Biometric security technology

This paper presents an overview of the main topics related to biometric security technology, with the central purpose to provide a primer on this subject. Biometrics can offer greater security and convenience than traditional methods for people recognition. Even if we do not want to replace a classic method (password or handheld token) by a biometric one, for sure, we are potential users of these systems, which will even be mandatory for new passport models. For this reason, it is useful to be familiarized with the possibilities of biometric security technology

[1]  Alvin F. Martin,et al.  The NIST 1999 Speaker Recognition Evaluation - An Overview , 2000, Digit. Signal Process..

[2]  Risto Rajala,et al.  Channel Choices and Revenue Logics of Software Companies Developing Mobile Games , 2003 .

[3]  Sadaoki Furui,et al.  Digital Speech Processing, Synthesis, and Recognition , 1989 .

[4]  David Zhang,et al.  Automated Biometrics: Technologies and Systems , 2000 .

[5]  M. Faundez-Zanuy,et al.  On the vulnerability of biometric security systems , 2004, IEEE Aerospace and Electronic Systems Magazine.

[6]  M. Faundez-Zanuy,et al.  Data fusion in biometrics , 2005, IEEE Aerospace and Electronic Systems Magazine.

[7]  M. Faundez-Zanuy Biometric recognition: why not massively adopted yet? , 2005, IEEE Aerospace and Electronic Systems Magazine.

[8]  Alvin F. Martin,et al.  The DET curve in assessment of detection task performance , 1997, EUROSPEECH.

[9]  Marcos Faundez-Zanuy Technological evaluation of two AFIS systems , 2005, IEEE Aerospace and Electronic Systems Magazine.

[10]  M. Faundez-Zanuy Signature recognition state-of-the-art , 2005, IEEE Aerospace and Electronic Systems Magazine.

[11]  Shaohua Kevin Zhou,et al.  Face Recognition Using More than One Still Image: What Is More? , 2004, SINOBIOMETRICS.

[12]  Vijayan Sugumaran Intelligent Information Technologies: Concepts, Methodologies, Tools and Applications , 2007 .

[13]  David Chandler,et al.  Biometric Product Testing Final Report , 2001 .

[14]  Christian Sebastian Loh Designing Online Games Assessment as : Information Trails , 2007 .

[15]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[16]  M. Faundez-Zanuy,et al.  Testing report of a fingerprint-based door-opening system , 2005, IEEE Aerospace and Electronic Systems Magazine.

[17]  Hong Chang,et al.  SVC2004: First International Signature Verification Competition , 2004, ICBA.

[18]  M. Faundez-Zanuy Are inkless fingerprint sensors suitable for mobile use? , 2004, IEEE Aerospace and Electronic Systems Magazine.

[19]  Marcos Faundez-Zanuy Privacy Issues on Biometric Systems , 2005 .

[20]  M. Faundez-Zanuy A door-opening system using a low-cost fingerprint scanner and a PC , 2004, IEEE Aerospace and Electronic Systems Magazine.

[21]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[22]  M. Faundez-Zanuy,et al.  State-of-the-art in speaker recognition , 2005, IEEE Aerospace and Electronic Systems Magazine.

[23]  Marcos Faúndez-Zanuy,et al.  Biometric Identification by Means of Hand Geometry and a Neural Net Classifier , 2005, IWANN.

[24]  古井 貞煕,et al.  Digital speech processing, synthesis, and recognition , 1989 .

[25]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[26]  V. Sugumaran The Inaugural Issue of the International Journal of Intelligent Information Technologies , 2005 .

[27]  Safaai Deris,et al.  Combining Artificial Neural Networks and GOR-V Information Theory to Predict Protein Secondary Structure from Amino Acid Sequences , 2005, Int. J. Intell. Inf. Technol..

[28]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[29]  Roger Clarke,et al.  Human Identification in Information Systems , 1994 .

[30]  Peter W. Hallinan Recognizing human eyes , 1991, Optics & Photonics.

[31]  J. L. Wayman,et al.  Best practices in testing and reporting performance of biometric devices. , 2002 .