Skip to main content

Part of the book series: The International Library of Ethics, Law and Technology ((ELTE,volume 11))

Abstract

Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications such as national ID cards, border crossings, government benefits, and access control. As a result, biometric recognition, or simply biometrics, which is based on physiological and behavioural characteristics of a person, is being increasingly adopted and mapped to rapidly growing person identification applications. Unlike credentials (documents and PIN), biometric traits (e.g., fingerprint, face, and iris) cannot be lost, stolen, or easily forged; they are also considered to be persistent and unique. Use of biometrics is not new; fingerprints have been successfully used for over 100 years in law enforcement and forensics to identify and apprehend criminals. But, as biometrics permeates our society, this recognition technology faces new challenges. The design and suitability of biometric technology for person identification depends on the application requirements. These requirements are typically specified in terms of identification accuracy, throughput, user acceptance, system security, robustness, and return on investment. The next generation biometric technology must overcome many hurdles and challenges to improve the recognition accuracy. These include ability to handle poor quality and incomplete data, achieve scalability to accommodate hundreds of millions of users, ensure interoperability, and protect user privacy while reducing system cost and enhancing system integrity. This chapter presents an overview of biometrics, some of the emerging biometric technologies and their limitations, and examines future challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Virus program(s) that hide within a set of seemingly useful software programs to facilitate unauthorized access to a hacker

References

  • Abate, A.F., M. Nappi, D. Riccio, and G. Sabatino. 2007. 2D and 3D face recognition: A survey. Pattern Recognition Letters 28(14): 1885–1906.

    Article  Google Scholar 

  • Abdullayeva, F., Imamverdiyev, V. Musayev, and J. Wayman. 2008. Analysis of security vulnerabilities in biometrics systems. Proceedings of the Second International Conference on “Problems of Cybernetics and Informatics”, September 10–12, Baku, Azerbaijan. http://danishbiometrics.files.wordpress.com/2009/08/1-13.pdf. Accessed 30 Jan 2010.

  • Adler, A. 2004. Images can be reconstructed from quantized biometric match score data. Proceedings of the Canadian Conference on Electrical and Computer Engineering, Niagara Falls, 469–472.

    Google Scholar 

  • Antonelli, A., R. Cappelli, D. Maio, et al. 2006. Fake finger detection by skin distortion analysis. IEEE Transactions on Information Forensics and Security 1: 360–373.

    Article  Google Scholar 

  • Australian Government. Introducing SmartGate. http://www.customs.gov.au/webdata/resources/files/BR_introSmrtGt0409.pdf. Accessed 30 Jan 2010.

  • Bangeman, E. 2009. Swiss privacy commissioner says “nein” to Google Street View. Ars technical. http://arstechnica.com/tech-policy/news/2009/08/swiss-privacy-commissioner-says-nein-to-google-street-view-swiss-privacy-commissioner-says-nein-to-google-street-view.ars. Accessed 30 Jan 2010.

  • Bender, S., and H. Postley. 2007. Key sequence rhythm recognition system and method. US Patent No. 7206938.

    Google Scholar 

  • Bhanu, B., and H. Chen. 2008. Human ear recognition by computer. New York: Springer.

    Book  Google Scholar 

  • BioAPI Consort. http://www.bioapi.org. Accessed 30 Jan 2010.

  • Biometrics Market Intelligence. http://www.biometricsmi.com. Accessed 30 Jan 2010.

  • Biometrics.gov. Registry of USG recommended biometric standards. http://www.biometrics.gov/Standards/StandardsRegistry.pdf. Accessed 30 Jan 2010.

  • BioPrivacy Initiative. Best practices for privacy-sympathetic biometric deployment. http://www.bioprivacy.org. Accessed 30 Jan 2010.

  • Bowyer, K.W., K. Hollingsworth, and P.J. Flynn. 2008. Image understanding for iris biometrics: A survey. Computer Vision and Image Understanding 110(2): 281–307.

    Article  Google Scholar 

  • CBS News. Argentina forces dirty war orphans to provide DNA. http://www.cbsnews.com/stories/2009/11/21/ap/world/main5727307.shtml. Accessed 30 Jan 2010.

  • CJIS. Integrated automated fingerprint identification system or IAFIS. http://www.fbi.gov/hq/cjisd/iafis.htm. Accessed 30 Jan 2010.

  • Clarke, R. 2000. Beyond the OECD guidelines: Privacy protection for the 21st century. Roger Clarke’s Web-Site. http://www.rogerclarke.com/DV/PP21C.html. Accessed 30 Jan 2010.

  • Cohn, J.P. 2006. Keeping an eye on school security: The iris recognition project in New Jersey Schools. National Institute of Justice J, No. 254. http://www.ojp.usdoj.gov/nij/journals/254/iris_recognition.html. Accessed 30 Jan 2010.

  • Crihalmeanu, S., A. Ross, and R. Derakhshani. 2009. Enhancement and registration schemes for matching conjunctival vasculature. Proceedings of the 3rd IAPR/IEEE International Conference on Biometrics, Alghero, Italy.

    Google Scholar 

  • Daugman, J., and I. Malhas. 2004. Iris recognition border-crossing system in the UAE. Biometrics. http://www.cl.cam.ac.uk/~jgd1000/UAEdeployment.pdf. Accessed 30 Jan 2010.

  • Denham, E. 2009. Findings under the personal information protection and electronic documents act (PIPEDA). Office of the Privacy Commissioner of Canada. http://www.priv.gc.ca/cf-dc/2009/2009_008_0716_e.cfm. Accessed 30 Jan 2010.

  • Department of Defense. Electronic biometric transmission specifications. http://www.biometrics.gov/Standards/DoD_ABIS_EBTS_v1.2.pdf. Accessed 30 Jan 2010.

  • Dewan, S.K. 2003. Elementary, Watson: Scan a palm, find a clue. The New York Times. http://www.nytimes.com. Accessed 30 Jan 2010.

  • DNA Fingerprint Identification. http://www.fingerprinting.com/dna-fingerprint-identification.php. Accessed 20 Feb 2010.

  • Doward, J. 2009. DNA tests for asylum seekers ‘deeply flawed’. guardian.co.uk. http://www.guardian.co.uk/world/2009/sep/20/asylum-seeker-dna-tests. Accessed 30 Jan 2010.

  • Draper, S.C., A. Khisti, E. Martinian, et al. 2007. Using distributed source coding to secure fingerprint biometrics. ICASSP, Hawaii, 129–132.

    Google Scholar 

  • Drira H., B.B. Amor, M. Daoudi, and A. Srivastava. 2009. Nasal region contribution in 3D face biometrics using shape analysis framework. Proceedings of the 3rd IAPR/IEEE International Conference on Biometrics, Alghero, Italy, 357–366.

    Google Scholar 

  • E-Channel. Immigration Department, Hong Kong. http://www.immd.gov.hk/ehtml/20041216.htm. Accessed 30 Jan 2010.

  • Editor. 2009. Iris at a distance not yet mature enough, says UAE. Biometric Technology Today 17(2): 1.

    Google Scholar 

  • Falguera, J.R., F.P.S. Falguera, and A.N. Marana. 2008. Frontal sinus recognition for human identification. Proceedings of SPIE, vol. 6944, Orlando, FL, 69440S.

    Google Scholar 

  • FANPIX.net. Barack Obama pictures. http://www.fanpix.net/gallery/barack-obama-pictures.htm. Accessed 30 Jan 2010.

  • Feng, Y.C., and P.C Yuen. 2006. Protecting face biometric data on smartcard and Reed-Soloman Code. Proceedings of CVPR Workshop on Biometrics, New York, 29.

    Google Scholar 

  • Feng. J., and A.K. Jain. 2009. FM model based fingerprint reconstruction from minutiae template. Proceedings of ICB 2009, Alghero, Italy, 544–553.

    Google Scholar 

  • Fingerprinting. History of fingerprinting. http://www.fingerprinting.com/history-of-fingerprinting.php. Accessed 30 Jan 2010.

  • Freire-Santos, M., J. Fierrez-Aguilar, and J. Ortega-Gracia. 2006. Cryptographic key generation using handwritten signature. Proceedings of SPIE Conference on Biometric Technologies for Human Identification, vol. 6202, Orlando, 225–231.

    Google Scholar 

  • Grother, P., W. Salamon, C. Watson et al. 2009. MINEX II – Performance of match on card algorithms Phase II/III report. NIST Interagency Report 7477. http://fingerprint.nist.gov/minexII/minex_report.pdf. Accessed 30 Jan 2010.

  • Higaki, T. 2007 Quotes of the day. TIME. http://www.time.com/time/quotes/0,26174,1685967,00.html. Accessed 30 Jan 2010.

  • Hirobayashi, S., Y. Tamura, T. Yamabuchi, and T. Yoshizawa. 2007. Verification of individual identification method using bioelectric potential of plant during human walking. Japanese Journal of Applied Physics 46(4A): 1768–1773.

    Article  Google Scholar 

  • Hong, L. 1998. Automatic personal identification using fingerprints. PhD thesis. Michigan State University.

    Google Scholar 

  • Hong Kong Immigration Department. Hong Kong immigration department annual report 2007–2008, 2009. http://www.immd.gov.hk/a_report_07-08/eng/chapter02/index.htm. Accessed 30 Jan 2010.

  • Hong Kong Post e-Cert. http://www.hongkongpost.gov.hk/index.html. Accessed 30 Jan 2010.

  • Indovina M., et al. 2009. ELFT Phase II-An Evaluation of Automated Latent Fingerprint Identification Technologies. NISTIR 7577.

    Google Scholar 

  • Irvine, J.M., S.A. Israel, W.T. Scruggs, and W.J. Worek. 2008. Eigenpulse: Robust human identification from cardiovascular function. Pattern Recognition 41(11): 3427–3435.

    Article  Google Scholar 

  • Jain, A.K., and J. Feng. 2009. Latent palmprint matching. IEEE Transactions on Pattern Analysis and Machine Intelligence 31(6): 1032–1047.

    Article  Google Scholar 

  • Jain, A.K., and U. Park. 2009. Facial marks: Soft biometric for face recognition. Proceedings of the International Conference on Image Process, Cairo, Egypt.

    Google Scholar 

  • Jain, A.K., S.C. Dass, and K. Nandakumar. 2004a. Can soft biometric traits assist user recognition? Proceedings of SPIE, vol. 5404, Biometric Technology for Human Identification, Orlando, 561–572.

    Google Scholar 

  • Jain, A.K., S.C. Dass, and K. Nandakumar. 2004b. Soft biometric traits for personal recognition systems. Proceedings of International Conference on Biometric Authentication, Hong Kong, 731–738.

    Google Scholar 

  • Jain, A.K., A. Ross, and S. Pankanti. 2006. Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security 1(2): 125–143.

    Article  Google Scholar 

  • Jain, A.K., P.J. Flynn, and A. Ross, eds. 2007. Handbook of biometrics. New York: Springer.

    Google Scholar 

  • Jain, A.K., J. Feng, A. Nagar, K. Nandakumar. 2008a. On matching latent fingerprints. Proceedings of CVPR Workshop on Biometrics, Alaska, 1–8.

    Google Scholar 

  • Jain, A.K., K. Nandakumar, and A. Nagar. 2008b. Biometric template security. EURASIP J Advances in Signal Processing, Special issue on Biometrics.

    Google Scholar 

  • Joshi, A.J., S. Chandran, V.K. Jayaraman, and B.D. Kulkarni. 2008. Arterial pulse rate variability analysis for diagnoses. Proceedings of ICPR, Tampa, FL, 1–4.

    Google Scholar 

  • Jules, A., and M. Sudan. 2002. A fuzzy vault scheme. Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 408.

    Google Scholar 

  • Kellokumpu, V., G. Zhao, S.Z. Li, et al. 2009. Dynamic texture based gait recognition. Proceedings of the ICB 2009, Alghero, Italy, 1000–1009.

    Google Scholar 

  • Kumar, A. 2008. Incorporating cohort information for reliable palmprint authentication. Proceeding of ICVGIP 2008, Bhubaneswar, 583–590.

    Google Scholar 

  • Kumar, A., and A. Kumar. 2009. Development of a new cryptographic construct using palmprint based fuzzy vault. EURASIP Journal on Advances in Signal Processing 2009: 1–12. ASP/967046.

    Article  Google Scholar 

  • Kumar, A., and K.V. Prathyusha. 2009. Personal authentication using hand vein triangulation and knuckle shape. IEEE Transactions on Image Processing 38(9): 2127–2136.

    Article  Google Scholar 

  • Kumar, A., and Ch Ravikanth. 2009. Personal authentication using finger knuckle surface. IEEE Transactions on Information Forensics and Security 4(1): 98–110.

    Article  Google Scholar 

  • Kumar, A., and Y. Zhou. 2009. Human identification using knucklecodes. Proceeding of BTAS 2009, Washington, DC.

    Google Scholar 

  • Kumar, A., V. Kanhangad, and D. Zhang. 2010. A new framework for adaptive multimodal biometrics management. IEEE Transactions on Information Security Forensics, available online (to appear).

    Google Scholar 

  • LaCous, M.K. 2008. Match template protection within biometric security systems. US Patent No. 7454624.

    Google Scholar 

  • Lee, H.C., and R.E. Gaensslen. 2001. Advances in fingerprint technology. Boca Raton: CRC Press.

    Book  Google Scholar 

  • Lee, Y.J., K. Bae, S.J. Lee, et al. 2007. Biometric key binding: Fuzzy vault based on iris images. Proceedings of the International Conference on Biometrics, Seoul, 800–808.

    Google Scholar 

  • Lee, J.-E., A.K. Jain, and R. Jin. 2008. Scars, marks and tattoos (SMT): Soft biometric for suspect and victim identification. Proceedings of the Biometric Symposium, Biometric Consort Conference, Tampa, FL.

    Google Scholar 

  • MacManus, R. 2009. Hong Kong’s octopus card: Utility outweighs privacy concerns. ReadWriteWeb. http://www.readwriteweb.com/archives/hong_kongs_octopus_card.php. Accessed 30 Jan 2010.

  • Matey, J.R., O. Naroditsky, K. Hanna, et al. 2006. Iris on the move: Acquisition of images for iris recognition in less constrained environments. Proceedings of the IEEE, vol. 94, 1936–1947.

    Google Scholar 

  • Matey, J.R., D. Ackerman, J. Bergen, and M. Tinker. 2008. Iris recognition in less constrained environments. In Advances in biometrics sensors, algorithms and systems, ed. N.K. Ratha and V. Govindaraju, London: Springer, 107–131.

    Google Scholar 

  • Médioni, G., J. Choi, C.-H. Kuo, and D. Fidaleo. 2009. Identifying noncooperative subjects at a distance using face images and infrared three-dimensional face models. IEEE Transactions on Systems, Man, Cybernetics. Part A: Systems and Humans 39(1): 12–24.

    Article  Google Scholar 

  • Mhatre, A., S. Palla, S. Chikkerur, et al. 2005. Efficient search and retrieval in biometric databases. Proceedings of SPIE Defense and Security Symposium, vol. 5779, 265–273.

    Google Scholar 

  • MIS ASIA. HK privacy commissioner: Fingerprint collection excessive. http://www.mis-asia.com/news/articles/hk-privacy-commissioner-fingerprint-collection-excessive. Accessed 30 Jan 2010.

  • Nagar, A., and A.K. Jain. 2009. On the security of non-invertible fingerprint template transforms. Proceedings of the First IEEE International Workshop on Information Forensics & Security (WIFS 2009), London.

    Google Scholar 

  • Nakajima, K., Y. Mizukami, K. Tanka, and T. Tamura. 2000. Footprint-based personal recognition. IEEE Transactions on Biomedical Engineering 47(11): 1534–1537.

    Article  Google Scholar 

  • Nakashima, E. 2007. FBI prepares vast database of biometrics. The Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2007/12/21/AR2007122102544.html. Accessed 30 Jan 2010.

  • Nandakumar, K., A.K. Jain, and A. Ross. 2009. Fusion in multibiometric identification systems: what about the missing data? Proceedings of the ICB, Alghero, Italy, 743–752.

    Google Scholar 

  • NIST Report to the United States Congress. 2002. Summary of NIST standards for biometric accuracy, tamper resistance and interoperability.

    Google Scholar 

  • NIST. Evaluation of Latent Fingerprint Technologies 2007. http://fingerprint.nist.gov/latent/elft07/. Accessed 30 Jan 2010.

  • NIST. National and international biometric standards. http://www.itl.nist.gov/div893/biometrics/standards.html. Accessed 30 Jan 2010.

  • NIST. Summary of NIST standards for biometric accuracy, tamper resistance, and interoperability. http://www.itl.nist.gov/iad/894.03/NISTAPP_Nov02.pdf. Accessed 30 Jan 2010.

  • NSTC. Biometrics history. http://www.biometrics.gov/Documents/BioHistory.pdf. Accessed 30 Jan 2010.

  • Nuffield Council on Bioethics. 2007. The forensics use of bioinformatics: Ethical issues. Cambridge/London: Cambridge Publishes.

    Google Scholar 

  • Office of the Privacy Commissioner for Personal Data Protection. Privacy Commissioner Responds to Public Enquiries about the Issue of “Employer Collecting Employees’ Fingerprint Data for Attendance Purpose”. http://www.pcpd.org.hk/english/infocentre/press_20090716.html. Accessed 30 Jan 2010.

  • PalmSecure. http://www.fujitsu.com/us/services/biometrics/palm-vein. Accessed 20 Feb 2010.

  • Pankanti, S., S. Prabhakar, and A.K. Jain. 2002. On the individuality of fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(8): 1010–1025.

    Article  Google Scholar 

  • Park, U., A. Ross, and A.K. Jain. 2009. Periocular biometrics in the visible spectrum: A feasibility study. Proceedings of the BTAS, Washington, DC.

    Google Scholar 

  • Pink Tentacle. Magazine photos fool age-verification cameras. http://pinktentacle.com/2008/06/magazine-photos-fool-age-verification-cameras. Accessed 30 Jan 2010.

  • Poh, N., R. Wong, J. Kittler, et al. 2009. Challenges and research directions for adaptive biometric recognition systems. Proceedings of the ICB, Alghero, Italy.

    Google Scholar 

  • Printrak Division. Printrak LiveScan 4000 Ruggedized. http://www.morpho.com/MorphoTrak/PrinTrak/prnt_prod/pp_Ls-4000.html. Accessed 30 Jan 2010.

  • Privacy Commissioner of Hong Kong. Privacy commissioner responds to public enquiries about the issue of “Employer Collecting Employees’ Fingerprint Data for Attendance Purpose”. http://www.pcpd.org.hk/english/infocentre/press_20090716.html. Accessed 30 Jan 2010.

  • Proença, H., S. Filipe, R. Santos, J. Oliveira, and L.A. Alexandre. 2009. The UBIRIS.v2: A database of visible wavelength iris images captured on-the-move and at-a-distance. IEEE Transactions on Pattern Analysis and Machine Intelligence, available online (to appear).

    Google Scholar 

  • PROnetworks. Face recognition cigarette vending machines. http://www.pronetworks.org/forums/face-recognition-cigarette-vending-machines-t102463.html. Accessed 30 Jan 2010.

  • Ramus, S.J., and H. Eichenbaum. 2000. Neural correlates of olfactory recognition memory in rat orbitofrontal cortex. Journal of Neuroscience 20: 8199–8208.

    Google Scholar 

  • Ranger, S. 2006. Photos: Iris scanning at the airport. Silicon.com. http://www.silicon.com/management/public-sector/2006/04/13/photos-iris-scanning-at-the-airport-39158086/. Accessed 10 Oct 2009.

  • Ratha, N., J.H. Connell, and R.M. Bolle. 2001. An analysis of minutiae matching strengths. Proceedings of the International Conference on Audio and Video-based Biometric Authentication, Halmstad, Sweden, 223–228.

    Google Scholar 

  • Reddy, P.V., A. Kumar, S.M.K. Rahman, and T.S. Mundra. 2008. A new antispoofing approach for biometric devices. IEEE Transactions on Biomedical Circuits and Systems 2(4): 284–293.

    Article  Google Scholar 

  • Rhodes, Henry T.F. 1956. Alphonse Bertillon, Father of scientific detection. New York: Abelard-Schuman.

    Google Scholar 

  • Ross, A., K. Nandakumar, and A.K. Jain. 2006. Handbook of multibiometrics. New York: Springer.

    Google Scholar 

  • Ross, A., J. Shah, and A.K. Jain. 2007. From templates to images: Reconstructing fingerprints from minutiae points. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4): 544–560.

    Article  Google Scholar 

  • Rowe, R.K., U. Uludag, M. Demirkus, et al. 2007. A multispectral whole-hand biometric authentication system. Proceedings of the Biometric Symposium, Biometric Consort Conference, Baltimore.

    Google Scholar 

  • Schiphol. Fast border passage with iris scan. http://www.schiphol.nl/AtSchiphol/PriviumIrisscan/FastBorderPassageWithIrisScan.htm. Accessed 27 Sept 2009.

  • Serkan, T. 2009. Women uses tape to trick biometric airport fingerprint scan. CrunchGear. http://www.crunchgear.com/2009/01/02/woman-uses-tape-to-trick-biometric-airport-fingerprint-scan. Accessed 30 Jan 2010.

  • Shamir, L., S. Ling, S. Rahimi, L. Ferrucci, and I.G. Goldberg. 2009. Biometric identification using knee X-rays. International Journal of Biometrics 1(3): 365–370.

    Article  Google Scholar 

  • Singh, K. 2008. Altered fingerprints, Interpol report. INTERPOL. http://www.interpol.int/Public/Forensic/fingerprints/research/alteredfingerprints.pdf. Accessed 30 Jan 2010.

  • Singh, R., M. Vatsa, A. Ross, et al. 2009. Online learning in biometrics: A case study in face classifier update. Proceedings of the BTAS’2009, Washington, DC.

    Google Scholar 

  • Song, S., K. Ohnuma, Z. Liu, L. Mei, A. Kawada, and T. Monma. 2009. Novel biometrics based on nose pore recognition. Optical Engineering 48(5): 57204.

    Article  Google Scholar 

  • South Wales Police. A history of fingerprinting. http://www.south-wales.police.uk/fe/master.asp?n1=8&n2=253&n3=1028. Accessed 30 Jan 2010.

  • Standing Committee 37 ISO Standards Development. http://isotc.iso.org/livelink/livelink?func=ll&objId=2262372&objAction=browse&sort=name. Accessed 30 Jan 2010.

  • Sun, Z., T. Tan, Y. Yang, et al. 2005. Ordinal palmprint representation for personal identification. Proceedings of CVPR 2005, San Diego, 279–284

    Google Scholar 

  • Sun, Z., A. Paulino, J. Feng, Z. Chai, T. Tan, and A. K. Jain. 2010. A study of multibiometric traits of identical twins. Proceedings of the SPIE Biometrics, Florida.

    Google Scholar 

  • Swabey, M.A., S.P. Beeby, A.D. Brown, and J.E. Chad. 2004. Using Otoacoustic emission as biometric. Proceedings of ICBA, Hong Kong, LNCS, vol. 3072, pp. 600–606.

    Google Scholar 

  • Tabor, Z., D. Karpisz, L. Wojnar, and P. Kowalski. 2009. An automatic recognition of the frontal sinus in x-ray images of skull. IEEE Transactions on Biomedical Engineering 56(2): 361–368.

    Article  Google Scholar 

  • Tao, D., X. Li, X. Wu, et al. 2007. Analysis and gabor features for gait recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(10): 1700–1715.

    Article  Google Scholar 

  • Topping, A., V. Kuperschmidt, and A. Gormley. 1998. Method and apparatus for the automated identification of individuals by their beds of their fingernails. U.S. Patent No. 5751835.

    Google Scholar 

  • Tronci, R., G. Giacinto, and F. Roli. 2007. Dynamic score selection for fusion of multiple biometric matchers. Proceedings of the 14th IEEE International Conference on Image Analysis and Processing, ICIAP, Modena, Italy, 15–20.

    Google Scholar 

  • Tuyls, P., A.H.M. Akkermans, T.A.M. Kevenaar, et al. 2005. Practical biometric authentication with template protection. Proceedings of the 5th International Conference on Audio- and Video-based Biometric Person Authentication, Rye Town, NY, 436–446.

    Google Scholar 

  • Uhl, A., and P. Wild. 2008. Footprint-based biometric verification. Journal of Electronic Imaging 17: 11016.

    Article  Google Scholar 

  • UIDAI. Creating a unique identity number for every resident in India (Working paper – version 1.1). http://uidai.gov.in. Accessed 30 Jan 2010.

  • UK Border Agency. Iris Recognition Immigration System (IRIS). http://www.ukba.homeoffice.gov.uk/managingborders/technology/iris. Accessed 30 Jan 2010.

  • Uludag, U., and A.K. Jain. 2006. Securing fingerprint template: Fuzzy vault with helper data. Proceedings of CVPR Workshop on Privacy Research in Vision, New York, 163.

    Google Scholar 

  • University of Cambridge. John Daugman’s webpage. http://www.cl.cam.ac.uk/~jgd1000. Accessed 30 Jan 2010.

  • US Department of Homeland Security. New biometric technology improves security and facilitates U.S. entry process for international travelers. https://www.dhs.gov/xlibrary/assets/usvisit/usvisit_edu_10-fingerprint_consumer_friendly_content_1400_words.pdf. Accessed 30 Jan 2010.

  • Veeramachaneni, K., L.A. Osadciw, and P.K. Varshney. 2005. An adaptive multimodal biometric management algorithm. IEEE Transactions on Systems, Man, Cybernetics. Part C 35(3): 344–356.

    Article  Google Scholar 

  • Volokh, E. 2007. Religious freedom and DNA gathering. Volokh conspiracy or CNET news http://volokh.com/2007/02/26/religious-freedom-and-dna-gathering Feb. 2007 or http://news.cnet.com/Feds-out-for-hackers-blood/2100-7348_3-6151385.html. Accessed 30 Jan 2010.

  • Walt Disney World Resort. http://disneyworld.disney.go.com/. Accessed 30 Jan 2010.

  • Wayman, J.L., 1997. Large-scale civilian biometric systems - issues and feasibility. Proceedings of the CardTech/SecureTech Government, Washington DC, http://www.engr.sjsu.edu/biometrics/nbtccw.pdf. Accessed 30 Jan 2010.

  • Wickins, J. 2007. The ethics of biometrics: The risk of social exclusion from the widespread use of electronic identification. Science and Engineering Ethics 13: 45–54.

    Article  Google Scholar 

  • Woodard, D.L., and P.J. Flynn. 2005. Finger surface as a biometric identifier. Computer Vision and Image Understanding 100(3): 357–384.

    Article  Google Scholar 

  • Yan, P., and K.W. Bowyer. 2007. Biometric recognition using 3D ear shape. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(8): 1297–1308.

    Article  Google Scholar 

  • Zhang, D., W.K. Kong, J. You, et al. 2003. Online palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(9): 1041–1050.

    Article  Google Scholar 

Download references

Acknowledgement

The authors thankfully acknowledge Dr. Jianjiang Feng, Tsinghua University, Dr. Salil Prabhakar, DigitalPersona, Dr. Karthik Nandakumar, Institute for Infocomm Research (I2R), and Abhishek Nagar, Michigan State University for their constructive comments and suggestions. Part of Anil Jain’s research was supported by WCU(World Class University) program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (R31-10008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anil K. Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Jain, A.K., Kumar, A. (2012). Biometric Recognition: An Overview. In: Mordini, E., Tzovaras, D. (eds) Second Generation Biometrics: The Ethical, Legal and Social Context. The International Library of Ethics, Law and Technology, vol 11. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-3892-8_3

Download citation

Publish with us

Policies and ethics