Abstract
Recently, biometrics technology is one of the hot research topics in the IT field because of the demands for accurate personal identification or verification to solve security problems in various applications. This chapter gives an all-around introduction to biometrics technologies, and the new trend: 3D biometrics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
AOptix (2010) AOptix announces new slim design iris recognition system. http://www.aoptix.com/news-events/press-releases/119-insight-vm-launch%20. Accessed 18 July 2012
Barbu T (2009) Comparing various voice recognition techniques. In: IEEE proceedings of the 5th conference on speech technology and human-computer dialogue, pp 1–6. doi: 10.1109/SPED.2009.5156172
Baygin M (2012) Real time voice recognition based smart home application. IEEE 20th signal processing and communications applications conference (SIU), pp 1–4. doi: 10.1109/SIU.2012.6204694
Berry J (1994) The history and development of fingerprinting. In: Lee HC, Gaensslen RE (eds) Advances in fingerprint technology. Florida, pp 1–39
Cappelli R, Lumini A, Maio D, Maltoni D (1999) Fingerprint classification by directional image partitioning. IEEE Trans Pattern Anal Mach Intell 21:402–421. doi:10.1109/34.765653
Cole RA, Mariani J, Uszkoret H, Zaenen A, Zue A (1997) Survey of the state of the art in human language technology. Cambridge University Press. ISBN: 0-521-59277-1
Daugman JG (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15:1148–1161. doi:10.1109/34.244676
Daugman JG (2003) The importance of being random: statistical principles of iris recognition. Pattern Recogn 36(2):279–291
Fujitsu Laboratories Limited (2002) Biometric mouse with palm vein pattern recognition technology. http://pr.fujitsu.com/en/news/2002/08/28.html. Accessed 4 July, 2003
Fujitsu Laboratories Limited (2011a) Fujitsu PalmSecure selected as a “world changing idea” for 2011 by scientific American magazine. http://www.fujitsu.com/us/services/biometrics/palm-vein/SA_news.html. Accessed 18 July 2012
Fujitsu Laboratories Limited (2011b) PalmSecure—Fujitsu’s world-leading authentication technology. http://www.fujitsu.com/emea/products/biometr-ics/intro.html. Accessed 18 July 2012
Fujitsu Laboratories Limited (2011c) What is PalmSecure™. http://www.fujitsu.com/global/services/solutions/biometrics/. Accessed 18 July 2012
International Biometric Group (2009) Biometrics market report. http://www.biometricgroup.com. Accessed 18 July 2012
Iridian Technologies, Inc. (2012) http://www.iriscan.com/. Accessed 20 July 2012
Jain A, Pankanti S (2001) Automated fingerprint identification and imaging systems. In: Lee HC, Gaensslen RE (eds) Advances in fingerprint technology, 2nd edn. New York. ISBN: 0849309239
Jain AK, Hong L, Bolle R (1997) On-line fingerprint verification. IEEE Trans Pattern Anal Mach Intell 19:302–314. doi:10.1109/34.587996
Jain AK, Bolle RM, Pankanti S (1999) Biometrics: personal identification in networked society. Boston Hardbound. ISBN: 978-0-7923-8345-1
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol, Spec Issue Image Video-Based Biometrics 14:4–20. doi:10.1109/TCSVT.2003.818349
Karu K, Jain AK (1996) Fingerprint classification. Pattern Recogn 29:389–404. doi:10.1016/0031-3203(95)00106-9
Kumar A, Zhang D (2006) Combining fingerprint, palmprint and hand-shape for user authentication. 18th international conference on pattern recognition, vol 4, pp 549–552. doi: 10.1109/ICPR.2006.383
Li B, Zhang D, Wang KQ (2006) Online signature verification based on null component analysis and principal component analysis. Pattern Anal Appl 8(4):345–356. doi:10.1007/s10044-005-0016-4
London Heathrow set to roll-out facial recognition security checks (2011) http://www.futuretravelexperience.com/2011/07/london-heathrow-set-to-roll-out-facial-recognition-security-checks/. Accessed 20 July 2012
Maio D, Maltoni D (1997) Direct gray-scale minutiae detection in fingerprints. IEEE Trans Pattern Anal Mach Intell 19:27–40. doi:10.1109/34.566808
Mastali N (2010) Authentication of subjects and devices using biometrics and identity management systems for persuasive mobile computing: a survey paper. IEEE 5th international conference on broadband and biomedical communications, pp 1–6. doi: 10.1109/IB2COM.2010.5723618
McGuire D (2002) Virginia beach installs face-recognition cameras. The Washington post. http://www.washingtonpost. com/ac2/wp-dyn/A19946-2002Jul3. Accessed 14 May 2003
Mexican Government (2003) Face recognition technology to eliminate duplicate voter registrations in upcoming presidential elections. http://www.shareholder.com/identix/ReleaseDetail.cfm?ReleaseID=53264. Accessed 15 May 2003
Miller B (1994) Vital signs of identity. IEEE Spectr 31:22–30. doi:10.1109/6.259484
Pankanti S, Bolle RM, Jain A (2000) Biometrics: the future of identification. IEEE Comput 33:46–49. doi:10.1109/2.820038
Rashid RA (2008) Security system using biometric technology: design and implementation of voice recognition system (VRS). IEEE Int Conf Comput Commun Eng 898–902. doi: 10.1109/ICCCE.2008.4580735
Ratha N, Karu K, Chen S, Jain AK (1996) A real-time matching system for large fingerprint databases. IEEE Trans Pattern Anal Mach Intell 18:799–813. doi:10.1109/34.531800
Sammut C, Squires B (1995) Automatic speaker recognition: an application of machine learning. In: Proceeding of the 12th international conference on machine learning. doi:10.1.1.54.7372
Sanchez-Reillo R, Sanchez-Marcos A (2000) Access control system with hand geometry verification and smart cards. IEEE Aerosp Electron Syst Mag 15:45–48. doi:10.1109/62.825671
Sanchez-Reillo R, Sanchez-Avilla C, Gonzalez-Marcos A (2000) Biometric identification through hand geometry measurements. IEEE Trans Pattern Anal Mach Intell 22:1168–1171. doi:10.1109/34.879796
Signature Verification (2002) http://biometrics.sabanciuniv.edu/signatur-e.html. Accessed 18 July 2012
Woodard DL (2006) A comparison of 3D biometric modalities. Comput Vis Pattern Recogn Workshop 57–60. doi: 10.1109/CVPRW.2006.12
Yang W (2011) Application of voice recognition for mobile E-commerce security. IEEE 3rd Pacific-Asia conference on circuits, communications and system, pp 1–4. doi: 10.1109/PACCS.2011.5990286
Zhang D (2000a) Automated biometrics: technologies and systems. Hardbound, Boston. ISBN 0792378563
Zhang D (2000b) Biometrics technologies and applications. In: Proceedings of 1st international conference on image and graphics. Tianjin, China, pp 42–49
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Zhang, D., Lu, G. (2013). Overview. In: 3D Biometrics. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7400-5_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7400-5_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7399-2
Online ISBN: 978-1-4614-7400-5
eBook Packages: Computer ScienceComputer Science (R0)