Skip to main content

Biometrics for User Authentication

  • Reference work entry
Encyclopedia of Multimedia

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 449.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Dittmann, P. Wohlmacher, and K. Nahrstedt, “Multimedia and Security – Using Cryptographic and Watermarking Algorithms,” IEEE MultiMedia, Vol. 8, No. 4, October-December 2001, pp. 54–65.

    Article  Google Scholar 

  2. M. Bishop, “Computer Security,” Addison-Wesley, Boston, MA, 2003.

    Google Scholar 

  3. C. Villager, “Biometric User Authentication for IT Security: From Fundamentals to Handwriting,” Springer, New York, 2005.

    Google Scholar 

  4. S. Garfinkel and G. Spafford, “Practical Unix and Internet Security,” O'Reilly, Sebastopol, CA, 1996, pp. 247–250.

    Google Scholar 

  5. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric Cryptosystems: Issues and Challenges,” Proceedings of the IEEE, Special Issue on Multimedia Security for Digital Rights Management, Vol. 92, No. 6, 2004, pp. 948–960.

    Google Scholar 

  6. J. Daugman, “The importance of being random: Statistical principles of iris recognition,” Pattern Recognition, Vol. 36, No. 2, 2003, pp. 279–291.

    Article  Google Scholar 

  7. R. Plamondon and G. Lorette, “Automatic Signature Verification and Writer Identification – the State of the Art,” Pattern Recognition, Vol. 22, No. 2, 1989, pp. 107–131.

    Article  Google Scholar 

  8. F. Leclerc and R. Plamondon, “Automatic Verification and Writer Identification: The State of the Art 1989–1993,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 8, 1994, pp. 643–660.

    Article  Google Scholar 

  9. C.C. Tappert, C.Y. Suen, and T. Wakahara, “The State of the Art in Online Handwriting Recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 12, No. 8, 1990, pp. 787–808.

    Article  Google Scholar 

  10. V.I. Levenshtein, “Binary codes capable of correcting deletions, insertions, and reversals,” Soviet Physics, Vol. 10, 1966, pp. 707–710.

    MathSciNet  Google Scholar 

  11. A.K. Jain and A. Ross, “Multibiometric Systems,” Communications of the ACM, Special Issue on Multimodal Interfaces, Vol. 47, No. 1, 2004, pp. 34–40.

    Google Scholar 

  12. WIPO Patent Registration WO 97/04375, Electronic Data-Processing System, 1997.

    Google Scholar 

  13. C. Villager, R. Steinmetz, and A. Mayerhöfer, “Biometric Hash based on Statistical Features of Online Signatures,” Proceedings of the IEEE International Conference on Pattern Recognition (ICPR), Quebec City, Canada, Vol. 1, 2002, pp. 123–126.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag

About this entry

Cite this entry

Villager, C., Dittmann, J. (2008). Biometrics for User Authentication. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-78414-4_124

Download citation

Publish with us

Policies and ethics