Abstract
Reliable personal identity authentication has become an important issue in a number of wireless contexts including mobile commerce, access control, and user interface (UI) control. Traditional authentication approaches such as PIN codes or password queries are facing serious security-related problems. Biometrics-based authentication techniques make use of either physiological or behavioural traits that are able to differentiate between an authorized person and a fraudulent impostor. In this paper, both biometric technology and wireless settingbased constraints that determine the feasibility and the performance of the authentication feature are specified. The most well-known biometric approaches are briefly reviewed and their feasibility for wireless use is appraised. Furthermore, a number of quantitative and qualitative parameters for evaluation are also presented. Biometric technologies are continuously advancing toward commercial implementation in wireless devices. When carefully designed and implemented, the advantage of biometric authentication arises mainly from increased convenience and coexistent improved security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R.M. Bolle, J.H. Connell, and N.K. Ratha. Biometric Perils and Patches. Pattern Recognition, 35(12):2727–2738, 2002.
R.M. Bolle, S. Pankanti, and N.K. Ratha. Evaluation Technologies for Biometric-Based Authentication System (FRR). In Proc. 15th International Conference on Pattern Recognition (ICPR), volume 2, pages 831–837, Barcelona, Spain, 2000.
J.G. Daugman. High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Trans. Pattern Recognition and Machine Intelligence, 15(11):1148–1161, 1993.
A. Jain, R. Bolle, and S. Pankanti. Intoroduction to biometrics. In Biometrics. Personal Identification in Networked Society. Kluwer Adademic Publishers, Boston, USA, 1999.
A.K. Jain, S. Prabhakar, and S. Pankanti. On the Similarity of Identical Twin Fingerprints. Pattern Recognition, 35(11):2653–2663, 2002.
I. Känsälä and P. Tikkanen. Security Risk Analysis of Fingerprint Based Verification in PDAs. In Proc. Third Workshop on Automatic Identification Advanced Technologies (AUTOID’02), pages 76–82, NY, USA, 2002.
A.J. Mansfield and J.L. Wayman. Best Practices in Testing and Reporting Performance of Biometric Devices, Version 2.0. NPL Report CMSC 14/02, 2002.
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of Artificial “Gummy” Fingers on Fingerprint Systems. In Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques IV, volume 4677, pages 275–289, 2002.
J. Wayman. National Biometric Test Center Collected Works. National Biometric Test Center, San Jose, CA, USA, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tikkanen, P., Puolitaival, S., Känsälä, I. (2003). Capabilities of Biometrics for Authentication in Wireless Devices. In: Kittler, J., Nixon, M.S. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2003. Lecture Notes in Computer Science, vol 2688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44887-X_92
Download citation
DOI: https://doi.org/10.1007/3-540-44887-X_92
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40302-9
Online ISBN: 978-3-540-44887-7
eBook Packages: Springer Book Archive