Abstract
The key concept of Universal Access in the Information Society has important and far-reaching implications for the design of a wide range of systems and data sources. This paper sets out to examine two fundamentally conflicting aspects of the broad principle of universality in design, pointing to the opposite requirement that, in many applications, access to a system or set of data must be limited to an identifiable population of “authorised” users. However, the idea of universality then applies at a lower level, since the mechanisms used to impose these limitations should themselves not be dependent on the physical attributes or expertise of individuals, but rather related to their identity and designated level of authorisation. This leads to an interesting situation where the concept of universality must be implemented at different levels and, equally, must be balanced against the competing claims of the constraints imposed by authorisation-determined selectivity. This paper argues that technology based on biometric processing - the exploitation of measurements relating to individual physiological or behavioural attributes - provides a key platform on which an access management structure can be realised. Experimental results based on various biometric modalities are used to support and illustrate the ideas proposed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Parkes, J. R.: Personal identification-biometrics, In: D. T. Lindsay and W. L. Proce, (eds.): Information Security, North Holland (1991)
Daugman, J. G.: High confidence visual recognition of persons by a test of statistical independence, IEEE Trans. Pattern Analysis and Machine Intelligence 15 (1993) 1148–1161
Jain, A. K., Hong, L., Bolle, R.: On-line fingerprint verification, IEEE Trans. Pattern Analysis and Machine Intelligence 19 (1997) 302–313
Fairhurst, M. C.: Signature verification revisited: promoting practical exploitation of biometric technology,: Electron. Commun. Eng. J. 9 (1997) 273–280
Obaidat, M. S. and Sadoun, B.: Verification of computer users using keystroke dynamics, IEEE Trans. Systems, Man and Cybernetics 27 (1997) 261–269
Huang, P. S., Harris, C. J., Nixon, M. S.: Human gait recognition in canonical space using temporal templates, IEE Proc. Vision, Image and Signal Processing 146 (1999) 93–100
Plamondon, R. and Lorette, G.: Automatic signature verification and writer identification-the state of the art: Pattern Recognition 22 (1989) 107–131
Leclerc, F. and Plamondon, R.: Automatic signature verification-the state of the art 1989-1993, Int. J. Pattern Rec. Art. Intell. 8 (1994) 643–659
Allgrove, C and Fairhurst, M. C.: Majority voting for improved signature verification, Proc. IEE Colloquium on Visual Biometrics, London, (2000) 10.1–10.4
Jain, A., Bolle, R., Pankanti, S.(Eds.): Biometrics-personal identification in a networked society, Kluwer (1999)
Deravi, F., Fairhurst, M. C., Mavity, N. J., Guest, R. M.: Design of multimodal biometric systems for universal authentication and access control, Proc. WISA, Seoul (2001) 9–20
Best practices in testing and reporting performance of biometric devices, Biometrics Working Group/NPL (2000)
Chibelushi, C. C., Mason, J. S. D., Deravi, F.: Feature-level data fusion for bimodal person recognition, Proc. 6th IEE Int. Conf. Image Processing and its Applications (1997) 399–403
Su, Q. and Silsbee, P. L.: Robust audiovisual integration using semicontinuous Hidden Markov Models, Proc. 4th Int. Conf. Spoken Language Processing (1996) 42–45
Hong, L and Jain, A.: Integrating faces and fingerprints for personal identification, IEEE Trans. Pattern Analysis and Machine Intelligence 20 (1998) 1295–1306
Deravi, F., Fairhurst, M. C., Guest, R. M., Mavity, N. J., Canuto, A.: Intelligent agents for the management of complexity in multimodal biometrics, Int. J. UAIS (In press)
Wooldridge, M and Jennings, N. R.: Intelligent agents-theory and practice, The Knowledge Engineering Review 10 (1995) 115–152
Wooldridge, M.: Agent-based software engineering, IEEE Trans. Software Engineering 144 (1997) 26–37
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fairhurst, M.C., Guest, R.M., Deravi, F., George, J. (2003). Using Biometrics as an Enabling Technology in Balancing Universality and Selectivity for Management of Information Access. In: Carbonell, N., Stephanidis, C. (eds) Universal Access Theoretical Perspectives, Practice, and Experience. UI4ALL 2002. Lecture Notes in Computer Science, vol 2615. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36572-9_20
Download citation
DOI: https://doi.org/10.1007/3-540-36572-9_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00855-2
Online ISBN: 978-3-540-36572-3
eBook Packages: Springer Book Archive