Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
R. Bolle, J. Connell, S. Pankanti, N. Ratha, and A. Senior. The Relationship Between the ROC Curve and the CMC. In Proceedings of Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), pages 15–20, Buffalo, USA, October 2005.
J. P. Campbell. Speaker Recognition: a Tutorial. Proceedings of the IEEE, 85(9):1437–1462, September 1997.
J. Daugman. Recognizing Persons by their Iris Patterns. In A. K. Jain, R. Bolle, and S. Pankanti, editors, Biometrics: Personal Identification in Networked Society, pages 103–122. Kluwer Academic Publishers, London, UK, 1999.
J. Daugman. How Iris Recognition Works? IEEE Transactions on Circuits and Systems for Video Technology, 14(1):21–30, 2004.
S. Davies. Touching Big Brother: How Biometric Technology Will Fuse Flesh and Machine. Information Technology and People, 7(4), 1994.
G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds. Sheep, Goats, Lambs and Wolves: A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation. In CD-ROM Proceedings of the Fifth International Conference on Spoken Language Processing (ICSLP), Sydney, Australia, November/December 1998.
J. Egan. Signal Detection Theory and ROC Analysis. Academic Press, New York, 1975.
C. L. Fancourt, L. Bogoni, K. J. Hanna, Y. Guo, R. P. Wildes, N. Takahashi, and U. Jain. Iris Recognition at a Distance. In Fifth International Conference on Audio-and Video-based Biometric Person Authentication (AVBPA), pages 1–13, Rye Brook, USA, July 2005.
P. Grother and P. J. Phillips. Models of Large Population Recognition Performance. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), volume 2, pages 68–75, Washington D.C., USA, June/July 2004.
W. R. Harrison. Suspect Documents, their Scientific Examination. Nelson-Hall Publishers, 1981.
International Biometric Group. Independent Testing of Iris Recognition Technology: Final Report. Available at http://www.biometricgroup.com/reports/public/ITIRT.html, May 2005.
A. K. Jain, R. Bolle, and S. Pankanti, editors. Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999.
A. K. Jain, A. Ross, and S. Prabhakar. An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image-and Video-Based Biometrics, 14(1):4–20, January 2004.
S. Kenny and J. J. Borking. The Value of Privacy Engineering. The Journal of Information, Law and Technology (JILT), 7(1):, 2002.
S. Kent and L. Millett. Who Goes There? Authentication Technologies through the Lens of Privacy. National Academy Press, 2003.
L. Lee, T. Berger, and E. Aviczer. Reliable On-Line Human Signature Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(6):643–647, June 1996.
S. Z. Li and Anil K. Jain, editors. Handbook of Face Recognition. Springer-Verlag, 2005.
D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain. FVC2004: Third Fingerprint Verification Competition. In Proceedings of International Conference on Biometric Authentication (ICBA), pages 1–7, Hong Kong, China, July 2004.
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar. Handbook of Fingerprint Recognition. Springer-Verlag, 2003.
A. J. Mansfield and J. L. Wayman. Best Practices in Testing and Reporting Performance of Biometric Devices, Version 2.01. Technical Report NPL Report CMSC 14/02, National Physical Laboratory, August 2002.
A. Martin, G. Doddington, T. Kam, M. Ordowski, and M. Przybocki. The DET Curve in Assessment of Detection Task Performance. In Proceedings of the Fifth European Conference on Speech Communication and Technology, volume 4, pages 1895–1898, Rhodes, Greece, September 1997.
F. Monrose and A. Rubin. Authentication Via Keystroke Dynamics. In Proceedings of Fourth ACM Conference on Computer and Communications Security, pages 48–56, Zurich, Switzerland, April 1997.
H. Moon and P. J. Phillips. Computational and Performance Aspects of PCA-based Face Recognition Algorithms. Perception, 30(5):303–321, 2001.
V. S. Nalwa. Automatic On-Line Signature Verification. Proceedings of the IEEE, 85(2):215–239, February 1997.
National Institute of Standards and Technology. NIST Biometric Scores Set. Available at http://http://www.itl.nist.gov/iad/894.03/biometricscores.
M. Negin, T. A. Chmielewski, M. Salganicoff, T. A. Camus, U. M. C. von Seelan, P. L. Venetianer, and G. G. Zhang. An Iris Biometric System for Public and Personal Use. IEEE Computer, 33(2):70–75, February 2000.
M. S. Nixon, J. N. Carter, D. Cunado, P. S. Huang, and S. V. Stevenage. Automatic Gait Recognition. In A. K. Jain, R. Bolle, and S. Pankanti, editors, Biometrics: Personal Identification in Networked Society, pages 231–249. Kluwer Academic Publishers, London, UK, 1999.
L. O’Gorman. Seven Issues with Human Authentication Technologies. In Proc. of Workshop on Automatic Identification Advanced Technologies (AutoID), pages 185–186, Tarrytown, USA, March 2002.
L. O’Gorman. Comparing Passwords, Tokens, and Biometrics for User Authentication. Proceedings of the IEEE, 91(12):2019–2040, December 2003.
P. J. Phillips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone. FRVT2002: Overview and Summary. Available at http://www.frvt.org/FRVT2002, March 2003.
N. Poh and S. Bengio. An Investigation of F-ratio Client-Dependent Normalisation on Biometric Authentication Tasks. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), volume 1, pages 721–724, Philadelphia, USA, March 2005.
S. Prabhakar, S. Pankanti, and A. K. Jain. Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy Magazine, 1(2):33–42, March-April 2003.
M. Przybocki and A. Martin. NIST Speaker Recognition Evaluation Chronicles. In Odyssey: The Speaker and Language Recognition Workshop, pages 12–22, Toledo, Spain, May 2004.
M. Rejman-Greene. Privacy Issues in the Application of Biometrics: A European Perspective. In J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, editors, Biometric Systems: Technology, Design and Performance Evaluation, pages 335–359. Springer, 2005.
J. A. Swets, W. P. Tanner, and T. G. Birdsall. Decision Processes in Perception. Psychological Review, 68(5):301–340, 1961.
J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, editors. Biometric Systems: Technology, Design and Performance Evaluation. Springer, 2005.
C. Wilson, A. R. Hicklin, M. Bone, H. Korves, P. Grother, B. Ulery, R. Micheals, M. Zoepfl, S. Otto, and C. Watson. Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report. NIST Technical Report NISTIR 7123, National Institute of Standards and Technology, June 2004.
D. Zhang, A. W.-K. Kong, J. You, and M. Wong. Online Palmprint Identification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(9):1041–1050, 2003.
R. Zunkel. Hand Geometry Based Authentication. In A. K. Jain, R. Bolle, and S. Pankanti, editors, Biometrics: Personal Identification in Networked Society, pages 87–102. Kluwer Academic Publishers, London, UK, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Jain, A.K., Ross, A. (2008). Introduction to Biometrics. In: Jain, A.K., Flynn, P., Ross, A.A. (eds) Handbook of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71041-9_1
Download citation
DOI: https://doi.org/10.1007/978-0-387-71041-9_1
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-71040-2
Online ISBN: 978-0-387-71041-9
eBook Packages: Computer ScienceComputer Science (R0)