Biometrics Systems and Technologies: A survey

Ioan Buciu, Alexandru Gacsadi

Abstract


In a nutshell, a biometric security system requires a user to provide some biometric features which are then verified against some stored biometric templates. Nowadays, the traditional password based authentication method tends to be replaced by advanced biometrics technologies. Biometric based authentication is becoming increasingly appealing and common for most of the human-computer interaction devices. To give only one recent example, Microsoft augmented its brand new Windows 10 OS version with the capability of supporting face recognition when the user login in. This chapter does not intend to cover a comprehensive and detailed list of biometric techniques. The chapter rather aims at briefly discussing biometric related items, including principles, definitions, biometric modalities and technologies along with their advantages, disadvantages or limitations, and biometric standards, targeting unfamiliar readers. It also mentions the attributes of a biometric system as well as attacks on biometrics. Important reference sources are pointed out so that the interested reader may gain deeper in-depth knowledge by consulting them.

Keywords


biometric modalities, biometric attacks, biometric standards

Full Text:

PDF

References


S. K. Zhou, R. Chellappa, Ramalingam, W. Zhao (2006), Unconstrained Face Recognition, pringer.

K. Delac, M. Grgic (Eds.) (2007), Face Recognition, I-Tech Education and Publishing, Vienna, ustria.

K. Delac, M. Grgic, M. S. Bartlett (Eds.) (2008), Recent Advances in Face Recognition, N-TECH, Vienna, Austria.
http://dx.doi.org/10.5772/94

M. Tistarelli, S. Z. Li, R. Chellappa (Eds.)(2009), Handbook of Remote Biometrics for Surveillance nd Security, Springer.
http://dx.doi.org/10.1007/978-1-84882-385-3

S. Z. Li, Stan, A. Jain (Eds.)(2011), Handbook of Face Recognition, Springer.

M. D. Marsico, M. Nappi, M. Tistarelli (Eds.)(2014), Face Recognition in Adverse Conditions, GI-Global.
http://dx.doi.org/10.4018/978-1-4666-5966-7

X. Chen, P. J. Flynn, K. W. Bowyer (2005), IR and Visible Light Face Recognition, Computer mage and Vision Understanding, 99(3): 332–358.

S. G. Kong, J. Heo, B. R. Abidi, J. K. Paik, M. A. Abidi (2005), Recent Advances in Visual nd Infrared Face Recognition: A Review, Computer Image and Vision Understanding, 97(1): 03–135.

D. Socolinsky, L. Wolff, J. Neuheisel, C. Eveland (2001), Illumination Invariant Face Recognition sing Thermal Infrared Imagery, Proc. of 2001 IEEE Conf. on Computer Vision and attern Recognition, 1: 527-534.

D. Socolinsky, A. Salgian, J. D. Neuheisel (2003), Face recogniton with visible and thermal nfrared imagery, Computer Image and Vision Understanding, 91(1): 72–114.
http://dx.doi.org/10.1016/S1077-3142(03)00075-4

D. Socolinsky, A. Selinger (2004), Thermal face recognition in an operational scenario, Proc. f 2004 IEEE Conf. on Computer Vision and Pattern Recognition, 1012-1019.
http://dx.doi.org/10.1109/CVPR.2004.1315275

Y. Song, C. Lee, J. Kim (2004), A New Scheme for Touchless Fingerprint Recognition ystem, Proc. of 2004 Intl Symposium on Intelligent Signal Processing and Communication ystems, 524-527.

E. Sano, T. Maeda, T. Nakamura, M. Shikai, M. Sakata, M. Matshusita, K. Sasakawa (2006), Fingerprint Authentication Device Based on Optical Characteristics Inside a Finger, roc. of 2004 IEEE Conf. on Computer Vision and Pattern Recognition Workshop, OI:10.1109/CVPRW.2006.83.

G. Parziale, E. Diaz-Santana, R. Hauke (2006), The surround Imager: a multi-camera ouchless device to acquire 3d rolled-equivalent fingerprints, Proc. of the 2006 Intl Conf. on dvances in Biometrics, 244-250.

R. Smith (2002), Authentication: From Passwords to Public Keys, Addison and Wesley, oston.

J. Ashbourn (2000), Biometrics: Advanced Identity Verification: The Complete Guide, pringer, London.

http://us.allegion.com/Products/biometrics/Pages/default.aspx

J. Daugman (1994), Biometric personal identification system based on Iris Recognition, U.S. atent 5,291,560.

M. J. Northcott, J. E. Graves (2008), Iris Imaging Using Reflection from the Eyes, U.S. atent Application 200800002863.

G. Geterman, V. Jacobsen, J. Jelinek, T. Phinney, R. Jmza, T. Ahrens, G. Kilgore, R. hillock, S. Bedros (2008), Combined Face and Iris Recognition, U.S. Patent Application 0080075334.

http://www.cmu-biometrics.org/

R. Das (2014), Biometric Technology: Authentication, Biocryptography, and Cloud-Based rchitecture, CRC Press.
http://dx.doi.org/10.1201/b17640

N. Miura, A. Nagasaka, T. Miyatake (2004), Feature extraction of finger-vein patterns based n repeated line tracking and its application to personal identification, Machine Vision and pplications, 15(4): 194-203.

R. D. Seely , M. Goffredo, J. N. Carter, M. S. Nixon (2009), View Invariant Gait Recognition, andbook of Remote Biometrics for Surveillance and Security, 61-81.

J. Ilonen (2003), Keystroke dynamics, http://www2.it.lut.fi/kurssit/03-04/ 10970000/seminars/Ilonen.pdf.

R. Giot, M. El-Abed, C. Rosenberger (2009), Keystroke dynamics authentication for collaborative ystems, Intl. Symposium on Collaborative Technologies and Systems, 172-179.

P. Bours (2012), Continuous keystroke dynamics: A different perspective towards biometric valuation, Information Security Techn. Report Volume 17(1-2): 36-43.
http://dx.doi.org/10.1016/j.istr.2012.02.001

C. Shen, Z. Cai, X. Guan, Y. Du, T. Yu (2013), User Authentication Through Mouse ynamics, IEEE Trans. on Information Forensics and Security 8(1): 16-30.
http://dx.doi.org/10.1109/TIFS.2012.2223677

Z. Saquib, N. Salam, R. P. Nair, N. Pandey, A. Joshi (2010), A Survey on Automatic Speaker ecognition Systems, Signal Processing and Multimedia,134-145.

The Global Biometrics and Mobility Report: The Convergence of Commerce and Privacy arket Analysis and Forecasts 2014 to 2020, Available at: http://www.acuitymi. om/GBMR_Report.php, Accessed on 12 Dec. 2015.

https://www.truekey.com/ Accessed on 14 Dec. 2015.

http://www.sensory.com/products/technologies/trulysecure/, Accessed on 14 Dec. 015.

http://www.neurotechnology.com/

http://appliedrec.com/

http://www.isityou.biz/

https://fidoalliance.org/

N. M. Duc and B. Q. Minh (2009), Your face is NOT your password, Black Hat Conference.

http://www.tabularasa-euproject.org/evaluations/tabula-rasa-spoofing-challenge-2013/

http://www.biometrics-center.ch/testing/tabula-rasa-spoofing-challenge-2013

http://www.tabularasa-euproject.org/

http://www.google.com/patents/US8437513, Accessed on 17 Dec. 2015.

T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino (2002), Impact of Artificial Gummy ingers on Fingerprint Systems, Proc. of SPIE, Vol. 4677, Optical Security and Counterfeit eterrence Techniques IV, 2002.

https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid

Y. Zhang,Z. Chen, H. Xue, T. Wei (2015), Fingerprints On Mobile Devices: Abusing and eaking, Black Hat Conference.

http://livdet.org/

V. Mura, L. Ghiani, G. L. Marcialis, F. Roli, D. A. Yambay, S. A. Schuckers (2015), LivDet 015 Fingerprint Liveness Detection Competition 2015, Available at: http://livdet.org/ eports.php

P. Gupta, S. Behera, M. Vatsa, R. Singh (2014), On Iris Spoofing Using Print Attack, Proc. f the 2014 22nd Intl Conf. on Pattern Recognition, 1681-1686.
http://dx.doi.org/10.1109/ICPR.2014.296

VeriEye, Iris recognition software, http://www.neurotechnology.com/verieye.html

D. Mukhopadhyay, M. Shirvanian and N. Saxena (2015), All Your Voices Are Belong to s: Stealing Voices to Fool Humans and Machines, European Symposium on Research in omputer Security.
http://dx.doi.org/10.1007/978-3-319-24177-7_30

E. Khoury, L. El Shafey, S. Marcel (2014), Spear: An open source toolbox for speaker recognition ased on Bob, IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP).

http://www.iso.org/iso/home/store/catalogue_tc/catalogue_tc_browse.htm? ommid=313770&published=on

http://www.iso.org/iso/catalogue_detail.htm?csnumber=33922




DOI: https://doi.org/10.15837/ijccc.2016.3.2556



Copyright (c) 2017 Ioan Buciu, Alexandru Gacsadi

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

CC-BY-NC  License for Website User

Articles published in IJCCC user license are protected by copyright.

Users can access, download, copy, translate the IJCCC articles for non-commercial purposes provided that users, but cannot redistribute, display or adapt:

  • Cite the article using an appropriate bibliographic citation: author(s), article title, journal, volume, issue, page numbers, year of publication, DOI, and the link to the definitive published version on IJCCC website;
  • Maintain the integrity of the IJCCC article;
  • Retain the copyright notices and links to these terms and conditions so it is clear to other users what can and what cannot be done with the  article;
  • Ensure that, for any content in the IJCCC article that is identified as belonging to a third party, any re-use complies with the copyright policies of that third party;
  • Any translations must prominently display the statement: "This is an unofficial translation of an article that appeared in IJCCC. Agora University  has not endorsed this translation."

This is a non commercial license where the use of published articles for commercial purposes is forbiden. 

Commercial purposes include: 

  • Copying or downloading IJCCC articles, or linking to such postings, for further redistribution, sale or licensing, for a fee;
  • Copying, downloading or posting by a site or service that incorporates advertising with such content;
  • The inclusion or incorporation of article content in other works or services (other than normal quotations with an appropriate citation) that is then available for sale or licensing, for a fee;
  • Use of IJCCC articles or article content (other than normal quotations with appropriate citation) by for-profit organizations for promotional purposes, whether for a fee or otherwise;
  • Use for the purposes of monetary reward by means of sale, resale, license, loan, transfer or other form of commercial exploitation;

    The licensor cannot revoke these freedoms as long as you follow the license terms.

[End of CC-BY-NC  License for Website User]


INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (IJCCC), With Emphasis on the Integration of Three Technologies (C & C & C),  ISSN 1841-9836.

IJCCC was founded in 2006,  at Agora University, by  Ioan DZITAC (Editor-in-Chief),  Florin Gheorghe FILIP (Editor-in-Chief), and  Misu-Jan MANOLESCU (Managing Editor).

Ethics: This journal is a member of, and subscribes to the principles of, the Committee on Publication Ethics (COPE).

Ioan  DZITAC (Editor-in-Chief) at COPE European Seminar, Bruxelles, 2015:

IJCCC is covered/indexed/abstracted in Science Citation Index Expanded (since vol.1(S),  2006); JCR2018: IF=1.585..

IJCCC is indexed in Scopus from 2008 (CiteScore2018 = 1.56):

Nomination by Elsevier for Journal Excellence Award Romania 2015 (SNIP2014 = 1.029): Elsevier/ Scopus

IJCCC was nominated by Elsevier for Journal Excellence Award - "Scopus Awards Romania 2015" (SNIP2014 = 1.029).

IJCCC is in Top 3 of 157 Romanian journals indexed by Scopus (in all fields) and No.1 in Computer Science field by Elsevier/ Scopus.

 

 Impact Factor in JCR2018 (Clarivate Analytics/SCI Expanded/ISI Web of Science): IF=1.585 (Q3). Scopus: CiteScore2018=1.56 (Q2); Editors-in-Chief: Ioan DZITAC & Florin Gheorghe FILIP.