ebook img

Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture PDF

374 Pages·2014·3.31 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture

Biometric Technology Authentication, Biocryptography, and Cloud-Based Architecture Biometric Technology Authentication, Biocryptography, and Cloud-Based Architecture Ravindra Das CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2015 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20140926 International Standard Book Number-13: 978-1-4665-9246-9 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro- vides licenses and registration for a variety of users. For organizations that have been granted a photo- copy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com This book is lovingly dedicated to Anita, my wife, who has saved my life more than once. This book is also dedicated to the loving memory of my parents, Dr. Gopal Das and Kunda Das. CONTENTS Preface xvii Author xix 1 An Introduction to Biometrics 1 Our Unique Features: Physiological and Behavioral 1 How Our Unique Features Can Positively Identify Us: The World of Biometrics 5 A Formal Definition of Biometrics 6 What Is Recognition? 7 Physiological and Behavioral Biometrics 7 What the Future Holds 8 The Granular Components of Recognition 9 Defining the Biometric Template 12 The Mathematical Files of the Biometric Templates 12 Understanding Some of the Myths Behind Biometrics 13 Understanding the Differences of Verification and Enrollment Templates 14 Summary of Points Covered 15 The Biometric Process Illustrated 16 For the CIO: What Biometric System to Procure? 17 For the CIO: Important KPIs to Be Examined 18 Looking beyond the KPI 22 U.S. Federal Government Biometric Metrics and KPI 23 Biometric Data Interchange Formats 23 Common Biometric Exchange Format Framework 26 Biometric Technical Interface Standards 28 U.S. Federal Government Biometric Testing Standards 30 A Review of Biometric Sensors 31 Optical Scanners 32 Solid-State Sensors 33 Ultrasound Sensors 34 Temperature Differential Sensors 34 Multispectral Imaging Sensors 34 Touchless Fingerprint Sensors 35 CCD Cameras 35 3-D Sensors/Review of Biometric Sensors in Use 36 vii Contents The Disadvantages of Sensors 39 Typical Biometric Market Segments 40 Logical Access Control 40 Physical Access Control 41 Time and Attendance 42 Law Enforcement 43 Surveillance 45 Review of Chapter 1 48 2 A Review of the Present and Future Biometric Technologies 49 The Biometric Technologies of Today: Physical and Behavioral 49 Differences between Physical Biometrics and Behavioral Biometrics 50 Which One to Use: Physical or Behavioral Biometrics? 51 Fingerprint Recognition 52 The Unique Features 54 The Process of Fingerprint Recognition 55 Fingerprint Recognition Quality Control Checks 56 Methods of Fingerprint Collection 57 The Matching Algorithm 58 Fingerprint Recognition: Advantages and Disadvantages 59 Market Applications of Fingerprint Recognition 62 Hand Geometry Recognition 65 Hand Geometry Recognition: Enrollment Process 66 Hand Geometry Recognition: Advantages and Disadvantages 67 Vein Pattern Recognition 69 Components of Vein Pattern Recognition 71 How Vein Pattern Recognition Works 71 Vein Pattern Recognition: Advantages and Disadvantages 72 Palm Print Recognition 75 How Palm Print Recognition Works 76 Palm Print Recognition: Advantages and Disadvantages 76 Facial Recognition 76 Facial Recognition: How It Works 77 Defining the Effectiveness of a Facial Recognition System 79 Techniques of Facial Recognition 80 Facial Recognition: Advantages and Disadvantages 82 Applications of Facial Recognition 84 The Eye: The Iris and the Retina 86 The Iris 87 viii Contents The Physiological Structure of the Iris 87 Iris Recognition: How It Works 89 The Market Applications of Iris Recognition 90 Iris Recognition: Advantages and Disadvantages 90 The Retina 93 The Physiology of the Retina 95 The Process of Retinal Recognition 96 Retinal Recognition: Advantages and Disadvantages 98 Voice Recognition 100 Voice Recognition: How It Works 100 Factors Affecting Voice Recognition 101 Voice Recognition: Advantages and Disadvantages 102 The Market Applications of Voice Recognition 103 Signature Recognition 104 The Differences between a Signature and Signature Recognition 105 Signature Recognition: How It Works 105 Signature Recognition: Advantages and Disadvantages 107 Keystroke Recognition 109 Keystroke Recognition: How It Works 110 Keystroke Recognition: Advantages and Disadvantages 111 Biometric Technologies of the Future 113 DNA Recognition 114 DNA Recognition: How It Works 114 DNA Recognition: Advantages and Disadvantages 116 Gait Recognition 117 The Process behind Gait Recognition 117 Gait Recognition: Advantages and Disadvantages 118 Earlobe Recognition 120 Earlobe Recognition: How It Works 120 Earlobe Recognition: Advantages and Disadvantages 121 Review of Chapter 2 122 3 For the C-Level Executive: A Biometrics Project Management Guide 125 Biometric Technology System Architecture 125 Sensing and Data Acquisition 126 Multimodal Biometric Systems 127 Single Sign-On Solutions 128 Implementing a Multimodal Biometric System 129 Challenges with Multimodal Biometric Systems 131 ix Contents Signal and Image Processing 133 Preprocessing of the Biometric Raw Image 133 Quality Control Checks 135 Image Enhancement 136 Feature Extraction 137 Postprocessing 138 Data Compression 138 Data Storage 139 Search and Retrieval Techniques 140 Database Search Algorithms 141 Backup and Recovery of the Database 143 Database Configurations 144 Template Matching 145 Threshold Decision Making 147 Administration Decision Making 150 Biometric Templates Adaptation 152 Establishment of the Security Threshold Values 152 Reporting and Control 152 System Mode Adjustment 153 Privileges to End Users 153 Data Transmission 153 Biometrics Project Management 154 System Concepts and Classification Schemes 155 Upgrading to a Newer Biometric System? 157 The Feasibility Study 158 Application Classifiers 159 System Design and Interoperability Factors and Considerations 161 COTS-Based Biometric Systems 161 Proprietary or Open-Ended System? 162 Infrastructure Assessment 163 The Human Equation 164 Ergonomic Issues 165 The Feedback System 166 Population Dynamics 167 Systems Requirements Analysis 169 System Requirements Elicitation 170 System Requirement Analysis and Regulation 170 System Requirements Documentation 171 System Requirements Validation 172 Biometric System Specifications 172 x

Description:
''Preface Biometric technology has been around for a long time. For the most part, it has been accepted worldwide, without hesitation. It is a technology full of intrigue, mystique, awe, and misconceptions. Compared with other security technologies, biometrics receives the most scrutiny. Why is this
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.