50 years of biometric research: Accomplishments, challenges, and opportunities

Biometric recognition refers to the automated recognition of individuals based on their biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first scientific paper on automated fingerprint matching was published by Mitchell Trauring in the journal Nature in 1963. The first objective of this paper is to document the significant progress that has been achieved in the field of biometric recognition in the past 50 years since Trauring’s landmark paper. This progress has enabled current stateof-the-art biometric systems to accurately recognize individuals based on biometric trait(s) acquired under controlled environmental conditions from cooperative users. Despite this progress, a number of challenging issues continue to inhibit the full potential of biometrics to automatically recognize humans. The second objective of this paper is to enlist such challenges, analyze the solutions proposed to overcome them, and highlight the research opportunities in this field. One of the foremost challenges is the design of robust algorithms for representing and matching biometric samples obtained from uncooperative subjects under unconstrained environmental conditions (e.g., recognizing faces in a crowd). In addition, fundamental questions such as the distinctiveness and persistence of biometric traits need greater attention. Problems related to the security of biometric data and robustness of the biometric system against spoofing and obfuscation attacks, also remain unsolved. Finally, larger system-level issues like usability, user privacy concerns, integration with the end application, and return on investment have not been adequately addressed. Unlocking the full potential of biometrics through inter-disciplinary research in the above areas will not only lead to widespread adoption of this promising technology, but will also result in wider user acceptance and societal impact. © 2016 Published by Elsevier B.V.

[1]  Alphonse Bertillon,et al.  Signaletic instructions including the theory and practice of anthropometrical identification , 2022 .

[2]  A. F. Adams,et al.  The Survey , 2021, Dyslexia in Higher Education.

[3]  S. Pruzansky Pattern‐Matching Procedure for Automatic Talker Recognition , 1963 .

[4]  MITCHELL TRAURING,et al.  Automatic Comparison of Finger-Ridge Patterns , 1963, Nature.

[5]  Lawrence G. Roberts,et al.  Machine Perception of Three-Dimensional Solids , 1963, Outstanding Dissertations in the Computer Sciences.

[6]  金出 武雄,et al.  Picture processing system by computer complex and recognition of human faces , 1974 .

[7]  L Sirovich,et al.  Low-dimensional procedure for the characterization of human faces. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[8]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[9]  W. Babler Embryologic development of epidermal ridges and their configurations. , 1991, Birth defects original article series.

[10]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[11]  M. Bannier [Aging of the face]. , 1993, Soins. Chirurgie.

[12]  Penio S. Penev,et al.  Local feature analysis: A general statistical theory for object representation , 1996 .

[13]  Norbert Krüger,et al.  Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.

[14]  David J. Kriegman,et al.  Recognition using class specific linear projection , 1997 .

[15]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[16]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[17]  David R. Ashbaugh,et al.  Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology , 1999 .

[18]  Sharath Pankanti,et al.  A Prototype Hand Geometry-based Verication System , 1999 .

[19]  A. Barrett,et al.  Crime and Punishment in England: A Sourcebook , 2001 .

[20]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[21]  Sharath Pankanti,et al.  On the similarity of identical twin fingerprints , 2002, Pattern Recognit..

[22]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[23]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[24]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[25]  L. Weathered The innocence project , 2003 .

[26]  Thomas Vetter,et al.  Face Recognition Based on Fitting a 3D Morphable Model , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[27]  Lawrence O'Gorman,et al.  Innovations in fingerprint capture devices , 2003, Pattern Recognit..

[28]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[29]  Nilanjan Ray,et al.  Pattern Recognition Letters , 1995 .

[30]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[31]  Craig I. Watson,et al.  Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report , 2004 .

[32]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[33]  Arun Ross,et al.  Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..

[34]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.

[35]  Stephanie Schuckers,et al.  Time-series detection of perspiration as a liveness test in fingerprint devices , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[36]  Robert K. Rowe,et al.  Multispectral fingerprint imaging for spoof detection , 2005, SPIE Defense + Commercial Sensing.

[37]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[38]  Dario Maio,et al.  Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.

[39]  Rudolf Hauke,et al.  The Surround ImagerTM: A Multi-camera Touchless Device to Acquire 3D Rolled-Equivalent Fingerprints , 2006, ICB.

[40]  Karl Ricanek,et al.  MORPH: a longitudinal image database of normal adult age-progression , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[41]  John Daugman,et al.  Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.

[42]  Kang Ryoung Park,et al.  Fake Iris Detection by Using Purkinje Image , 2006, ICB.

[43]  Shengcai Liao,et al.  Illumination Invariant Face Recognition Using Near-Infrared Images , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[44]  James L. Wayman The scientific development of biometrics over the last 40 years , 2007 .

[45]  Anil K. Jain,et al.  Statistical Models for Assessing the Individuality of Fingerprints , 2005, IEEE Transactions on Information Forensics and Security.

[46]  Christophe Champod,et al.  Computation of Likelihood Ratios in Fingerprint Identification for Configurations of Any Number of Minutiæ , 2007, Journal of forensic sciences.

[47]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[48]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[49]  Mark R. Hawthorne Fingerprints: Analysis and Understanding , 2008 .

[50]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[51]  Elke Greifender,et al.  The History of Information Security: A Comprehensive Handbook , 2008 .

[52]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.

[53]  R. Chellappa,et al.  Age progression in Human Faces : A Survey , 2008 .

[54]  Karim Faez,et al.  Human Identification Based on Gait , 2008 .

[55]  Bruce A. Draper,et al.  A meta-analysis of face recognition covariates , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[56]  Nicolae Duta,et al.  A survey of biometric technology based on hand shape , 2009, Pattern Recognit..

[57]  Patrick J. Flynn,et al.  Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches , 2009, ICB.

[58]  David Zhang,et al.  A survey of palmprint recognition , 2009, Pattern Recognit..

[59]  Carlos D. Castillo,et al.  Fake Finger Detection , 2009, Encyclopedia of Biometrics.

[60]  Bruce A. Draper,et al.  Factors that influence algorithm performance in the Face Recognition Grand Challenge , 2009, Comput. Vis. Image Underst..

[61]  George W. Quinn,et al.  ELFT phase II :: an evaluation of automated latent fingerprint identification technologies , 2009 .

[62]  Allen Y. Yang,et al.  Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[63]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition, Second Edition , 2009 .

[64]  Yun Fu,et al.  Age Synthesis and Estimation via Faces: A Survey , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[65]  Rishi Gupta,et al.  Iris Recognition System , 2010 .

[66]  Tomoyuki Suzuki,et al.  Challenges of image-sensor development , 2010, 2010 IEEE International Solid-State Circuits Conference - (ISSCC).

[67]  Yiying Tong,et al.  Age-Invariant Face Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[68]  Dileepan Joseph,et al.  Toward a digital camera to rival the human eye , 2011, J. Electronic Imaging.

[69]  Sistema político,et al.  Unique Identification Authority of India , 2011 .

[70]  A. Zoubir,et al.  EURASIP Journal on Advances in Signal Processing , 2011 .

[71]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[72]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[73]  Arun Ross,et al.  Periocular Biometrics in the Visible Spectrum , 2011, IEEE Transactions on Information Forensics and Security.

[74]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[75]  Anil K. Jain,et al.  Altered Fingerprints: Analysis and Detection , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[76]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[77]  George W. Quinn,et al.  IREX III: Performance of Iris Identification Algorithms , 2012 .

[78]  Anil K. Jain,et al.  Face Recognition Performance: Role of Demographic Information , 2012, IEEE Transactions on Information Forensics and Security.

[79]  Sander Oude Elberink,et al.  Accuracy and Resolution of Kinect Depth Data for Indoor Mapping Applications , 2012, Sensors.

[80]  Arun Ross,et al.  Can facial cosmetics affect the matching accuracy of face recognition systems? , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[81]  Vinay Bettadapura,et al.  Face Expression Recognition and Analysis: The State of the Art , 2012, ArXiv.

[82]  Vincent M. Stanford,et al.  The 2021 NIST Speaker Recognition Evaluation , 2022, Odyssey.

[83]  Anil K. Jain,et al.  A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects , 2013 .

[84]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[85]  Takayuki Yamada,et al.  Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity , 2013, Communications and Multimedia Security.

[86]  Ramesh Govindan,et al.  P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.

[87]  Paul Rayson,et al.  Who Am I? Analyzing Digital Personas in Cybercrime Investigations , 2013, Computer.

[88]  Arun Ross,et al.  A survey on ear biometrics , 2013, CSUR.

[89]  George W. Quinn,et al.  IREX VI : Temporal Stability of Iris Recognition Accuracy , 2013 .

[90]  Xiaogang Wang,et al.  Deep Learning Face Representation from Predicting 10,000 Classes , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[91]  Stan Z. Li,et al.  Handbook of Biometric Anti-Spoofing , 2014, Advances in Computer Vision and Pattern Recognition.

[92]  Ben D. Sawyer,et al.  Google Glass , 2014, Hum. Factors.

[93]  Anil K. Jain,et al.  Recognizing infants and toddlers using fingerprints: Increasing the vaccination coverage , 2014, IEEE International Joint Conference on Biometrics.

[94]  Ming Yang,et al.  DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[95]  Arun Ross,et al.  A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .

[96]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[97]  Anil K. Jain,et al.  Longitudinal study of fingerprint recognition , 2015, Proceedings of the National Academy of Sciences.

[98]  Arun Ross,et al.  What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.

[99]  Arun Ross,et al.  50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..