Biometric Recognition : An Overview

Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications such as national ID cards, border crossings, government benefits, and access control. As a result, biometric recognition, or simply biometrics, which is based on physiological and behavioural characteristics of a person, is being increasingly adopted and mapped to rapidly growing person identification applications. Unlike credentials (documents and PIN), biometric traits (e.g., fingerprint, face, and iris) cannot be lost, stolen, or easily forged; they are also considered to be persistent and unique. Use of biometrics is not new; fingerprints have been successfully used for over 100 years in law enforcement and forensics to identify and apprehend criminals. But, as biometrics permeates our society, this recognition technology faces new challenges. The design and suitability of biometric technology for person identification depends on the application requirements. These requirements are typically specified in terms of identification accuracy, throughput, user acceptance, system security, robustness, and return on investment. The next generation biometric technology must overcome many hurdles and challenges to improve the recognition accuracy. These include ability to handle poor quality and incomplete data, achieve scalability to accommodate hundreds of millions of users, ensure interoperability, and protect user privacy while reducing system cost and enhancing system integrity. This chapter presents an overview of biometrics, some of the emerging biometric technologies and their limitations, and examines future challenges.

[1]  Jongmoo Choi,et al.  Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred Three-Dimensional Face Models , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[2]  Anil K. Jain,et al.  On matching latent fingerprints , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[3]  Dario Maio,et al.  Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.

[4]  Henry T. F. b. Rhodes,et al.  Alphonse Bertillon, Father of Scientific Detection , 2013 .

[5]  Anil K. Jain,et al.  A Multispectral Whole-Hand Biometric Authentication System , 2007, 2007 Biometrics Symposium.

[6]  Fabio Roli,et al.  Dynamic Score Selection for Fusion of Multiple Biometric Matchers , 2007, 14th International Conference on Image Analysis and Processing (ICIAP 2007).

[7]  Anil K. Jain,et al.  Latent Palmprint Matching , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  Tieniu Tan,et al.  Ordinal palmprint represention for personal identification [represention read representation] , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[9]  Andrea F. Abate,et al.  2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..

[10]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[11]  Leszek Wojnar,et al.  An Automatic Recognition of the Frontal Sinus in X-Ray Images of Skull , 2009, IEEE Transactions on Biomedical Engineering.

[12]  Luís A. Alexandre,et al.  The UBIRIS.v2: A Database of Visible Wavelength Iris Images Captured On-the-Move and At-a-Distance , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[14]  Yusuke Tamura,et al.  Verification of Individual Identification Method Using Bioelectric Potential of Plant during Human Walking , 2007 .

[15]  Lior Shamir,et al.  Biometric identification using knee X-rays , 2009, Int. J. Biom..

[16]  Damon L. Woodard,et al.  Finger surface as a biometric identifier , 2005, Comput. Vis. Image Underst..

[17]  J. Fierrez-Aguilar,et al.  Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.

[18]  Sharath Pankanti,et al.  On the Individuality of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[19]  Anil K. Jain,et al.  On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[20]  R. English The United States Congress , 2003 .

[21]  George W. Quinn,et al.  ELFT phase II :: an evaluation of automated latent fingerprint identification technologies , 2009 .

[22]  Andreas Uhl,et al.  Footprint-based biometric verification , 2008, J. Electronic Imaging.

[23]  Venu Govindaraju,et al.  Efficient search and retrieval in biometric databases , 2005, SPIE Defense + Commercial Sensing.

[24]  Arun Ross,et al.  Fusion in Multibiometric Identification Systems: What about the Missing Data? , 2009, ICB.

[25]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[26]  David Zhang,et al.  Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[27]  Matti Pietikäinen,et al.  Dynamic Texture Based Gait Recognition , 2009, ICB.

[28]  Bhaskar D. Kulkarni,et al.  Arterial Pulse Rate Variability analysis for diagnoses , 2008, 2008 19th International Conference on Pattern Recognition.

[29]  Ajay Kumar,et al.  Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..

[30]  Ajay Kumar,et al.  Personal Authentication Using Hand Vein Triangulation and Knuckle Shape , 2009, IEEE Transactions on Image Processing.

[31]  Ashim K. Datta Advances in Fingerprint Technology , 2001 .

[32]  A.K. Jain,et al.  Scars, marks and tattoos (SMT): Soft biometric for suspect and victim identification , 2008, 2008 Biometrics Symposium.

[33]  Jeremy Wickins,et al.  The ethics of biometrics: the risk of social exclusion from the widespread use of electronic identification , 2007, Sci. Eng. Ethics.

[34]  Arun Ross,et al.  Enhancement and Registration Schemes for Matching Conjunctival Vasculature , 2009, ICB.

[35]  Anil K. Jain,et al.  Automatic personal identification using fingerprints , 1998 .

[36]  Anil K. Jain,et al.  Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.

[37]  Ajay Kumar,et al.  Incorporating Cohort Information for Reliable Palmprint Authentication , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.

[38]  Jeremy Pinel Iris Recognition Immigration System (IRIS) , 2009, Encyclopedia of Biometrics.

[39]  James R. Bergen,et al.  Iris Recognition in Less Constrained Environments , 2008 .

[40]  Hassen Drira,et al.  Nasal Region Contribution in 3D Face Biometrics Using Shape Analysis Framework , 2009, ICB.

[41]  Hui Chen,et al.  Human Ear Recognition by Computer , 2008, Advances in Pattern Recognition.

[42]  James R. Matey,et al.  Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments , 2006, Proceedings of the IEEE.

[43]  Ping Yan,et al.  Biometric Recognition Using 3D Ear Shape , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[44]  Anil K. Jain,et al.  FM Model Based Fingerprint Reconstruction from Minutiae Template , 2009, ICB.

[45]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[46]  John Daugman,et al.  IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE , 2004 .

[47]  Anil K. Jain,et al.  Periocular biometrics in the visible spectrum: A feasibility study , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[48]  Jeffrey G. Andrews,et al.  Mode Switching for the Multi-Antenna Broadcast Channel Based on Delay and Channel Quantization , 2008, EURASIP J. Adv. Signal Process..

[49]  David Zhang,et al.  A New Framework for Adaptive Multimodal Biometrics Management , 2010, IEEE Transactions on Information Forensics and Security.

[50]  Patrick J. Flynn,et al.  Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..

[51]  Tieniu Tan,et al.  A study of multibiometric traits of identical twins , 2010, Defense + Commercial Sensing.

[52]  Stark C. Draper,et al.  Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[53]  Josef Kittler,et al.  Challenges and Research Directions for Adaptive Biometric Recognition Systems , 2009, ICB.

[54]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[55]  Kanya Tanaka,et al.  Footprint-based personal recognition , 2000, IEEE Transactions on Biomedical Engineering.

[56]  S. Rahman,et al.  A New Antispoofing Approach for Biometric Devices , 2008, IEEE Transactions on Biomedical Circuits and Systems.

[57]  Jeffrey P. Cohn,et al.  Keeping an Eye on School Security: The Iris Recognition Project in New Jersey Schools: (538032006-003) , 2006 .

[58]  Craig I. Watson,et al.  NIST IR 7477, Revision II, MINEX II Performance of Fingerprint Match-on-Card Algorithms - Phase IV Report , 2011 .

[59]  Ajay Kumar,et al.  Human identification using KnuckleCodes , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[60]  J. Wayman,et al.  ANALYSIS OF SECURITY VULNERABILITIES IN BIOMETRIC SYSTEMS , 2009 .

[61]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[62]  Henry C. Lee,et al.  Advances in Fingerprint Technology, Second Edition , 2001 .

[63]  Anil K. Jain,et al.  Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.

[64]  Pong C. Yuen,et al.  Protecting Face Biometric Data on Smartcard with Reed-Solomon Code , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[65]  KumarAjay,et al.  Personal authentication using finger knuckle surface , 2009 .

[66]  Anil K. Jain,et al.  Facial marks: Soft biometric for face recognition , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[67]  W. Todd Scruggs,et al.  eigenPulse: Robust human identification from cardiovascular function , 2008, Pattern Recognit..

[68]  Xuelong Li,et al.  General Tensor Discriminant Analysis and Gabor Features for Gait Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[69]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[70]  Aparecido Nilceu Marana,et al.  Frontal sinus recognition for human identification , 2008, SPIE Defense + Commercial Sensing.

[71]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[72]  Kang Ryoung Park,et al.  Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.

[73]  Richa Singh,et al.  Online learning in biometrics: A case study in face classifier update , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[74]  Kazuhiko Ohnuma,et al.  Novel biometrics based on nose pore recognition , 2009 .

[75]  SUMMARY OF NIST STANDARDS FOR BIOMETRIC ACCURACY, TAMPER RESISTANCE, AND INTEROPERABILITY , 2002 .

[76]  A. Adler,et al.  Images can be regenerated from quantized biometric match score data , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[77]  Pramod K. Varshney,et al.  An adaptive multimodal biometric management algorithm , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[78]  H Eichenbaum,et al.  Neural Correlates of Olfactory Recognition Memory in the Rat Orbitofrontal Cortex , 2000, The Journal of Neuroscience.