Skip to main content

Who’s Who? Challenges in Biometric Authentication

  • Conference paper
Pattern Recognition (DAGM 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2781))

Included in the following conference series:

  • 2981 Accesses

Abstract

A wide variety of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that only a legitimate user, and not anyone else, accesses the rendered services. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones and ATMs. In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles of an impostor. Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an individual’s identity based on “who she is”, rather than by “what she possesses” (e.g., an ID card) or “what she remembers” (e.g., a password). Current biometric systems make use of fingerprints, hand geometry, iris, retina, face, hand vein, facial thermograms, signature, voice characteristics, palmprint, gait, etc. to establish a person’s identity [1]. Besides bolstering security and discouraging identity fraud, biometric systems also introduce an aspect of user convenience that may not be possible using traditional security techniques. For example, they alleviate the need for a user to “remember” the PINS and passwords associated with multiple applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jain, A.K., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)

    Google Scholar 

  2. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, NY (2003)

    MATH  Google Scholar 

  3. Philips, P.J., Grother, P., Micheals, R.J., Blackburn, D.M., Tabassi, E., Bone, J.M.: FRVT 2002: Overview and Summary (2002), Available from http://www.frvt.org/FRVT2002/

  4. Ross, A., Jain, A.K.: Information Fusion in Biometrics. Pattern Recognition Letters, Special Issue on Multimodal Biometrics (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jain, A.K. (2003). Who’s Who? Challenges in Biometric Authentication. In: Michaelis, B., Krell, G. (eds) Pattern Recognition. DAGM 2003. Lecture Notes in Computer Science, vol 2781. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45243-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45243-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40861-1

  • Online ISBN: 978-3-540-45243-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics