Abstract
Biometric technologies are being increasingly deployed in practical applications but are currently mainly driven by governmental initiatives, ranging from border control applications to national ID programmes, with increasing social and legal impact on everyday’s life. However, biometrics offer wider opportunities and their application as enabling technology for modern identity management systems, having a more user-centred approach, will be more important in the near future. In this paper we give an overview of the most important research topics for Biometrics and Identity Management for the near future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Salah, A.A., Morros, R., Luque, J., Segura, C., Hernando, J., Ambekar, O., Schouten, B., Pauwels, E.: Multimodal identification and localization of users in a smart environment. Journal on Multimodal Interfaces 2(2) (September 2008)
Fleuret, F., Berclaz, J., Lengagne, R., Fua, P.: Multi-camera people tracking with a probabilistic occupancy map. IEEE Trans. Pattern Anal. Mach. Intell. 30(2), 267–282 (2008)
Stanford, V., Garofolo, J., Galibert, O., Michel, M., Laprun, C.: The NIST smart space and meeting room projects: signals, acquisition, annotation, and metrics. In: Proc. ICCASP, vol. 4, pp. 736–739 (2003)
Kortuem, G., Finney, J., Lea, R., Sundramoorthy, V. (eds.): Smart Sensing and Context. Proceedings of the 3rd European Conference, EuroSSC 2008, Zurich, Switzerland. LNCS, vol. 5279. Springer, Heidelberg (2008)
Chandra Mukhopadhyay, S., Sen Gupta, G. (eds.): Smart Sensors and Sensing Technology. Lecture Notes in Electrical Engineering, vol. 20 (2008)
Picard, R.W.: Affective Computing. MIT Press, Cambridge (1997)
Jain, A., Dass, S.C., Nandakumar, K.: Soft Biometric Traits for Personal Recognition Systems. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072. Springer, Heidelberg (2004)
Ambekar, O., Pauwels, E., Schouten, B.: Binding Low Level Features To Support Opportunistic Person Identification. In: 28th Symposium on Information Theory, May 24-25, Enschede, The Netherlands (2007)
Grother, P., Tabassi, E.: Performance of Biometric Quality Measures. IEEE Trans. on PAMI 29(4), 531–543 (2007)
Poh, N., Kittler, J.: A Family of Methods for Quality-based Multimodal Biometric Fusion using Generative Classifiers. In: Proceedings of IEEE 10th International Conference on Control, Automation, Robotics and Vision (ICARCV), Hanoi (2008)
Poh, N., Heusch, G., Kittler, J.: On combination of face authentication experts by a mixture of quality dependent fusion classifiers. In: Haindl, M., Kittler, J., Roli, F. (eds.) MCS 2007. LNCS, vol. 4472, pp. 344–356. Springer, Heidelberg (2007)
Fiérrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J., Bigün, J.: Discriminative multimodal biometric authentication based on quality measures. Pattern Recognition 38(5), 777–779 (2005)
Goh, A., Ngo, D.: Computation of cryptographic keys from face biometrics. Proc. Comm. and Multimedia Security, 1–13 (2003)
Cheung, K., Kong, A., Zhang, D., Kamel, M., You, J., Toby, H.: An analysis on accuracy of cancelable biometrics based on bioHashing. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS, vol. 3683, pp. 1168–1172. Springer, Heidelberg (2005)
Linnartz, J., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)
Jain, A., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing 8(2) (2008)
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. Designs, Codes and Cryptography 38(2), 237–257 (2006)
Wayman, J.L.: Technical Testing and Evaluation of Biometric Identification Devices. In: Jain, A., et al. (eds.) Biometrics: Personal Identification in a Networked Society. Kluwer Academic Press, Dordrecht (1999)
Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance Evaluation of Fingerprint Verification Systems. IEEE Trans. on PAMI 28(1), 3–18 (2006)
Przybocki, M., Martin, A.: Speaker Recognition Evaluation Chronicles. In: Proc. Odyssey 2004, The Speaker and Language Recognition Workshop (2004), http://www.nist.gov/speech/publications/./papersrc/ody2004NIST-v1.pdf
Jain, A.K., Pankanti, S., Prabhakar, S., Hong, L., Ross, A., Wayman, J.L.: Biometrics: A Grand Challenge. In: Proc. International Conference on Pattern Recognition (ICPR), Cambridge, UK, vol. II, pp. 935–942 (August 2004)
Hildebrandt, M., Backhouse, J. (eds.): FIDIS Deliverable D7.2: Descriptive analysis and inventory of profiling practices, Frankfurt a.M (2005), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp7-del7.2.profiling_practices.pdf
Nabeth, T., Hildebrandt, M. (eds.): FIDIS Deliverable D2.1: Inventory of topics and clusters, Frankfurt a.M (2005), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp2-del2.1_Inventory_of_topics_and_clusters.pdf
Bauer, M., Meints, M., Hansen, M. (eds.): FIDIS Deliverable D3.1 Structured Overview on Prototypes and Concepts of Identity Management Systems, Frankfurt a.M (2005), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.1.overview_on_IMS.final.pdf
Wayman, J.L.: Biometrics in Identity Management Systems. IEEE Security & Privacy 6(2), 30–37 (2008)
Ioannis Maghiros (Project Leader) et alters, Biometrics at the Frontiers: Assessing the Impact on Society. Report EUR 21585 EN. European Commission Joint Research Centre (DG JRC). Institute for Prospective Technological Studies (2005), http://www.jrc.es
Jain, K., Pankanti, S.: A Touch of Money. IEEE Spectrum, 22–27 (July 2006)
Biometric Consortium Conference (BC 2008), Tampa, FL, USA, http://www.biometrics.org/bc2008/
Schouten, B., Jacobs, B.: Biometrics and their use in e-passports. Journal for Image and Computer Vision. IMAVIS 2726 (June 2008)
Toledanoa, D.T., Pozob, R.F., Trapoteb, Á.H., Gómez, L.H.: Usability evaluation of multi-modal biometric verification systems. Interacting with Computers 18(5), 1101–1122 (2006)
Verbitskiy, E., Tuyls, P., Denteneer, D.: JP Linnartz - Reliable biometric authentication with privacy protection. In: Proc. 24th Benelux Symposium on Information theory (2003)
Biometrics Testing and Statistics. Document developed by the NSTC Subcommittee on Biometrics and Identity Management (2006), http://www.biometrics.gov/Documents/BioTestingAndStats.pdf
Wayman, J., Jain, A., Maltoni, D., Maio, D.: Biometric Systems. Springer, Heidelberg (2005)
The National Biometrics Challenge Report of the National Science and Technology Council (August 2006), http://www.biometrics.gov/Documents/biochallengedoc.pdf
Kukula, E.P., Elliott, S.J.: Implementing Ergonomic Principles in a Biometric System: A Look at the Human Biometric Sensor Interaction (HBSI). In: The 40th Annual IEEE International Carnahan Conference on Security Technology, pp. 86–91 (2006)
Alba-Castro, J.L., Otero, E., González, E., Garcia-Mateo, C., Marquez, O.: An open framework for distributed biometric authentication in a web environment. Annals of Telecommunication 62(1-2), 1702–1717 (2007)
Tistarelli, M., Bigun, J., Grosso, E. (eds.): Advanced Studies in Biometrics. LNCS, vol. 3161. Springer, Heidelberg (2005)
Advanced Studies in Biometrics: Summer School on Biometrics, Alghero, Italy, June 5-9, 2006. New Sensors, Evaluation and Database Collection (2006), http://biometrics.uniss.it/2006/index.php
Deravi, F.: Biometrics Standards. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics Sensors Systems and Algorithms. Springer, Heidelberg (2008)
European Committee for Standardization (CEN); focus group on Biometrics. Website, http://www.cen.eu/CENORM/sectors/sectors/isss/focus/biometrics_fg.asp
European Biometrics Forum, http://www.eubiometricsforum.com
Bernecker, O.: Biometrics security: An end user perspective. Information Security Technical Report, vol. 11(3), pp. 111–118. Elsevier, Amsterdam (2006)
BIOVISION: Roadmap for biometrics in Europe to 2010 (2003), http://www.eubiometricsforum.com/dmdocuments/BIOVISIONRoadmap.pdf
Hes, R., Hooghiemstra, T.F.M., Borking, J.J.: At face value: on biometrical identification and privacy, The Hague (1999), http://www.dutchdpa.nl/documenten/EN_av_15_At_face_value.shtml
Schouten, B.A.M., Salah, A.A.: Empowering the End-user in Biometrics. In: Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision, ICARCV 2008, Hanoi, Vietnam (to appear, 2008)
Kindt, E., Müller, L. (eds.): FIDIS Deliverable D3.10: Biometrics in identity management, Frankfurt a.M (2007), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.10.biometrics_in_identity_management.pdf
Article 29 Data Protection Working Party (WP29), Working Paper 80, Brüssel (August 2003), http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2003/wp80_en.pdf
Cavoukian, A., Stoianov, A., Carter, F.: Biometric Encryption: Technology for Strong Authentication, Security and Privacy. In: Policies and Research in Identity Management, Proc. Idman 2007 (2008)
Rejman-Greene, M.: Privacy issues in the application of biometrics: a European perspective in biometric systems. In: Wayman, J., Jain, A., Maltoni, D., Maio, D. (eds.) Biometric Systems, Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schouten, B., Tistarelli, M., Garcia-Mateo, C., Deravi, F., Meints, M. (2008). Nineteen Urgent Research Topics in Biometrics and Identity Management. In: Schouten, B., Juul, N.C., Drygajlo, A., Tistarelli, M. (eds) Biometrics and Identity Management. BioID 2008. Lecture Notes in Computer Science, vol 5372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89991-4_24
Download citation
DOI: https://doi.org/10.1007/978-3-540-89991-4_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89990-7
Online ISBN: 978-3-540-89991-4
eBook Packages: Computer ScienceComputer Science (R0)