The use of computers to recognize humans from physical and behavioral traits dates back to the digital computer evolution of the 1960s. But even after decades of research and hundreds of major deployments, the field of biometrics remains fresh and exciting as new technologies are developed andoldtechnologiesareimprovedandfieldedinnewapplications.Wor- wide over the past few years,there has been a marked increase in both g- ernment and private sector interest in large-scale biometric deployments for accelerating human–machine processes, efficiently delivering human services, fighting identity fraud and even combating terrorism. The p- pose of this book is to explore the current state of the art in biometrics- tems and it is the system aspect that we have wished to emphasize. By their nature, biometric technologies sit at the exact boundary of the human–machineinterface.Butlikealltechnologies,bythemselvestheycan provide no value until deployed in a system with support hardware, n- work connections, computers, policies and procedures, all tuned together to work withpeople to improve some real business process within a social structure.
This book constitutes the refereed proceedings of the International Biometric Authentication Workshop, BioAW 2004, held in Prague, Czech Republic, in May 2004, as part of ECCV 2004. The 30 revised full papers presented were carefully reviewed and selected for presentation. The papers are organized in topical sections on face recognition, fingerprint recognition, template protection and security, other biometrics, and fusion and multimodal bioinformatics.
Overview Biometric recognition refers to the use of distinctive physiological and behavioral character- tics (e. g. , fingerprints, face, hang geometry, iris, gait, signature), called biometric identifiers or simply biometrics, for automatically recognizing a person. Questions such as “Is this person authorized to enter the facility?”, “Is this individual entitled to access the privileged infor- tion?”, and “Did this person previously apply for a job?” are routinely asked in a variety of organizations in both public and private sectors. Because biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for person recognition than traditional token- (e. g. , keys) or knowledge- (e. g. , password) based methods. Biometric recognition can provide better security, higher efficiency, and increased user convenience. It is for these reasons that biometric systems are being either increasingly deployed or evaluated in a large number of government (e. g. , welfare disbursement, national ID card, issuing of driver’s license) and civilian (e. g. , computer network logon, automatic teller machine, cellular phone, Web access, smartcard) applications. A number of biometric technologies have been developed and several of them are being used in a variety of applications. Among these, fingerprints, face, iris, speech, and hand - ometry are the ones that are most commonly used. Each biometric has its strengths and we- nesses and the choice of a particular biometric typically depends on the requirements of an application.
A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field. Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems. This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.