This book introduces readers to the basic concepts, classical approaches, and the newest design, development, and applications of biometrics. It also provides a glimpse of future designs and research directions in biometrics. In addition, it discusses some latest concerns and issues in this area. Suitable for a wide range of readers, the book explains professional terms in plain English. Some concepts and designs discussed are so new that commercial systems based on them may not arrive in the market in the next 10 to 20 years.
Preface xiii
1 An Introduction to Biometrics 1 (10)
Eliza Yingzi Du
1.1 What is Biometrics? 1 (2)
1.2 Basic Functions of Biometrics 3 (1)
1.3 Typical Biometric Systems 4 (2)
1.4 How to Evaluate a Biometric System 6 (2)
1.5 Summary 8 (3)
2 Fingerprint Recognition 11 (18)
Wei-Yun Yau
Zujun Hou
Vutipong Areekul
Suksan Jirachaweng
2.1 Introduction 11 (1)
2.2 Fingerprint Acquisition 12 (3)
2.3 Fingerprint Processing 15 (4)
2.3.1 Ridge Orientation Estimation 15 (2)
2.3.2 Ridge Orientation Modeling 17 (1)
2.3.3 Fingerprint Image Enhancement 18 (1)
2.4 Feature Extraction 19 (3)
2.4.1 Singular Point Detection 20 (2)
2.5 Fingerprint Matching 22 (2)
2.5.1 Level-1 Matching Approach 22 (1)
2.5.2 Level-2 Matching Approach: 23 (1)
Minutiae Matching
2.5.3 Level-3 Matching Approach 24 (1)
2.6 Conclusions 24 (5)
3 Face Detection and Recognition 29 (36)
Huiyu Zhou
3.1 Introduction 29 (2)
3.2 Literature Review 31 (7)
3.2.1 Face Detection 31 (1)
3.2.1.1 Knowledge-based methods 32 (1)
3.2.1.2 Feature-based methods 32 (2)
3.2.1.3 Template-matching methods 34 (2)
3.2.1.4 Appearance-based methods 36 (1)
3.2.2 Face Recognition 37 (1)
3.3 Classical Face Detection Algorithms 38 (17)
3.3.1 AdaBoost Face Detection 38 (3)
3.3.1.1 Attentional cascade 41 (1)
3.3.2 SNoW Face Detection 41 (3)
3.3.3 Rank-Deficient Face Detection 44 (3)
3.3.4 Gabor-Based Neural Networks 47 (2)
3.3.5 Neural Network-Based Face 49 (2)
Detection
3.3.6 Evaluation Work 51 (4)
3.4 Classical Face Recognition Algorithms 55 (6)
3.4.1 Eigenface 55 (2)
3.4.2 Fisherface 57 (2)
3.4.3 Tensorface 59 (2)
3.5 Conclusions and Outlook 61 (4)
4 Iris Recognition 65 (22)
Robert W. Ives
Randy P. Broussard
Ryan N. Rakvic
Steven B. Link
4.1 Introduction 66 (1)
4.2 Iris Recognition Algorithms 67 (10)
4.2.1 Image Acquisition 68 (1)
4.2.2 Preprocessing 69 (2)
4.2.3 Feature Extraction 71 (1)
4.2.4 Template Generation 71 (2)
4.2.5 Template Matching 73 (1)
4.2.6 Performance 74 (3)
4.3 Some Applications of Iris Recognition 77 (4)
4.3.1 PC-Tethered Systems 77 (1)
4.3.2 Wall-Mount Systems 77 (1)
4.3.3 Walk-Through Portal Systems 78 (1)
4.3.4 Portable Systems 79 (2)
4.4 Current Research Areas 81 (6)
4.4.1 Off-Axis Iris Recognition 82 (1)
4.4.2 Iris Recognition at a Distance 82 (2)
4.4.3 Multispectral Iris Recognition 84 (3)
5 Speaker Recognition for Biometric Systems 87 (30)
Ravi Sankar
Tanmoy Islam
5.1 Introduction 87 (1)
5.2 Modes of Operation 88 (1)
5.3 Voice-Based Recognition Systems 89 (2)
5.4 Preprocessing Algorithms 91 (3)
5.4.1 A/D Conversion and Pre-emphasis 91 (1)
5.4.2 Framing and Windowing 91 (3)
5.5 Feature Extraction 94 (7)
5.5.1 Short-term Analysis 95 (1)
5.5.2 Cepstral Analysis 96 (1)
5.5.3 Linear Prediction 97 (2)
5.5.4 Mel Frequency Cepstrum 99 (2)
5.5.5 Intersession Variability 101 (1)
5.6 Speaker Modeling 101 (8)
5.6.1 Dynamic Time Warping 102 (1)
5.6.2 Vector Quantization 103 (1)
5.6.3 Hidden Markov Model 104 (2)
5.6.4 Gaussian Mixture Modeling 106 (1)
5.6.4.1 Expectation maximization 107 (1)
5.6.5 GMM Likelihood Ratio 108 (1)
5.7 State of the Art in Speaker 109 (2)
Recognition Systems
5.8 Summary 111 (6)
6 Palm Recognition 117 (16)
Mike Beale
6.1 Introduction 117 (1)
6.1.1 History 118 (1)
6.2 Methods 118 (3)
6.2.1 Minutiae 119 (1)
6.2.2 Principal Lines 120 (1)
6.2.3 Texture of Palm 121 (1)
6.3 System 121 (2)
6.3.1 Palm Acquisition 121 (1)
6.3.2 Palmprint Recognition 122 (1)
6.4 The Future of Palm Recognition 123 (5)
6.4.1 Multimodal 123 (1)
6.4.1.1 Vein and palm 124 (1)
6.4.1.2 Hand geometry and palm 125 (1)
6.4.2 3D Palm Recognition 125 (2)
6.4.3 Touchless Palm Recognition 127 (1)
6.5 Conclusion 128 (5)
7 Multimodal Biometrics 133 (16)
Zhi Zhou
Eliza Yingzi Du
7.1 Introduction 134 (2)
7.2 Integration 136 (4)
7.2.1 Multiple Traits 136 (1)
7.2.2 Multiple Snapshots of the Same 137 (1)
Trait
7.2.3 Multiple Representations and 138 (1)
Matching Algorithms of the Same Trait
7.2.4 Score Fusion Methods 139 (1)
7.3 Applications 140 (2)
7.3.1 Human Identification 141 (1)
7.3.2 Board Security 141 (1)
7.3.3 Identification Cards 142 (1)
7.4 Summary 142 (7)
8 Biometrics on Smart Card 149 (16)
Tai-Pang Chen
Wei-Yun Yau
Xudong Jiang
8.1 Introduction 149 (2)
8.2 Fingerprint Matching Algorithm 151 (2)
8.3 An Overview of Local and Global 153 (2)
Structure
8.4 Work Sharing Mechanism for On-Card 155 (3)
Comparison
8.5 Off-Card Alignment 158 (1)
8.6 On-Card Comparison 159 (2)
8.7 Performance Comparison 161 (1)
8.8 Conclusion 161 (4)
9 Smart Clothes for Biometrics and Beyond 165 (22)
Kee-Sam Jeong
Sun K. Yoo
Joohyeon Lee
Gilsoo Cho
9.1 Introduction 165 (3)
9.2 Smart Textile Sensors 168 (7)
9.2.1 Biosignals 170 (1)
9.2.2 Textile Electrode 171 (2)
9.2.3 Textile-Based Piezo Sensor 173 (2)
9.3 Smart Clothing as a Biomonitoring 175 (3)
Platform
9.4 Biometrics and Intelligent Services 178 (3)
9.5 Conclusions and Future Work 181 (6)
10 Spoof and Vulnerability of Biometric 187 (26)
Systems
Alexander D. Meadows
10.1 Introduction 187 (3)
10.2 Background: Doddington's Taxonomy 190 (1)
10.3 Classification of Vulnerability 191 (1)
10.3.1 Internal and External 191 (1)
Vulnerabilities
10.4 Biometric System Architecture 192 (7)
Vulnerabilities
10.4.1 Sensor Level 193 (1)
10.4.2 Signal Processing 193 (2)
10.4.3 Administration 195 (1)
10.4.4 Database 195 (1)
10.4.5 Matching 196 (1)
10.4.6 Decision 197 (1)
10.4.7 Action 197 (1)
10.4.8 Transmission 198 (1)
10.5 Analysis of Vulnerabilities: Attack 199 (1)
Trees
10.6 Spoof vs. Common Biometric 200 (3)
Technologies
10.6.1 Fingerprint 201 (1)
10.6.2 Voice 202 (1)
10.6.3 Facial 202 (1)
10.6.4 Iris 203 (1)
10.7 Reasons for Exploitation and Attacks 203 (2)
10.7.1 Gain False Access 204 (1)
10.7.2 Avoid Identification 204 (1)
10.7.3 Denial of Service 204 (1)
10.7.4 Identity Theft 205 (1)
10.8 Approaches to Safeguard Against 205 (6)
Vulnerability
10.8.1 Spoof Detection 206 (1)
10.8.2 Watermarking 207 (2)
10.8.3 Human Verification 209 (1)
10.8.4 Multimodal Biometrics 209 (1)
10.8.5 Passive and Active Biometrics 209 (1)
10.8.6 Mitigation of Weak Users 210 (1)
10.8.7 Biometric Encryption 211 (1)
10.8.8 Revocable Biometrics 211 (1)
10.9 Conclusions 211 (2)
11 Challenges in Biometrics: Accessibility, 213 (20)
Usability, and the Legal Framework
Ing. Mario Savastano
11.1 Introduction 213 (1)
11.2 A Real Challenge for Biometrics 214 (1)
11.3 "Early" Biometrics 215 (2)
11.4 Privacy 217 (5)
11.4.1 The Fragmentation of the Privacy 218 (2)
Issues
11.4.2 Some Considerations on the 220 (2)
Proportionality Principle Applied in
the Context of the Biometric
Technologies
11.5 Accessibility and Usability in 222 (3)
Biometrics
11.5.1 The Elderly Dilemma 223 (1)
11.5.2 Biometric Disabilities 224 (1)
11.5.3 Voluntary Permanent Modifications 225 (1)
11.6 Medical Aspects of Biometrics 225 (2)
11.6.1 Direct Medical Implications 226 (1)
11.6.2 Indirect Medical Implications 227 (1)
11.7 Some Ethical Factors of Biometrics 227 (2)
11.7.1 The Human Body as Password: 227 (1)
Biometric Characteristics in "Good
Shape"
11.7.2 Biometrics in Preventing Human 228 (1)
Trafficking
11.8 The Standardization Activity 229 (1)
11.8.1 The ISO/IEC JTC1 SC 37 230 (1)
"Biometrics" WG 6 on
Cross-Jurisdictional and Societal Issues
11.9 Conclusions 230 (3)
12 Cancellable Biometrics 233 (20)
Yan Sui
Xukai Zou
Yingzi Du
12.1 Introduction 234 (3)
12.2 Approaches 237 (4)
12.2.1 Noninvertible Feature 238 (2)
Transformation Approach
12.2.2 Biometric Salting 240 (1)
12.3 Applications 241 (3)
12.3.1 Electronic Passport 242 (1)
12.3.2 Fingerprint Recognition ATMs 243 (1)
12.3.3 Face Recognition Vending Machines 243 (1)
12.4 Research Areas for Biometrics 244 (9)
Security
13 Continuous Biometric Verification 253 (32)
Qinghan Xiao
Xue Dong Yang
13.1 Introduction 253 (3)
13.2 User Authentication 256 (3)
13.2.1 Authentication Systems 256 (1)
13.2.2 Biometrics and Multifactor 257 (2)
Authentication
13.3 Overview and Analysis of Existing 259 (6)
Continuous Verification Approaches
13.3.1 Passwords 259 (1)
13.3.2 Keystrokes 260 (1)
13.3.3 Fingerprints 261 (2)
13.3.4 EEG/ECG 263 (1)
13.3.5 Facial Recognition 264 (1)
13.4 Video-Based Facial Recognition 265 (3)
13.5 System Implementation 268 (7)
13.5.1 System Architecture 269 (1)
13.5.1.1 Input module 269 (1)
13.5.1.2 Face detection module 270 (1)
13.5.1.3 Face segmentation module 270 (1)
13.5.1.4 Lighting normalization module 270 (2)
13.5.1.5 Facial feature matching module 272 (1)
13.5.1.6 Graphical user interface 272 (1)
13.5.2 Continuous Verification Workflow 273 (2)
13.6 Experiments 275 (3)
13.7 Conclusion 278 (7)
14 Trends in Biometrics 285 (16)
Kai Yang
Eliza Yingzi Du
14.1 Introduction: Current Situation of 285 (1)
Biometric Technology
14.2 Trends in Biometric Technology 286 (9)
14.2.1 Less Vulnerable 286 (1)
14.2.1.1 Spoofs 286 (1)
14.2.1.2 Hacking and privacy attacking 286 (2)
14.2.2 Legal 288 (1)
14.2.3 Standard 289 (1)
14.2.4 Lower Cost 290 (1)
14.2.5 More Intelligent 290 (1)
14.2.5.1 Combinational consent 291 (1)
biometric scheme
14.2.5.2 Incorporating consent 291 (1)
biometric scheme
14.2.6 Remote Biometrics 292 (1)
14.2.7 Biometrics Surveillance 292 (1)
14.2.8 Smaller 293 (1)
14.2.9 More Accurate and Robust 294 (1)
14.2.10 More Efficient 294 (1)
14.2.11 More User-Friendly 294 (1)
14.2.12 More Choices 295 (1)
14.3 Trends in the Biometric Market 295 (2)
14.4 Conclusions 297 (4)
Index 301