Biometrics of next Generation: an Overview 1.1 Introduction

Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications such as national ID cards, border crossings, government benefits, and access control. As a result, biometric recognition, or simply biometrics, which is based on physiological and behavioural characteristics of a person, is being increasingly adopted and mapped to rapidly growing person identification applications. Unlike credentials (documents and PIN), biometric traits (e.g., fingerprint, face, and iris) cannot be lost, stolen, or easily forged; they are also considered to be persistent and unique. Use of biometrics is not new; fingerprints have been successfully used for over one hundred years in law enforcement and forensics to identify and apprehend criminals. But, as biometrics permeates our society, this recognition technology faces new challenges. The design and suitability of biometric technology for person identification depends on the application requirements. These requirements are typically specified in terms of identification accuracy, throughput, user acceptance, system security, robustness, and return on investment. The next generation biometric technology must overcome many hurdles and challenges to improve the recognition accuracy. These include ability to handle poor quality and incomplete data, achieve scalability to accommodate hundreds of millions of users, ensure interoperability, and protect user privacy while reducing system cost and enhancing system integrity. This chapter presents an overview of biometrics, some of the emerging biometric technologies and their limitations, and examines future challenges. 1.

[1]  Venu Govindaraju,et al.  Efficient search and retrieval in biometric databases , 2005, SPIE Defense + Commercial Sensing.

[2]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[3]  Jeremy Wickins,et al.  The ethics of biometrics: the risk of social exclusion from the widespread use of electronic identification , 2007, Sci. Eng. Ethics.

[4]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[5]  Josef Kittler,et al.  Challenges and Research Directions for Adaptive Biometric Recognition Systems , 2009, ICB.

[6]  Jeffrey P. Cohn,et al.  Keeping an Eye on School Security: The Iris Recognition Project in New Jersey Schools: (538032006-003) , 2006 .

[7]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[8]  Anil K. Jain,et al.  Facial marks: Soft biometric for face recognition , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[9]  Lior Shamir,et al.  Biometric identification using knee X-rays , 2009, Int. J. Biom..

[10]  Luís A. Alexandre,et al.  The UBIRIS.v2: A Database of Visible Wavelength Iris Images Captured On-the-Move and At-a-Distance , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[12]  Kazuhiko Ohnuma,et al.  Novel biometrics based on nose pore recognition , 2009 .

[13]  S. Rahman,et al.  A New Antispoofing Approach for Biometric Devices , 2008, IEEE Transactions on Biomedical Circuits and Systems.

[14]  Dario Maio,et al.  Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.

[15]  Ajay Kumar,et al.  Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..

[16]  Andrea F. Abate,et al.  2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..

[17]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[18]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[19]  Yusuke Tamura,et al.  Verification of Individual Identification Method Using Bioelectric Potential of Plant during Human Walking , 2007 .

[20]  SUMMARY OF NIST STANDARDS FOR BIOMETRIC ACCURACY, TAMPER RESISTANCE, AND INTEROPERABILITY , 2002 .

[21]  Nicolas Thériault,et al.  Human Ear Recognition , 2011, Encyclopedia of Cryptography and Security.

[22]  Pramod K. Varshney,et al.  An adaptive multimodal biometric management algorithm , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[23]  J. Wayman,et al.  ANALYSIS OF SECURITY VULNERABILITIES IN BIOMETRIC SYSTEMS , 2009 .

[24]  Matti Pietikäinen,et al.  Dynamic Texture Based Gait Recognition , 2009, ICB.

[25]  Anil K. Jain,et al.  Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.

[26]  Anil K. Jain,et al.  Periocular biometrics in the visible spectrum: A feasibility study , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[27]  James R. Bergen,et al.  Iris Recognition in Less Constrained Environments , 2008 .

[28]  R. Pearl Biometrics , 1914, The American Naturalist.

[29]  Kang Ryoung Park,et al.  Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.

[30]  Ajay Kumar,et al.  Personal Authentication Using Hand Vein Triangulation and Knuckle Shape , 2009, IEEE Transactions on Image Processing.

[31]  Andreas Uhl,et al.  Footprint-based biometric verification , 2008, J. Electronic Imaging.

[32]  John Daugman,et al.  IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE , 2004 .

[33]  Pong C. Yuen,et al.  Protecting Face Biometric Data on Smartcard with Reed-Solomon Code , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[34]  H Eichenbaum,et al.  Neural Correlates of Olfactory Recognition Memory in the Rat Orbitofrontal Cortex , 2000, The Journal of Neuroscience.

[35]  Ajay Kumar,et al.  Incorporating Cohort Information for Reliable Palmprint Authentication , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.

[36]  W. Todd Scruggs,et al.  eigenPulse: Robust human identification from cardiovascular function , 2008, Pattern Recognit..

[37]  Anil K. Jain,et al.  Latent Palmprint Matching , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[38]  David Zhang,et al.  Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[39]  Xuelong Li,et al.  General Tensor Discriminant Analysis and Gabor Features for Gait Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[40]  J. Fierrez-Aguilar,et al.  Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.

[41]  Leszek Wojnar,et al.  An Automatic Recognition of the Frontal Sinus in X-Ray Images of Skull , 2009, IEEE Transactions on Biomedical Engineering.

[42]  Sharath Pankanti,et al.  On the individuality fingerprints , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[43]  Bhaskar D. Kulkarni,et al.  Arterial Pulse Rate Variability analysis for diagnoses , 2008, 2008 19th International Conference on Pattern Recognition.

[44]  Aparecido Nilceu Marana,et al.  Frontal sinus recognition for human identification , 2008, SPIE Defense + Commercial Sensing.

[45]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[46]  Richa Singh,et al.  Online learning in biometrics: A case study in face classifier update , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[47]  Tieniu Tan,et al.  A study of multibiometric traits of identical twins , 2010, Defense + Commercial Sensing.

[48]  James R. Matey,et al.  Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments , 2006, Proceedings of the IEEE.

[49]  Stark C. Draper,et al.  Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[50]  D. M. Hutton Advances in Biometrics: Sensors, Algorithms and Systems , 2008 .

[51]  A.K. Jain,et al.  Scars, marks and tattoos (SMT): Soft biometric for suspect and victim identification , 2008, 2008 Biometrics Symposium.

[52]  Anil K. Jain,et al.  On matching latent fingerprints , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[53]  Fabio Roli,et al.  Dynamic Score Selection for Fusion of Multiple Biometric Matchers , 2007, 14th International Conference on Image Analysis and Processing (ICIAP 2007).

[54]  Jongmoo Choi,et al.  Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred Three-Dimensional Face Models , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[55]  Anil K. Jain,et al.  FM Model Based Fingerprint Reconstruction from Minutiae Template , 2009, ICB.

[56]  Ping Yan,et al.  Biometric Recognition Using 3D Ear Shape , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[57]  George W. Quinn,et al.  ELFT phase II :: an evaluation of automated latent fingerprint identification technologies , 2009 .

[58]  Arun Ross,et al.  Fusion in Multibiometric Identification Systems: What about the Missing Data? , 2009, ICB.

[59]  Hui Chen,et al.  Human Ear Recognition by Computer , 2008, Advances in Pattern Recognition.

[60]  Patrick J. Flynn,et al.  Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..

[61]  Anil K. Jain,et al.  Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.

[62]  Anil K. Jain,et al.  Automatic personal identification using fingerprints , 1998 .

[63]  Hassen Drira,et al.  Nasal Region Contribution in 3D Face Biometrics Using Shape Analysis Framework , 2009, ICB.

[64]  Damon L. Woodard,et al.  Finger surface as a biometric identifier , 2005, Comput. Vis. Image Underst..

[65]  David Zhang,et al.  A New Framework for Adaptive Multimodal Biometrics Management , 2010, IEEE Transactions on Information Forensics and Security.

[66]  Ajay Kumar,et al.  Personal Authentication Using Finger Knuckle Surface , 2009, IEEE Transactions on Information Forensics and Security.

[67]  Anil K. Jain,et al.  On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[68]  S. Marginson,et al.  The Immigration Department , 2022, Administrative Law in Action.

[69]  Arun Ross,et al.  Enhancement and Registration Schemes for Matching Conjunctival Vasculature , 2009, ICB.

[70]  Kanya Tanaka,et al.  Footprint-based personal recognition , 2000, IEEE Transactions on Biomedical Engineering.

[71]  Ajay Kumar,et al.  Human identification using KnuckleCodes , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[72]  Anil K. Jain,et al.  A Multispectral Whole-Hand Biometric Authentication System , 2007, 2007 Biometrics Symposium.

[73]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.