Abstract
Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications such as national ID cards, border crossings, government benefits, and access control. As a result, biometric recognition, or simply biometrics, which is based on physiological and behavioural characteristics of a person, is being increasingly adopted and mapped to rapidly growing person identification applications. Unlike credentials (documents and PIN), biometric traits (e.g., fingerprint, face, and iris) cannot be lost, stolen, or easily forged; they are also considered to be persistent and unique. Use of biometrics is not new; fingerprints have been successfully used for over 100 years in law enforcement and forensics to identify and apprehend criminals. But, as biometrics permeates our society, this recognition technology faces new challenges. The design and suitability of biometric technology for person identification depends on the application requirements. These requirements are typically specified in terms of identification accuracy, throughput, user acceptance, system security, robustness, and return on investment. The next generation biometric technology must overcome many hurdles and challenges to improve the recognition accuracy. These include ability to handle poor quality and incomplete data, achieve scalability to accommodate hundreds of millions of users, ensure interoperability, and protect user privacy while reducing system cost and enhancing system integrity. This chapter presents an overview of biometrics, some of the emerging biometric technologies and their limitations, and examines future challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Virus program(s) that hide within a set of seemingly useful software programs to facilitate unauthorized access to a hacker
References
Abate, A.F., M. Nappi, D. Riccio, and G. Sabatino. 2007. 2D and 3D face recognition: A survey. Pattern Recognition Letters 28(14): 1885–1906.
Abdullayeva, F., Imamverdiyev, V. Musayev, and J. Wayman. 2008. Analysis of security vulnerabilities in biometrics systems. Proceedings of the Second International Conference on “Problems of Cybernetics and Informatics”, September 10–12, Baku, Azerbaijan. http://danishbiometrics.files.wordpress.com/2009/08/1-13.pdf. Accessed 30 Jan 2010.
Adler, A. 2004. Images can be reconstructed from quantized biometric match score data. Proceedings of the Canadian Conference on Electrical and Computer Engineering, Niagara Falls, 469–472.
Antonelli, A., R. Cappelli, D. Maio, et al. 2006. Fake finger detection by skin distortion analysis. IEEE Transactions on Information Forensics and Security 1: 360–373.
Australian Government. Introducing SmartGate. http://www.customs.gov.au/webdata/resources/files/BR_introSmrtGt0409.pdf. Accessed 30 Jan 2010.
Bangeman, E. 2009. Swiss privacy commissioner says “nein” to Google Street View. Ars technical. http://arstechnica.com/tech-policy/news/2009/08/swiss-privacy-commissioner-says-nein-to-google-street-view-swiss-privacy-commissioner-says-nein-to-google-street-view.ars. Accessed 30 Jan 2010.
Bender, S., and H. Postley. 2007. Key sequence rhythm recognition system and method. US Patent No. 7206938.
Bhanu, B., and H. Chen. 2008. Human ear recognition by computer. New York: Springer.
BioAPI Consort. http://www.bioapi.org. Accessed 30 Jan 2010.
Biometrics Market Intelligence. http://www.biometricsmi.com. Accessed 30 Jan 2010.
Biometrics.gov. Registry of USG recommended biometric standards. http://www.biometrics.gov/Standards/StandardsRegistry.pdf. Accessed 30 Jan 2010.
BioPrivacy Initiative. Best practices for privacy-sympathetic biometric deployment. http://www.bioprivacy.org. Accessed 30 Jan 2010.
Bowyer, K.W., K. Hollingsworth, and P.J. Flynn. 2008. Image understanding for iris biometrics: A survey. Computer Vision and Image Understanding 110(2): 281–307.
CBS News. Argentina forces dirty war orphans to provide DNA. http://www.cbsnews.com/stories/2009/11/21/ap/world/main5727307.shtml. Accessed 30 Jan 2010.
CJIS. Integrated automated fingerprint identification system or IAFIS. http://www.fbi.gov/hq/cjisd/iafis.htm. Accessed 30 Jan 2010.
Clarke, R. 2000. Beyond the OECD guidelines: Privacy protection for the 21st century. Roger Clarke’s Web-Site. http://www.rogerclarke.com/DV/PP21C.html. Accessed 30 Jan 2010.
Cohn, J.P. 2006. Keeping an eye on school security: The iris recognition project in New Jersey Schools. National Institute of Justice J, No. 254. http://www.ojp.usdoj.gov/nij/journals/254/iris_recognition.html. Accessed 30 Jan 2010.
Crihalmeanu, S., A. Ross, and R. Derakhshani. 2009. Enhancement and registration schemes for matching conjunctival vasculature. Proceedings of the 3rd IAPR/IEEE International Conference on Biometrics, Alghero, Italy.
Daugman, J., and I. Malhas. 2004. Iris recognition border-crossing system in the UAE. Biometrics. http://www.cl.cam.ac.uk/~jgd1000/UAEdeployment.pdf. Accessed 30 Jan 2010.
Denham, E. 2009. Findings under the personal information protection and electronic documents act (PIPEDA). Office of the Privacy Commissioner of Canada. http://www.priv.gc.ca/cf-dc/2009/2009_008_0716_e.cfm. Accessed 30 Jan 2010.
Department of Defense. Electronic biometric transmission specifications. http://www.biometrics.gov/Standards/DoD_ABIS_EBTS_v1.2.pdf. Accessed 30 Jan 2010.
Dewan, S.K. 2003. Elementary, Watson: Scan a palm, find a clue. The New York Times. http://www.nytimes.com. Accessed 30 Jan 2010.
DNA Fingerprint Identification. http://www.fingerprinting.com/dna-fingerprint-identification.php. Accessed 20 Feb 2010.
Doward, J. 2009. DNA tests for asylum seekers ‘deeply flawed’. guardian.co.uk. http://www.guardian.co.uk/world/2009/sep/20/asylum-seeker-dna-tests. Accessed 30 Jan 2010.
Draper, S.C., A. Khisti, E. Martinian, et al. 2007. Using distributed source coding to secure fingerprint biometrics. ICASSP, Hawaii, 129–132.
Drira H., B.B. Amor, M. Daoudi, and A. Srivastava. 2009. Nasal region contribution in 3D face biometrics using shape analysis framework. Proceedings of the 3rd IAPR/IEEE International Conference on Biometrics, Alghero, Italy, 357–366.
E-Channel. Immigration Department, Hong Kong. http://www.immd.gov.hk/ehtml/20041216.htm. Accessed 30 Jan 2010.
Editor. 2009. Iris at a distance not yet mature enough, says UAE. Biometric Technology Today 17(2): 1.
Falguera, J.R., F.P.S. Falguera, and A.N. Marana. 2008. Frontal sinus recognition for human identification. Proceedings of SPIE, vol. 6944, Orlando, FL, 69440S.
FANPIX.net. Barack Obama pictures. http://www.fanpix.net/gallery/barack-obama-pictures.htm. Accessed 30 Jan 2010.
Feng, Y.C., and P.C Yuen. 2006. Protecting face biometric data on smartcard and Reed-Soloman Code. Proceedings of CVPR Workshop on Biometrics, New York, 29.
Feng. J., and A.K. Jain. 2009. FM model based fingerprint reconstruction from minutiae template. Proceedings of ICB 2009, Alghero, Italy, 544–553.
Fingerprinting. History of fingerprinting. http://www.fingerprinting.com/history-of-fingerprinting.php. Accessed 30 Jan 2010.
Freire-Santos, M., J. Fierrez-Aguilar, and J. Ortega-Gracia. 2006. Cryptographic key generation using handwritten signature. Proceedings of SPIE Conference on Biometric Technologies for Human Identification, vol. 6202, Orlando, 225–231.
Grother, P., W. Salamon, C. Watson et al. 2009. MINEX II – Performance of match on card algorithms Phase II/III report. NIST Interagency Report 7477. http://fingerprint.nist.gov/minexII/minex_report.pdf. Accessed 30 Jan 2010.
Higaki, T. 2007 Quotes of the day. TIME. http://www.time.com/time/quotes/0,26174,1685967,00.html. Accessed 30 Jan 2010.
Hirobayashi, S., Y. Tamura, T. Yamabuchi, and T. Yoshizawa. 2007. Verification of individual identification method using bioelectric potential of plant during human walking. Japanese Journal of Applied Physics 46(4A): 1768–1773.
Hong, L. 1998. Automatic personal identification using fingerprints. PhD thesis. Michigan State University.
Hong Kong Immigration Department. Hong Kong immigration department annual report 2007–2008, 2009. http://www.immd.gov.hk/a_report_07-08/eng/chapter02/index.htm. Accessed 30 Jan 2010.
Hong Kong Post e-Cert. http://www.hongkongpost.gov.hk/index.html. Accessed 30 Jan 2010.
Indovina M., et al. 2009. ELFT Phase II-An Evaluation of Automated Latent Fingerprint Identification Technologies. NISTIR 7577.
Irvine, J.M., S.A. Israel, W.T. Scruggs, and W.J. Worek. 2008. Eigenpulse: Robust human identification from cardiovascular function. Pattern Recognition 41(11): 3427–3435.
Jain, A.K., and J. Feng. 2009. Latent palmprint matching. IEEE Transactions on Pattern Analysis and Machine Intelligence 31(6): 1032–1047.
Jain, A.K., and U. Park. 2009. Facial marks: Soft biometric for face recognition. Proceedings of the International Conference on Image Process, Cairo, Egypt.
Jain, A.K., S.C. Dass, and K. Nandakumar. 2004a. Can soft biometric traits assist user recognition? Proceedings of SPIE, vol. 5404, Biometric Technology for Human Identification, Orlando, 561–572.
Jain, A.K., S.C. Dass, and K. Nandakumar. 2004b. Soft biometric traits for personal recognition systems. Proceedings of International Conference on Biometric Authentication, Hong Kong, 731–738.
Jain, A.K., A. Ross, and S. Pankanti. 2006. Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security 1(2): 125–143.
Jain, A.K., P.J. Flynn, and A. Ross, eds. 2007. Handbook of biometrics. New York: Springer.
Jain, A.K., J. Feng, A. Nagar, K. Nandakumar. 2008a. On matching latent fingerprints. Proceedings of CVPR Workshop on Biometrics, Alaska, 1–8.
Jain, A.K., K. Nandakumar, and A. Nagar. 2008b. Biometric template security. EURASIP J Advances in Signal Processing, Special issue on Biometrics.
Joshi, A.J., S. Chandran, V.K. Jayaraman, and B.D. Kulkarni. 2008. Arterial pulse rate variability analysis for diagnoses. Proceedings of ICPR, Tampa, FL, 1–4.
Jules, A., and M. Sudan. 2002. A fuzzy vault scheme. Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 408.
Kellokumpu, V., G. Zhao, S.Z. Li, et al. 2009. Dynamic texture based gait recognition. Proceedings of the ICB 2009, Alghero, Italy, 1000–1009.
Kumar, A. 2008. Incorporating cohort information for reliable palmprint authentication. Proceeding of ICVGIP 2008, Bhubaneswar, 583–590.
Kumar, A., and A. Kumar. 2009. Development of a new cryptographic construct using palmprint based fuzzy vault. EURASIP Journal on Advances in Signal Processing 2009: 1–12. ASP/967046.
Kumar, A., and K.V. Prathyusha. 2009. Personal authentication using hand vein triangulation and knuckle shape. IEEE Transactions on Image Processing 38(9): 2127–2136.
Kumar, A., and Ch Ravikanth. 2009. Personal authentication using finger knuckle surface. IEEE Transactions on Information Forensics and Security 4(1): 98–110.
Kumar, A., and Y. Zhou. 2009. Human identification using knucklecodes. Proceeding of BTAS 2009, Washington, DC.
Kumar, A., V. Kanhangad, and D. Zhang. 2010. A new framework for adaptive multimodal biometrics management. IEEE Transactions on Information Security Forensics, available online (to appear).
LaCous, M.K. 2008. Match template protection within biometric security systems. US Patent No. 7454624.
Lee, H.C., and R.E. Gaensslen. 2001. Advances in fingerprint technology. Boca Raton: CRC Press.
Lee, Y.J., K. Bae, S.J. Lee, et al. 2007. Biometric key binding: Fuzzy vault based on iris images. Proceedings of the International Conference on Biometrics, Seoul, 800–808.
Lee, J.-E., A.K. Jain, and R. Jin. 2008. Scars, marks and tattoos (SMT): Soft biometric for suspect and victim identification. Proceedings of the Biometric Symposium, Biometric Consort Conference, Tampa, FL.
MacManus, R. 2009. Hong Kong’s octopus card: Utility outweighs privacy concerns. ReadWriteWeb. http://www.readwriteweb.com/archives/hong_kongs_octopus_card.php. Accessed 30 Jan 2010.
Matey, J.R., O. Naroditsky, K. Hanna, et al. 2006. Iris on the move: Acquisition of images for iris recognition in less constrained environments. Proceedings of the IEEE, vol. 94, 1936–1947.
Matey, J.R., D. Ackerman, J. Bergen, and M. Tinker. 2008. Iris recognition in less constrained environments. In Advances in biometrics sensors, algorithms and systems, ed. N.K. Ratha and V. Govindaraju, London: Springer, 107–131.
Médioni, G., J. Choi, C.-H. Kuo, and D. Fidaleo. 2009. Identifying noncooperative subjects at a distance using face images and infrared three-dimensional face models. IEEE Transactions on Systems, Man, Cybernetics. Part A: Systems and Humans 39(1): 12–24.
Mhatre, A., S. Palla, S. Chikkerur, et al. 2005. Efficient search and retrieval in biometric databases. Proceedings of SPIE Defense and Security Symposium, vol. 5779, 265–273.
MIS ASIA. HK privacy commissioner: Fingerprint collection excessive. http://www.mis-asia.com/news/articles/hk-privacy-commissioner-fingerprint-collection-excessive. Accessed 30 Jan 2010.
Nagar, A., and A.K. Jain. 2009. On the security of non-invertible fingerprint template transforms. Proceedings of the First IEEE International Workshop on Information Forensics & Security (WIFS 2009), London.
Nakajima, K., Y. Mizukami, K. Tanka, and T. Tamura. 2000. Footprint-based personal recognition. IEEE Transactions on Biomedical Engineering 47(11): 1534–1537.
Nakashima, E. 2007. FBI prepares vast database of biometrics. The Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2007/12/21/AR2007122102544.html. Accessed 30 Jan 2010.
Nandakumar, K., A.K. Jain, and A. Ross. 2009. Fusion in multibiometric identification systems: what about the missing data? Proceedings of the ICB, Alghero, Italy, 743–752.
NIST Report to the United States Congress. 2002. Summary of NIST standards for biometric accuracy, tamper resistance and interoperability.
NIST. Evaluation of Latent Fingerprint Technologies 2007. http://fingerprint.nist.gov/latent/elft07/. Accessed 30 Jan 2010.
NIST. National and international biometric standards. http://www.itl.nist.gov/div893/biometrics/standards.html. Accessed 30 Jan 2010.
NIST. Summary of NIST standards for biometric accuracy, tamper resistance, and interoperability. http://www.itl.nist.gov/iad/894.03/NISTAPP_Nov02.pdf. Accessed 30 Jan 2010.
NSTC. Biometrics history. http://www.biometrics.gov/Documents/BioHistory.pdf. Accessed 30 Jan 2010.
Nuffield Council on Bioethics. 2007. The forensics use of bioinformatics: Ethical issues. Cambridge/London: Cambridge Publishes.
Office of the Privacy Commissioner for Personal Data Protection. Privacy Commissioner Responds to Public Enquiries about the Issue of “Employer Collecting Employees’ Fingerprint Data for Attendance Purpose”. http://www.pcpd.org.hk/english/infocentre/press_20090716.html. Accessed 30 Jan 2010.
PalmSecure. http://www.fujitsu.com/us/services/biometrics/palm-vein. Accessed 20 Feb 2010.
Pankanti, S., S. Prabhakar, and A.K. Jain. 2002. On the individuality of fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(8): 1010–1025.
Park, U., A. Ross, and A.K. Jain. 2009. Periocular biometrics in the visible spectrum: A feasibility study. Proceedings of the BTAS, Washington, DC.
Pink Tentacle. Magazine photos fool age-verification cameras. http://pinktentacle.com/2008/06/magazine-photos-fool-age-verification-cameras. Accessed 30 Jan 2010.
Poh, N., R. Wong, J. Kittler, et al. 2009. Challenges and research directions for adaptive biometric recognition systems. Proceedings of the ICB, Alghero, Italy.
Printrak Division. Printrak LiveScan 4000 Ruggedized. http://www.morpho.com/MorphoTrak/PrinTrak/prnt_prod/pp_Ls-4000.html. Accessed 30 Jan 2010.
Privacy Commissioner of Hong Kong. Privacy commissioner responds to public enquiries about the issue of “Employer Collecting Employees’ Fingerprint Data for Attendance Purpose”. http://www.pcpd.org.hk/english/infocentre/press_20090716.html. Accessed 30 Jan 2010.
Proença, H., S. Filipe, R. Santos, J. Oliveira, and L.A. Alexandre. 2009. The UBIRIS.v2: A database of visible wavelength iris images captured on-the-move and at-a-distance. IEEE Transactions on Pattern Analysis and Machine Intelligence, available online (to appear).
PROnetworks. Face recognition cigarette vending machines. http://www.pronetworks.org/forums/face-recognition-cigarette-vending-machines-t102463.html. Accessed 30 Jan 2010.
Ramus, S.J., and H. Eichenbaum. 2000. Neural correlates of olfactory recognition memory in rat orbitofrontal cortex. Journal of Neuroscience 20: 8199–8208.
Ranger, S. 2006. Photos: Iris scanning at the airport. Silicon.com. http://www.silicon.com/management/public-sector/2006/04/13/photos-iris-scanning-at-the-airport-39158086/. Accessed 10 Oct 2009.
Ratha, N., J.H. Connell, and R.M. Bolle. 2001. An analysis of minutiae matching strengths. Proceedings of the International Conference on Audio and Video-based Biometric Authentication, Halmstad, Sweden, 223–228.
Reddy, P.V., A. Kumar, S.M.K. Rahman, and T.S. Mundra. 2008. A new antispoofing approach for biometric devices. IEEE Transactions on Biomedical Circuits and Systems 2(4): 284–293.
Rhodes, Henry T.F. 1956. Alphonse Bertillon, Father of scientific detection. New York: Abelard-Schuman.
Ross, A., K. Nandakumar, and A.K. Jain. 2006. Handbook of multibiometrics. New York: Springer.
Ross, A., J. Shah, and A.K. Jain. 2007. From templates to images: Reconstructing fingerprints from minutiae points. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4): 544–560.
Rowe, R.K., U. Uludag, M. Demirkus, et al. 2007. A multispectral whole-hand biometric authentication system. Proceedings of the Biometric Symposium, Biometric Consort Conference, Baltimore.
Schiphol. Fast border passage with iris scan. http://www.schiphol.nl/AtSchiphol/PriviumIrisscan/FastBorderPassageWithIrisScan.htm. Accessed 27 Sept 2009.
Serkan, T. 2009. Women uses tape to trick biometric airport fingerprint scan. CrunchGear. http://www.crunchgear.com/2009/01/02/woman-uses-tape-to-trick-biometric-airport-fingerprint-scan. Accessed 30 Jan 2010.
Shamir, L., S. Ling, S. Rahimi, L. Ferrucci, and I.G. Goldberg. 2009. Biometric identification using knee X-rays. International Journal of Biometrics 1(3): 365–370.
Singh, K. 2008. Altered fingerprints, Interpol report. INTERPOL. http://www.interpol.int/Public/Forensic/fingerprints/research/alteredfingerprints.pdf. Accessed 30 Jan 2010.
Singh, R., M. Vatsa, A. Ross, et al. 2009. Online learning in biometrics: A case study in face classifier update. Proceedings of the BTAS’2009, Washington, DC.
Song, S., K. Ohnuma, Z. Liu, L. Mei, A. Kawada, and T. Monma. 2009. Novel biometrics based on nose pore recognition. Optical Engineering 48(5): 57204.
South Wales Police. A history of fingerprinting. http://www.south-wales.police.uk/fe/master.asp?n1=8&n2=253&n3=1028. Accessed 30 Jan 2010.
Standing Committee 37 ISO Standards Development. http://isotc.iso.org/livelink/livelink?func=ll&objId=2262372&objAction=browse&sort=name. Accessed 30 Jan 2010.
Sun, Z., T. Tan, Y. Yang, et al. 2005. Ordinal palmprint representation for personal identification. Proceedings of CVPR 2005, San Diego, 279–284
Sun, Z., A. Paulino, J. Feng, Z. Chai, T. Tan, and A. K. Jain. 2010. A study of multibiometric traits of identical twins. Proceedings of the SPIE Biometrics, Florida.
Swabey, M.A., S.P. Beeby, A.D. Brown, and J.E. Chad. 2004. Using Otoacoustic emission as biometric. Proceedings of ICBA, Hong Kong, LNCS, vol. 3072, pp. 600–606.
Tabor, Z., D. Karpisz, L. Wojnar, and P. Kowalski. 2009. An automatic recognition of the frontal sinus in x-ray images of skull. IEEE Transactions on Biomedical Engineering 56(2): 361–368.
Tao, D., X. Li, X. Wu, et al. 2007. Analysis and gabor features for gait recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(10): 1700–1715.
Topping, A., V. Kuperschmidt, and A. Gormley. 1998. Method and apparatus for the automated identification of individuals by their beds of their fingernails. U.S. Patent No. 5751835.
Tronci, R., G. Giacinto, and F. Roli. 2007. Dynamic score selection for fusion of multiple biometric matchers. Proceedings of the 14th IEEE International Conference on Image Analysis and Processing, ICIAP, Modena, Italy, 15–20.
Tuyls, P., A.H.M. Akkermans, T.A.M. Kevenaar, et al. 2005. Practical biometric authentication with template protection. Proceedings of the 5th International Conference on Audio- and Video-based Biometric Person Authentication, Rye Town, NY, 436–446.
Uhl, A., and P. Wild. 2008. Footprint-based biometric verification. Journal of Electronic Imaging 17: 11016.
UIDAI. Creating a unique identity number for every resident in India (Working paper – version 1.1). http://uidai.gov.in. Accessed 30 Jan 2010.
UK Border Agency. Iris Recognition Immigration System (IRIS). http://www.ukba.homeoffice.gov.uk/managingborders/technology/iris. Accessed 30 Jan 2010.
Uludag, U., and A.K. Jain. 2006. Securing fingerprint template: Fuzzy vault with helper data. Proceedings of CVPR Workshop on Privacy Research in Vision, New York, 163.
University of Cambridge. John Daugman’s webpage. http://www.cl.cam.ac.uk/~jgd1000. Accessed 30 Jan 2010.
US Department of Homeland Security. New biometric technology improves security and facilitates U.S. entry process for international travelers. https://www.dhs.gov/xlibrary/assets/usvisit/usvisit_edu_10-fingerprint_consumer_friendly_content_1400_words.pdf. Accessed 30 Jan 2010.
Veeramachaneni, K., L.A. Osadciw, and P.K. Varshney. 2005. An adaptive multimodal biometric management algorithm. IEEE Transactions on Systems, Man, Cybernetics. Part C 35(3): 344–356.
Volokh, E. 2007. Religious freedom and DNA gathering. Volokh conspiracy or CNET news http://volokh.com/2007/02/26/religious-freedom-and-dna-gathering Feb. 2007 or http://news.cnet.com/Feds-out-for-hackers-blood/2100-7348_3-6151385.html. Accessed 30 Jan 2010.
Walt Disney World Resort. http://disneyworld.disney.go.com/. Accessed 30 Jan 2010.
Wayman, J.L., 1997. Large-scale civilian biometric systems - issues and feasibility. Proceedings of the CardTech/SecureTech Government, Washington DC, http://www.engr.sjsu.edu/biometrics/nbtccw.pdf. Accessed 30 Jan 2010.
Wickins, J. 2007. The ethics of biometrics: The risk of social exclusion from the widespread use of electronic identification. Science and Engineering Ethics 13: 45–54.
Woodard, D.L., and P.J. Flynn. 2005. Finger surface as a biometric identifier. Computer Vision and Image Understanding 100(3): 357–384.
Yan, P., and K.W. Bowyer. 2007. Biometric recognition using 3D ear shape. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(8): 1297–1308.
Zhang, D., W.K. Kong, J. You, et al. 2003. Online palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(9): 1041–1050.
Acknowledgement
The authors thankfully acknowledge Dr. Jianjiang Feng, Tsinghua University, Dr. Salil Prabhakar, DigitalPersona, Dr. Karthik Nandakumar, Institute for Infocomm Research (I2R), and Abhishek Nagar, Michigan State University for their constructive comments and suggestions. Part of Anil Jain’s research was supported by WCU(World Class University) program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (R31-10008).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Jain, A.K., Kumar, A. (2012). Biometric Recognition: An Overview. In: Mordini, E., Tzovaras, D. (eds) Second Generation Biometrics: The Ethical, Legal and Social Context. The International Library of Ethics, Law and Technology, vol 11. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-3892-8_3
Download citation
DOI: https://doi.org/10.1007/978-94-007-3892-8_3
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-3891-1
Online ISBN: 978-94-007-3892-8
eBook Packages: Humanities, Social Sciences and LawPhilosophy and Religion (R0)