IBM research report: Biometrics 101

There is much interest in the use of biometrics for verification, identification, and ”screening” applications, collectively called biometric authentication. This interest has been heightened because of the threat of terrorism. Biometric authentication systems offer advantages over systems based on knowledge or possession such as unsupervised (legacy) authentication systems based on password/PIN and supervised (legacy) authentication systems based on driver’s licences and passports. The most important advantage is increased security: when a person is authenticated based on a biometric, the probability that this person is the originally enrolled person can be statistically estimated or computed in some other way. When a person is authenticated based on a password or even based on human observation, no such probabilities can be determined. Of course, the mere capability to compute this probability is not sufficient, what is needed is that the probability of correct authentication is high and the error probabilities are low. Achieving this probabilistic linking by introducing biometrics in authentication systems brings along many design choices and may introduce additional security loopholes. This document studies the many aspects of biometric applications that are an issue even before a particular biometrics has been selected; it further studies many issues that are associated with the currently popular biometric identifiers, namely, finger, face, voice, iris, hand (geometry) and signature.

[1]  Kari Karhunen,et al.  Über lineare Methoden in der Wahrscheinlichkeitsrechnung , 1947 .

[2]  M. Loève Probability theory : foundations, random sequences , 1955 .

[3]  Takeo Kanade,et al.  Picture Processing System by Computer Complex and Recognition of Human Faces , 1974 .

[4]  King-Sun Fu,et al.  A syntactic approach to fingerprint pattern recognition , 1975, Pattern Recognit..

[5]  Azriel Rosenfeld,et al.  Computer Detection of Freehand Forgeries , 1977, IEEE Transactions on Computers.

[6]  James R Young,et al.  Automatic Palmprint Verification Study. , 1981 .

[7]  Dana H. Ballard,et al.  Computer Vision , 1982 .

[8]  M. K. Nistsparrow,et al.  A Topological Approach to the Matching of Single Fingerprints: Development of Algorithms for Use on Rolled Impressions , 1985 .

[9]  Editors , 1986, Brain Research Bulletin.

[10]  King-Sun Fu,et al.  A Tree System Approach for Fingerprint Pattern Recognition , 1976, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  T. K. Worthington,et al.  IBM dynamic signature verification , 1986, Comput. Secur..

[12]  Safwat G. Zaky,et al.  Fingerprint identification using graph matching , 1986, Pattern Recognit..

[13]  L Sirovich,et al.  Low-dimensional procedure for the characterization of human faces. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[14]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[15]  Réjean Plamondon,et al.  Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..

[16]  J. P. Holmes,et al.  A performance evaluation of biometric identification devices , 1990 .

[17]  Lawrence Sirovich,et al.  Application of the Karhunen-Loeve Procedure for the Characterization of Human Faces , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[18]  James J. Clark,et al.  Data Fusion for Sensory Information Processing Systems , 1990 .

[19]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[20]  Ashok Samal,et al.  Automatic recognition and analysis of human faces and facial expressions: a survey , 1992, Pattern Recognit..

[21]  Regina Y. Liu Moving blocks jackknife and bootstrap capture weak dependence , 1992 .

[22]  C. I. Watson,et al.  NIST Special Database 10 , 1993 .

[23]  Roberto Brunelli,et al.  Face Recognition: Features Versus Templates , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[24]  Robert R. Moeller,et al.  Network Security , 1993, Inf. Secur. J. A Glob. Perspect..

[25]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[26]  Roger Clarke,et al.  Human Identification in Information Systems , 1994 .

[27]  Rama Chellappa,et al.  Human and machine recognition of faces: a survey , 1995, Proc. IEEE.

[28]  Anil K. Jain,et al.  Adaptive flow orientation-based feature extraction in fingerprint images , 1995, Pattern Recognit..

[29]  Gabriel Taubin,et al.  VeggieVision: a produce recognition system , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.

[30]  Bahram Javidi,et al.  Position‐invariant two‐dimensional image correlation using a one‐dimensional space integrating optical processor: application to security verification , 1996 .

[31]  J. S. Ahrens,et al.  Laboratory evaluation of the IriScan prototype biometric identifier , 1996 .

[32]  D. A. Reynolds,et al.  The effects of handset variability on speaker recognition performance: experiments on the Switchboard corpus , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[33]  Nicholas J. Phillips,et al.  Holographic optical element for compact fingerprint imaging system , 1996, Electronic Imaging.

[34]  Christoph von der Malsburg,et al.  Recognizing Faces by Dynamic Link Matching , 1996, NeuroImage.

[35]  Nalini K. Ratha,et al.  Smartcard Based Authentication , 1996 .

[36]  Juergen Luettin,et al.  Speaker identification by lipreading , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.

[37]  Juyang Weng,et al.  Using Discriminant Eigenfeatures for Image Retrieval , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[38]  Aaron E. Rosenberg,et al.  Speaker background models for connected digit password speaker verification , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[39]  Robert S. Germain,et al.  Large Scale Systems , 1996 .

[40]  Toby Berger,et al.  Reliable On-Line Human Signature Verification Systems , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[41]  Anil K. Jain,et al.  On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[42]  Francine J. Prokoski,et al.  Infrared Identification of Faces and Body Parts , 1996 .

[43]  Anil K. Jain,et al.  A Real-Time Matching System for Large Fingerprint Databases , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[44]  Christopher M. Brislawn,et al.  FBI compression standard for digitized fingerprint images , 1996, Optics & Photonics.

[45]  Hyeonjoon Moon,et al.  The FERET September 1996 Database and Evaluation Procedure , 1997, AVBPA.

[46]  Sadaoki Furui,et al.  Speaker recognition , 1997, Scholarpedia.

[47]  Dario Maio,et al.  Direct Gray-Scale Minutiae Detection In Fingerprints , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[48]  Larry P. Heck,et al.  Handset-dependent background models for robust text-independent speaker recognition , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[49]  Jiri Matas,et al.  Lip-shape Dependent Face Verification , 1997, AVBPA.

[50]  Sadaoki Furui,et al.  Recent advances in speaker recognition , 1997, Pattern Recognit. Lett..

[51]  Al Ranalli,et al.  Fingerprint matching via spatial correlation with regional coherence , 1997, Defense + Security Symposium.

[52]  S. Iyengar,et al.  Multi-Sensor Fusion: Fundamentals and Applications With Software , 1997 .

[53]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[54]  V. S. Nalwa Automatic on-line signature verification , 1997 .

[55]  Douglas A. Reynolds,et al.  Comparison of background normalization methods for text-independent speaker verification , 1997, EUROSPEECH.

[56]  Nicole Vincent,et al.  Handwriting and signature: one or two personality identifiers? , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[57]  Homayoon S. M. Beigi,et al.  Ibm Model-Based And Frame-By-Frame Speaker-Recognition , 1998 .

[58]  Danny Roberge,et al.  High-Speed Fingerprint Verification Using an Optical Correlator , 1998 .

[59]  Pietro Perona,et al.  Camera-Based ID Verification by Signature Tracking , 1998, ECCV.

[60]  J.G.A. Dolfing,et al.  Handwriting recognition and verification : a hidden Markov approach , 1998 .

[61]  R. Sproat,et al.  Multilingual text-to-speech synthesis : the Bell Labs approach , 1998 .

[62]  Douglas A. Reynolds,et al.  SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .

[63]  Timothy F. Cootes,et al.  Interpreting face images using active appearance models , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.

[64]  K. Goser,et al.  A low-power and high-performance CMOS fingerprint sensing and encoding architecture , 1998, Proceedings of the 24th European Solid-State Circuits Conference.

[65]  Alvin F. Martin,et al.  The 1999 NIST speaker recognition evaluation, using summed two-channel telephone data for speaker detection and speaker tracking , 1999, EUROSPEECH.

[66]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[67]  Roy Huber,et al.  Handwriting Identification: Facts and Fundamentals , 1999 .

[68]  Alessandra Lumini,et al.  Fingerprint Classification by Directional Image Partitioning , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[69]  Anil K. Jain,et al.  A Multichannel Approach to Fingerprint Classification , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[70]  T. Grycewicz Techniques to improve binary joint transform correlator performance for fingerprint recognition , 1999 .

[71]  Sharath Pankanti,et al.  FingerCode: a filterbank for fingerprint representation and matching , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[72]  Sharath Pankanti,et al.  A Prototype Hand Geometry-based Verication System , 1999 .

[73]  Andrew W. Senior,et al.  Recognizing faces in broadcast video , 1999, Proceedings International Workshop on Recognition, Analysis, and Tracking of Faces and Gestures in Real-Time Systems. In Conjunction with ICCV'99 (Cat. No.PR00378).

[74]  Danny Roberge,et al.  Optimal trade-off filter for the correlation of fingerprints , 1999 .

[75]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[76]  A. Winsor Sampling techniques. , 2000, Nursing times.

[77]  Catherine J. Tilton An Emerging Biometric API Industry Standard , 2000, Computer.

[78]  Chitra Dorai,et al.  Detecting dynamic behavior in compressed fingerprint videos: distortion , 2000, Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662).

[79]  J. W. Koolwaaij,et al.  Automatic speaker verification in telephony: a probabilistic approach , 2000 .

[80]  Nalini K. Ratha,et al.  Robust fingerprint authentication using local structural similarity , 2000, Proceedings Fifth IEEE Workshop on Applications of Computer Vision.

[81]  Sharath Pankanti,et al.  Evaluation techniques for biometrics-based authentication systems (FRR) , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[82]  Y. Hamamoto,et al.  A Gabor filter-based method for fingerprint identification , 2000 .

[83]  Sung-Hyuk Cha,et al.  Individuality of handwriting: a validation study , 2001, Proceedings of Sixth International Conference on Document Analysis and Recognition.

[84]  John Berry,et al.  History and Development of Fingerprinting , 2001 .

[85]  Henry C. Lee,et al.  Identification of Latent Prints , 2001 .

[86]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[87]  Stéphane H. Maes,et al.  Conversational Speech Biometrics , 2001, E-Commerce Agents.

[88]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[89]  H. P. Graf,et al.  Sample-based synthesis of talking heads , 2001, Proceedings IEEE ICCV Workshop on Recognition, Analysis, and Tracking of Faces and Gestures in Real-Time Systems.

[90]  David Chandler,et al.  Biometric Product Testing Final Report , 2001 .

[91]  Sridha Sridharan,et al.  Trainable speech synthesis with trended hidden Markov models , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[92]  Andrew W. Senior,et al.  A Combination Fingerprint Classifier , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[93]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[94]  J. L. Wayman,et al.  Best practices in testing and reporting performance of biometric devices. , 2002 .

[95]  Sharath Pankanti,et al.  On the Individuality of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[96]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..