Skip to main content

Nineteen Urgent Research Topics in Biometrics and Identity Management

  • Conference paper
Biometrics and Identity Management (BioID 2008)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 5372))

Included in the following conference series:

Abstract

Biometric technologies are being increasingly deployed in practical applications but are currently mainly driven by governmental initiatives, ranging from border control applications to national ID programmes, with increasing social and legal impact on everyday’s life. However, biometrics offer wider opportunities and their application as enabling technology for modern identity management systems, having a more user-centred approach, will be more important in the near future. In this paper we give an overview of the most important research topics for Biometrics and Identity Management for the near future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Salah, A.A., Morros, R., Luque, J., Segura, C., Hernando, J., Ambekar, O., Schouten, B., Pauwels, E.: Multimodal identification and localization of users in a smart environment. Journal on Multimodal Interfaces 2(2) (September 2008)

    Google Scholar 

  2. Fleuret, F., Berclaz, J., Lengagne, R., Fua, P.: Multi-camera people tracking with a probabilistic occupancy map. IEEE Trans. Pattern Anal. Mach. Intell. 30(2), 267–282 (2008)

    Article  Google Scholar 

  3. Stanford, V., Garofolo, J., Galibert, O., Michel, M., Laprun, C.: The NIST smart space and meeting room projects: signals, acquisition, annotation, and metrics. In: Proc. ICCASP, vol. 4, pp. 736–739 (2003)

    Google Scholar 

  4. Kortuem, G., Finney, J., Lea, R., Sundramoorthy, V. (eds.): Smart Sensing and Context. Proceedings of the 3rd European Conference, EuroSSC 2008, Zurich, Switzerland. LNCS, vol. 5279. Springer, Heidelberg (2008)

    Google Scholar 

  5. Chandra Mukhopadhyay, S., Sen Gupta, G. (eds.): Smart Sensors and Sensing Technology. Lecture Notes in Electrical Engineering, vol. 20 (2008)

    Google Scholar 

  6. Picard, R.W.: Affective Computing. MIT Press, Cambridge (1997)

    Book  Google Scholar 

  7. Jain, A., Dass, S.C., Nandakumar, K.: Soft Biometric Traits for Personal Recognition Systems. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Ambekar, O., Pauwels, E., Schouten, B.: Binding Low Level Features To Support Opportunistic Person Identification. In: 28th Symposium on Information Theory, May 24-25, Enschede, The Netherlands (2007)

    Google Scholar 

  9. Grother, P., Tabassi, E.: Performance of Biometric Quality Measures. IEEE Trans. on PAMI 29(4), 531–543 (2007)

    Article  Google Scholar 

  10. Poh, N., Kittler, J.: A Family of Methods for Quality-based Multimodal Biometric Fusion using Generative Classifiers. In: Proceedings of IEEE 10th International Conference on Control, Automation, Robotics and Vision (ICARCV), Hanoi (2008)

    Google Scholar 

  11. Poh, N., Heusch, G., Kittler, J.: On combination of face authentication experts by a mixture of quality dependent fusion classifiers. In: Haindl, M., Kittler, J., Roli, F. (eds.) MCS 2007. LNCS, vol. 4472, pp. 344–356. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Fiérrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J., Bigün, J.: Discriminative multimodal biometric authentication based on quality measures. Pattern Recognition 38(5), 777–779 (2005)

    Article  Google Scholar 

  13. Goh, A., Ngo, D.: Computation of cryptographic keys from face biometrics. Proc. Comm. and Multimedia Security, 1–13 (2003)

    Google Scholar 

  14. Cheung, K., Kong, A., Zhang, D., Kamel, M., You, J., Toby, H.: An analysis on accuracy of cancelable biometrics based on bioHashing. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS, vol. 3683, pp. 1168–1172. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Linnartz, J., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Jain, A., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing 8(2) (2008)

    Google Scholar 

  17. Juels, A., Sudan, M.: A Fuzzy Vault Scheme. Designs, Codes and Cryptography 38(2), 237–257 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  18. Wayman, J.L.: Technical Testing and Evaluation of Biometric Identification Devices. In: Jain, A., et al. (eds.) Biometrics: Personal Identification in a Networked Society. Kluwer Academic Press, Dordrecht (1999)

    Google Scholar 

  19. Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance Evaluation of Fingerprint Verification Systems. IEEE Trans. on PAMI 28(1), 3–18 (2006)

    Article  Google Scholar 

  20. Przybocki, M., Martin, A.: Speaker Recognition Evaluation Chronicles. In: Proc. Odyssey 2004, The Speaker and Language Recognition Workshop (2004), http://www.nist.gov/speech/publications/./papersrc/ody2004NIST-v1.pdf

  21. Jain, A.K., Pankanti, S., Prabhakar, S., Hong, L., Ross, A., Wayman, J.L.: Biometrics: A Grand Challenge. In: Proc. International Conference on Pattern Recognition (ICPR), Cambridge, UK, vol. II, pp. 935–942 (August 2004)

    Google Scholar 

  22. Hildebrandt, M., Backhouse, J. (eds.): FIDIS Deliverable D7.2: Descriptive analysis and inventory of profiling practices, Frankfurt a.M (2005), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp7-del7.2.profiling_practices.pdf

  23. Nabeth, T., Hildebrandt, M. (eds.): FIDIS Deliverable D2.1: Inventory of topics and clusters, Frankfurt a.M (2005), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp2-del2.1_Inventory_of_topics_and_clusters.pdf

  24. Bauer, M., Meints, M., Hansen, M. (eds.): FIDIS Deliverable D3.1 Structured Overview on Prototypes and Concepts of Identity Management Systems, Frankfurt a.M (2005), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.1.overview_on_IMS.final.pdf

  25. Wayman, J.L.: Biometrics in Identity Management Systems. IEEE Security & Privacy 6(2), 30–37 (2008)

    Article  Google Scholar 

  26. Ioannis Maghiros (Project Leader) et alters, Biometrics at the Frontiers: Assessing the Impact on Society. Report EUR 21585 EN. European Commission Joint Research Centre (DG JRC). Institute for Prospective Technological Studies (2005), http://www.jrc.es

  27. Jain, K., Pankanti, S.: A Touch of Money. IEEE Spectrum, 22–27 (July 2006)

    Google Scholar 

  28. Biometric Consortium Conference (BC 2008), Tampa, FL, USA, http://www.biometrics.org/bc2008/

  29. Schouten, B., Jacobs, B.: Biometrics and their use in e-passports. Journal for Image and Computer Vision. IMAVIS 2726 (June 2008)

    Google Scholar 

  30. Toledanoa, D.T., Pozob, R.F., Trapoteb, Á.H., Gómez, L.H.: Usability evaluation of multi-modal biometric verification systems. Interacting with Computers 18(5), 1101–1122 (2006)

    Google Scholar 

  31. Verbitskiy, E., Tuyls, P., Denteneer, D.: JP Linnartz - Reliable biometric authentication with privacy protection. In: Proc. 24th Benelux Symposium on Information theory (2003)

    Google Scholar 

  32. Biometrics Testing and Statistics. Document developed by the NSTC Subcommittee on Biometrics and Identity Management (2006), http://www.biometrics.gov/Documents/BioTestingAndStats.pdf

  33. Wayman, J., Jain, A., Maltoni, D., Maio, D.: Biometric Systems. Springer, Heidelberg (2005)

    Book  Google Scholar 

  34. The National Biometrics Challenge Report of the National Science and Technology Council (August 2006), http://www.biometrics.gov/Documents/biochallengedoc.pdf

  35. Kukula, E.P., Elliott, S.J.: Implementing Ergonomic Principles in a Biometric System: A Look at the Human Biometric Sensor Interaction (HBSI). In: The 40th Annual IEEE International Carnahan Conference on Security Technology, pp. 86–91 (2006)

    Google Scholar 

  36. Alba-Castro, J.L., Otero, E., González, E., Garcia-Mateo, C., Marquez, O.: An open framework for distributed biometric authentication in a web environment. Annals of Telecommunication 62(1-2), 1702–1717 (2007)

    Google Scholar 

  37. Tistarelli, M., Bigun, J., Grosso, E. (eds.): Advanced Studies in Biometrics. LNCS, vol. 3161. Springer, Heidelberg (2005)

    Google Scholar 

  38. Advanced Studies in Biometrics: Summer School on Biometrics, Alghero, Italy, June 5-9, 2006. New Sensors, Evaluation and Database Collection (2006), http://biometrics.uniss.it/2006/index.php

  39. Deravi, F.: Biometrics Standards. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics Sensors Systems and Algorithms. Springer, Heidelberg (2008)

    Google Scholar 

  40. European Committee for Standardization (CEN); focus group on Biometrics. Website, http://www.cen.eu/CENORM/sectors/sectors/isss/focus/biometrics_fg.asp

  41. European Biometrics Forum, http://www.eubiometricsforum.com

  42. Bernecker, O.: Biometrics security: An end user perspective. Information Security Technical Report, vol. 11(3), pp. 111–118. Elsevier, Amsterdam (2006)

    Google Scholar 

  43. BIOVISION: Roadmap for biometrics in Europe to 2010 (2003), http://www.eubiometricsforum.com/dmdocuments/BIOVISIONRoadmap.pdf

  44. Hes, R., Hooghiemstra, T.F.M., Borking, J.J.: At face value: on biometrical identification and privacy, The Hague (1999), http://www.dutchdpa.nl/documenten/EN_av_15_At_face_value.shtml

  45. Schouten, B.A.M., Salah, A.A.: Empowering the End-user in Biometrics. In: Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision, ICARCV 2008, Hanoi, Vietnam (to appear, 2008)

    Google Scholar 

  46. Kindt, E., Müller, L. (eds.): FIDIS Deliverable D3.10: Biometrics in identity management, Frankfurt a.M (2007), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.10.biometrics_in_identity_management.pdf

  47. Article 29 Data Protection Working Party (WP29), Working Paper 80, Brüssel (August 2003), http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2003/wp80_en.pdf

  48. Cavoukian, A., Stoianov, A., Carter, F.: Biometric Encryption: Technology for Strong Authentication, Security and Privacy. In: Policies and Research in Identity Management, Proc. Idman 2007 (2008)

    Google Scholar 

  49. Rejman-Greene, M.: Privacy issues in the application of biometrics: a European perspective in biometric systems. In: Wayman, J., Jain, A., Maltoni, D., Maio, D. (eds.) Biometric Systems, Springer, Heidelberg (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schouten, B., Tistarelli, M., Garcia-Mateo, C., Deravi, F., Meints, M. (2008). Nineteen Urgent Research Topics in Biometrics and Identity Management. In: Schouten, B., Juul, N.C., Drygajlo, A., Tistarelli, M. (eds) Biometrics and Identity Management. BioID 2008. Lecture Notes in Computer Science, vol 5372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89991-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89991-4_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89990-7

  • Online ISBN: 978-3-540-89991-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics