
    Urbina, I.: Voter ID Battle Shifts to Proof of Citizenship, New York Times. http://www.nytimes.com/2008/05/12/us/politics/12vote.html?ref = opinion (12 May 2008). Accessed 2 Sept 2008
  3. 3.
    Samples, J.: The Motor Voter Act and Voter Fraud, CATO Institute. http://www.cato.org/testimony/ct-js031401.html (14 May 2001). Accessed 2 Sept 2008
  4. 4.
    Palm Print Recognition, National Science and Technology Council. http://www.biometrics.gov/Documents/PalmPrintRec.pdf. Accessed 2 Sept 2008
  5. 5.
    Front End Medicaid Fraud Reduction Pilot Program Based on Biometric Front-End System, Texas Health and Human Services Commission. http://www.hhsc.state.tx.us/OIE/RFP/FrontEnd/FingerImaging_RFI.pdf (30 June 2003). Accessed 2 Sept 2008
  6. 6.
    LGE Iris Tech Win in India Redefines Biometric Scalability. Findbiometrics.com. http://www.findbiometrics.com/article/115. Accessed 2 Sept 2008
  7. 7.
    BIO-key and Tiger IT Bangladesh Voter Registration Project Nearing Completion, BIO-key International, Inc. http://www.reuters.com/article/pressRelease/idUS121192 + 17-Jun-2008 + PRN20080617 (17 June 2008). Accessed 3 Sept 2008
  8. 8.
    The Mexican Instituto Federal Electoral (IFE): Mexico deploys multi-biometric voting system. Biometric Technol. Today. 14(5), 3–4 (2006)Google Scholar
  9. 9.
    Kablenet: EU aims to stop ‘visa shopping’, The Register. http://www.theregister.co.uk/2007/06/08/schengen_visa_data/ (8 June 2007). Accessed 3 Sept 2008
  10. 10.
    Lieutenant Mohammad Al-Mualla: The UAE Iris Expellees Tracking and Border Control System. http://www.biometrics.org/bc2005/Presentations/Conference/2%20Tuesday%20September%2020/Tue_Ballroom%20B/Lt.%20Mohammad%20UAE2005.pdf. Accessed 4 Sept 2008
  11. 11.
    Study Report on Biometrics and E-Authentication. INCITS/M1 Ad Hoc Group on Biometrics in E-Authentication (2006)Google Scholar
  12. 12.
    Anderson, K.: Consumer Fraud in the United States: Second Survey. Federal Trade Commission, Washington, DC (2007)Google Scholar
  13. 13.
    Lee, V.: Transcript of Authentication Technologies FTC Proof Positive Workshop Session. Federal Trade Commission, Washington, DC (2007)Google Scholar
  14. 14.
    Progress in Tackling Benefit Fraud: Thirty-first Report of Session 2007–2008, UK House of Commons, Committee of Public Accounts. Accessed 2 June 2008Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Victor Minchih Lee
    • 1
  1. 1.International Biometric GroupNew YorkUSA