Skip to main content

Using Biometrics as an Enabling Technology in Balancing Universality and Selectivity for Management of Information Access

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2615))

Abstract

The key concept of Universal Access in the Information Society has important and far-reaching implications for the design of a wide range of systems and data sources. This paper sets out to examine two fundamentally conflicting aspects of the broad principle of universality in design, pointing to the opposite requirement that, in many applications, access to a system or set of data must be limited to an identifiable population of “authorised” users. However, the idea of universality then applies at a lower level, since the mechanisms used to impose these limitations should themselves not be dependent on the physical attributes or expertise of individuals, but rather related to their identity and designated level of authorisation. This leads to an interesting situation where the concept of universality must be implemented at different levels and, equally, must be balanced against the competing claims of the constraints imposed by authorisation-determined selectivity. This paper argues that technology based on biometric processing - the exploitation of measurements relating to individual physiological or behavioural attributes - provides a key platform on which an access management structure can be realised. Experimental results based on various biometric modalities are used to support and illustrate the ideas proposed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Parkes, J. R.: Personal identification-biometrics, In: D. T. Lindsay and W. L. Proce, (eds.): Information Security, North Holland (1991)

    Google Scholar 

  2. Daugman, J. G.: High confidence visual recognition of persons by a test of statistical independence, IEEE Trans. Pattern Analysis and Machine Intelligence 15 (1993) 1148–1161

    Article  Google Scholar 

  3. Jain, A. K., Hong, L., Bolle, R.: On-line fingerprint verification, IEEE Trans. Pattern Analysis and Machine Intelligence 19 (1997) 302–313

    Article  Google Scholar 

  4. Fairhurst, M. C.: Signature verification revisited: promoting practical exploitation of biometric technology,: Electron. Commun. Eng. J. 9 (1997) 273–280

    Article  Google Scholar 

  5. Obaidat, M. S. and Sadoun, B.: Verification of computer users using keystroke dynamics, IEEE Trans. Systems, Man and Cybernetics 27 (1997) 261–269

    Google Scholar 

  6. Huang, P. S., Harris, C. J., Nixon, M. S.: Human gait recognition in canonical space using temporal templates, IEE Proc. Vision, Image and Signal Processing 146 (1999) 93–100

    Google Scholar 

  7. Plamondon, R. and Lorette, G.: Automatic signature verification and writer identification-the state of the art: Pattern Recognition 22 (1989) 107–131

    Article  Google Scholar 

  8. Leclerc, F. and Plamondon, R.: Automatic signature verification-the state of the art 1989-1993, Int. J. Pattern Rec. Art. Intell. 8 (1994) 643–659

    Article  Google Scholar 

  9. Allgrove, C and Fairhurst, M. C.: Majority voting for improved signature verification, Proc. IEE Colloquium on Visual Biometrics, London, (2000) 10.1–10.4

    Google Scholar 

  10. Jain, A., Bolle, R., Pankanti, S.(Eds.): Biometrics-personal identification in a networked society, Kluwer (1999)

    Google Scholar 

  11. Deravi, F., Fairhurst, M. C., Mavity, N. J., Guest, R. M.: Design of multimodal biometric systems for universal authentication and access control, Proc. WISA, Seoul (2001) 9–20

    Google Scholar 

  12. Best practices in testing and reporting performance of biometric devices, Biometrics Working Group/NPL (2000)

    Google Scholar 

  13. Chibelushi, C. C., Mason, J. S. D., Deravi, F.: Feature-level data fusion for bimodal person recognition, Proc. 6th IEE Int. Conf. Image Processing and its Applications (1997) 399–403

    Google Scholar 

  14. Su, Q. and Silsbee, P. L.: Robust audiovisual integration using semicontinuous Hidden Markov Models, Proc. 4th Int. Conf. Spoken Language Processing (1996) 42–45

    Google Scholar 

  15. Hong, L and Jain, A.: Integrating faces and fingerprints for personal identification, IEEE Trans. Pattern Analysis and Machine Intelligence 20 (1998) 1295–1306

    Article  Google Scholar 

  16. Deravi, F., Fairhurst, M. C., Guest, R. M., Mavity, N. J., Canuto, A.: Intelligent agents for the management of complexity in multimodal biometrics, Int. J. UAIS (In press)

    Google Scholar 

  17. Wooldridge, M and Jennings, N. R.: Intelligent agents-theory and practice, The Knowledge Engineering Review 10 (1995) 115–152

    Article  Google Scholar 

  18. Wooldridge, M.: Agent-based software engineering, IEEE Trans. Software Engineering 144 (1997) 26–37

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fairhurst, M.C., Guest, R.M., Deravi, F., George, J. (2003). Using Biometrics as an Enabling Technology in Balancing Universality and Selectivity for Management of Information Access. In: Carbonell, N., Stephanidis, C. (eds) Universal Access Theoretical Perspectives, Practice, and Experience. UI4ALL 2002. Lecture Notes in Computer Science, vol 2615. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36572-9_20

Download citation

  • DOI: https://doi.org/10.1007/3-540-36572-9_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00855-2

  • Online ISBN: 978-3-540-36572-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics