Biometric recognition: how do I know who you are?

Reliable personal recognition is critical to many business processes. Conventional knowledge-based and token-based methods do not really provide positive personal recognition because they rely on surrogate representations of the person's identity (e.g., exclusive knowledge or possession). It is, thus, obvious that any system assuring reliable personal recognition must necessarily involve a biometric component. This is not, however, to state that biometrics alone can deliver a reliable personal recognition component. In fact, a sound system design often entails incorporation of many biometric and non-biometric components (building blocks) to provide reliable personal recognition. As biometric technology matures, there will be an increasing interaction among the market, technology, and the applications. This interaction will be influenced by the added value of the technology, user acceptance, and the credibility of the service provider. It is too early to predict where and how biometric technology will evolve and in which applications it will be embedded. However, it is certain that biometric-based recognition will have a profound influence on the way we conduct our daily business.

[1]  Arun Ross,et al.  Multibiometric systems , 2004, CACM.

[2]  Anil K. Jain,et al.  Biometric Systems: Technology, Design and Performance Evaluation , 2004 .

[3]  Anil K. Jain,et al.  Integrating Faces, Fingerprints, and Soft Biometric Traits for User Recognition , 2004, ECCV Workshop BioAW.

[4]  Sharath Pankanti,et al.  Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .

[5]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[6]  Anil K. Jain,et al.  Multimedia content protection via biometrics-based encryption , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[7]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[8]  Sharath Pankanti,et al.  On the Individuality of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Anil K. Jain,et al.  Fingerprint Quality Indices for Predicting Authentication Performance , 2005, AVBPA.

[10]  Anil K. Jain,et al.  A Principled Approach to Score Level Fusion in Multimodal Biometric Systems , 2005, AVBPA.

[11]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[12]  Matteo Golfarelli,et al.  On the Error-Reject Trade-Off in Biometric Verification Systems , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[13]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[14]  Anil K. Jain,et al.  Integrating Faces and Fingerprints for Personal Identification , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[15]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[16]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[17]  Anil K. Jain,et al.  FVC2004: Third Fingerprint Verification Competition , 2004, ICBA.

[18]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[19]  James L. Wayman,et al.  Fundamentals of Biometric Authentication Technologies , 2001, Int. J. Image Graph..

[20]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Douglas E. Sturim,et al.  The 2004 MIT Lincoln Laboratory speaker recognition system , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[22]  L. Hong,et al.  Can multibiometrics improve performance , 1999 .

[23]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[24]  Craig I. Watson,et al.  Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report , 2004 .

[25]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..