Cover image for Biometrics in Identity Management : Concepts to Applications.
Biometrics in Identity Management : Concepts to Applications.
Title:
Biometrics in Identity Management : Concepts to Applications.
Author:
Modi, Shimon K.
ISBN:
9781608070183
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (278 pages)
Contents:
Biometrics in Identity Management: Concepts to Applications -- Contents -- CHAPTER 1 Introduction -- 1.1 Basics of Biometrics -- 1.2 Types of Biometric Technologies -- 1.3 Biometric System -- 1.4 Biometric System Processes -- 1.5 Biometric System Architecture -- 1.6 Applications of Biometric Technologies -- 1.7 Classification of Biometric Applications -- 1.8 Summary -- CHAPTER 2 Fundamentals of Technical Evaluations -- 2.1 System Process Transactions -- 2.2 Types of Errors -- 2.2.1 Acquisition Errors -- 2.2.2 Matching Errors -- 2.3 Performance Metrics -- 2.3.1 Failure to Enroll Rate (FTE) -- 2.3.2 Failure to Acquire Rate (FTA) -- 2.3.3 False Nonmatch Rate (FNMR) -- 2.3.4 False Match Rate (FMR) -- 2.3.5 Verification Performance Metrics -- 2.3.6 Identification Performance Metrics -- 2.4 Type I and Type II Errors -- 2.5 Performance Curves -- 2.6 User-Specific Performance: Zoo Analysis -- 2.7 Evaluation Testing Methodologies -- 2.7.1 Technology Evaluation -- 2.7.2 Scenario Evaluation -- 2.7.3 Operational Evaluation -- 2.8 Design of Evaluation -- 2.8.1 Sample Quality -- 2.9 Reporting Biometric Evaluations -- 2.10 Summary -- CHAPTER 3 Fingerprint Recognition -- 3.1 Fingerprint Anatomy -- 3.2 History -- 3.3.1 Henry Classification -- 3.2.2 Automated Fingerprint Recognition -- 3.3 Fingerprint Presentation and Acquisition -- 3.3.1 Inked Capture -- 3.3.2 Latent Fingerprints -- 3.3.3 Optical Sensors -- 3.3.4 Solid State Capacitive Sensors -- 3.3.5 RF Sensor -- 3.3.6 Thermal Fingerprint Sensor -- 3.3.7 Electro-Optical Sensor -- 3.3.8 Multispectral Imaging Sensor -- 3.3.9 Other Technologies -- 3.3.10 Limitations of Acquisition Technologies -- 3.3.11 Fingerprint Impressions -- 3.4 Fingerprint Feature Extraction -- 3.4.1 Quality Assessment -- 3.5 Fingerprint Compression -- 3.6 Fingerprint Feature Matching -- 3.7 Classification and Indexing.

3.8 Synthetic Fingerprint Generation -- 3.9 Automated Fingerprint Identification System (AFIS) -- 3.10 Standards -- 3.11 Evaluations -- 3.11.1 Fingerprint Vendor Technology Evaluation (FpVTE) -- 3.11.2 Minutiae Interoperability Exchange (MINEX) -- 3.11.3 Minutiae Template Interoperability Test (MTIT) -- 3.11.4 Fingerprint Verification Competition (FVC) -- 3.11.5 Slap Fingerprint Segmentation Evaluations -- 3.12 Applications and Trends -- 3.12.1 Integrated Automated Fingerprint Identification System (IAFIS) -- 3.12.2 Personal Identity Verification (PIV) -- 3.12.3 US-VISIT -- 3.13 Design and Deployment Considerations -- 3.13.1 User Interaction -- 3.13.2 Environment Issues -- 3.13.3 User Demographics -- 3.13.4 Interoperability -- 3.13.5 Spoofing Attacks -- 3.13.6 Large-Scale Systems -- 3.14 Summary -- CHAPTER 4 Face Recognition -- 4.1 History -- 4.2 2-D Face Recognition -- 4.2.1 2-D Face Image Acquisition, Detection, and Segmentation -- 4.2.2 Quality Assessment -- 4.2.3 2-D Face Feature Extraction and Matching -- 4.2.4 Video Surveillance -- 4.2.5 Beyond the Visible Spectrum -- 4.3 3-D Face Recognition -- 4.3.1 Face Acquisition -- 4.3.2 3-D Face Modeling and Matching -- 4.4 Standards -- 4.5 Evaluations -- 4.5.1 Facial Recognition Technology (FERET) Evaluations -- 4.5.2 Face Recognition Vendor Test (FRVT) -- 4.5.3 Face Recognition Grand Challenge (FRGC) -- 4.5.4 Multiple Biometric Grand Challenge (MBGC) and Multiple Biometric Evaluation (MBE) -- 4.5.5 Human-Machine Evaluation -- 4.5.6 Other Evaluations -- 4.6 Applications and Trends -- 4.6.1 Law Enforcement -- 4.6.2 E-Passport -- 4.6.3 U.S. Department of State Visa Application System -- 4.6.4 Surveillance Applications -- 4.6.5 Logical Access -- 4.6.6 Airport Applications -- 4.6.7 Personal Applications -- 4.7 Design and Deployment Considerations -- 4.7.1 Pose and Expression -- 4.7.2 Physiological Factors.

4.7.3 Environmental Factors -- 4.7.4 Image Compression and Interoperability -- 4.7.5 Subject Camera Distance and Motion -- 4.7.6 Spoofing Attacks -- 4.8 Summary -- CHAPTER 5 Iris Recognition -- 5.1 Anatomy of Iris -- 5.2 History -- 5.3 Iris Image Acquisition -- 5.4 Feature Extraction -- 5.4.1 Quality Assessment -- 5.5 Iris Feature Matching -- 5.6 Standards -- 5.7 Iris Capture at a Distance -- 5.8 Evaluations -- 5.8.1 Independent Testing of Iris Recognition Technology (ITIRT) -- 5.8.2 Iris Challenge Evaluation (ICE) -- 5.8.3 IRIS06 -- 5.8.4 NIST IREX -- 5.9 Applications and Trends -- 5.9.1 Privium System at Schipol Airport, Amsterdam -- 5.9.2 U.K. IRIS Program -- 5.9.3 U.S. Department of Defense (DoD) Iris Recognition -- 5.9.4 United Arab Emirates (UAE) Expellee Program -- 5.10 Design and Deployment Considerations -- 5.10.1 User Interaction -- 5.10.2 Medical Conditions -- 5.10.3 Nonideal Iris Images -- 5.10.4 Environmental Effects -- 5.10.5 Interoperability -- 5.10.6 Spoofing Attacks -- 5.11 Summary -- CHAPTER 6 Hand Geometry Recognition -- 6.1 History -- 6.2 Image Acquisition -- 6.3 Feature Extraction -- 6.4 Feature Matching -- 6.5 Performance Evaluations -- 6.6 Standards -- 6.7 Applications and Trends -- 6.8 Design and Deployment Considerations -- 6.8.1 Environmental Issues -- 6.8.2 User Interaction -- 6.8.3 Other Performance Considerations -- 6.9 Summary -- CHAPTER 7 Speaker Recognition -- 7.1 Generating Voice -- 7.2 History -- 7.3 Speaker Recognition Systems -- 7.3.1 Text-Dependent -- 7.3.2 Text-Prompted -- 7.3.3 Text-Independent -- 7.4 Information Levels -- 7.4.1 Idiolectal -- 7.4.2 Phonotactics -- 7.4.3 Prosody -- 7.4.4 Spectral Characteristics -- 7.5 Feature Extraction -- 7.5.1 Signal Enhancement -- 7.5.2 Mel Frequency Cepstral Coefficients (MFCC) -- 7.5.3 LPC Cepstral Parameters -- 7.6 Feature Matching -- 7.6.1 Distance-Based Methods.

7.6.2 Model-Based Methods -- 7.6.3 Other Methods -- 7.7 Standards -- 7.8 Evaluations -- 7.9 Applications and Trends -- 7.10 Design and Deployment Considerations -- 7.10.1 Voice Variations -- 7.10.2 Background Noise -- 7.10.3 Channel Effect -- 7.10.4 Microphone Effect -- 7.10.5 Duration of Samples -- 7.10.6 Recording Attack -- 7.11 Summary -- CHAPTER 8 Vascular Pattern Recognition -- 8.1 History -- 8.2 Vein Pattern Acquisition -- 8.3 Feature Extraction -- 8.4 Feature Matching -- 8.5 Facial Vascular Patterns -- 8.6 Commercially Available Technologies -- 8.7 Standards -- 8.8 Performance Evaluations -- 8.9 Applications and Trends -- 8.10 Design and Deployment Considerations -- 8.11 Summary -- CHAPTER 9 Dynamic Signature Verification -- 9.1 History -- 9.2 Types of Signature Verification Systems -- 9.3 Data Acquisition -- 9.4 Feature Representation -- 9.5 Feature Matching -- 9.6 Standards -- 9.7 Performance Evaluation -- 9.8 Trends and Applications -- 9.9 Design and Deployment Considerations -- 9.9.1 Inherent Variability -- 9.9.2 Interoperability -- 9.9.3 User Demographics -- 9.9.4 Zero Effort Imposter Attempts -- 9.10 Summary -- CHAPTER 10 Keystroke Dynamics, Retina, DNA, and Gait Recognition -- 10.1 Keystroke Dynamics -- 10.1.1 History -- 10.1.2 Feature Extraction and Matching -- 10.1.3 Keystroke Dynamics Systems -- 10.1.4 Standards -- 10.1.5 Evaluation -- 10.1.6 Trends and Applications -- 10.1.7 Design and Deployment Considerations -- 10.2 Retina Recognition -- 10.3 DNA Recognition -- 10.4 Gait Recognition -- 10.5 Summary -- CHAPTER 11 Multibiometric Systems -- 11.1 The Need for Multibiometric Systems -- 11.2 Multibiometric System Design -- 11.2.1 Multimodal -- 11.2.2 Multi-Instance -- 11.2.3 Multisensor -- 11.2.4 Multialgorithmic -- 11.2.5 Multisample -- 11.3 Data Acquisition -- 11.4 Levels of Fusion -- 11.4.1 Sensor Level Fusion.

11.4.2 Feature Level Fusion -- 11.4.3 Score Level Fusion -- 11.4.4 Rank Level Fusion -- 11.4.5 Decision Level Fusion -- 11.4.6 Quality-Based Fusion -- 11.5 Standards -- 11.6 Performance Evaluation -- 11.7 Trends and Applications -- 11.8 Design and Deployment Considerations -- 11.8.1 Cost -- 11.8.2 Correlation -- 11.8.3 Human Factors -- 11.8.4 Fusion Architecture -- 11.8.5 Quality of Samples -- 11.8.6 Zoo Analysis -- 11.8.7 Privacy -- 11.9 Summary -- CHAPTER 12 Biometric Standards -- 12.1 The Importance of Standards -- 12.2 Standards Development Organizations (SDO) -- 12.2.1 ISO/IEC -- 12.2.2 National Standards Bodies -- 12.2.3 BioAPI Consortium -- 12.2.4 NIST -- 12.2.5 OASIS -- 12.2.6 International Telecommunication Union (ITU-T) -- 12.3 Working Groups -- 12.3.1 WG1 Harmonized Biometric Vocabulary -- 12.3.2 WG2 Biometric Technical Interfaces -- 12.3.3 WG3 -- 12.3.4 WG4 -- 12.3.5 WG5 -- 12.3.6 WG6 -- 12.3.7 Sample Quality Standards -- 12.3.8 Conformance Testing -- 12.3.9 Security Standards -- 12.4 Standards Used in Law Enforcement -- 12.4.1 ANSI/NIST-ITL -- 12.4.2 FBI EBTS -- 12.4.3 DoD EBTS -- 12.4.4 INTERPOL INT-I -- 12.5 Adoption of Standards -- 12.6 Summary -- CHAPTER 13 Biometric Testing and Evaluation Programs -- 13.1 Biometric Testing: Why Is It Required? -- 13.2 Biometric Data Considerations -- 13.3 Unimodal Performance Evaluations and Research Databases -- 13.3.1 Fingerprint Recognition -- 13.3.2 Face Recognition -- 13.3.3 Iris Recognition -- 13.3.4 Speaker Verification -- 13.3.5 Signature Verification -- 13.3.6 Ocular Recognition -- 13.4 Multibiometric Evaluations and Research Databases -- 13.5 Comparative Tests -- 13.6 Liveness Detection Evaluations -- 13.7 Summary -- CHAPTER 14 Desiging and Deploying Biometric System's -- 14.1 Implementation Plan -- 14.2 Application Scope -- 14.3 Technology Selection -- 14.4 User-System Interaction.

14.4.1 Usability Principles.
Abstract:
In today's digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progressively complex. This has brought the spotlight on the importance of effective and efficient means of ascertaining an individual's identity. Biometric technologies like fingerprint recognition, face recognition, iris recognition etc. have a long history of use in law enforcement applications and are now transitioning towards commercial applications like password replacements, ATM authentication and others.This unique book provides you with comprehensive coverage of commercially available biometric technologies, their underlying principles, operational challenges and benefits, and deployment considerations. It also offers a look at the future direction these technologies are taking. By focusing on factors that drive the practical implementation of biometric technologies, this book serves to bridge the gap between academic researchers and industry practitioners. This book focuses on design, development, and deployment issues related to biometric technologies, including operational challenges, integration strategies, technical evaluations of biometric systems, standardization and privacy preserving principles, and several open questions which need to be answered for successful deployments.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: