ABSTRACT
This paper presents a conceptual framework for testing the implementation of biometric algorithms within Unix and Windows NT/2000 operating systems' login authentication. To support the analysis and evaluation of biometric algorithms, a data logging module will be used, enabling the collection of quantitative data, e.g. timestamps, biometric raw data, (pre)processed data, and return codes from each run of a biometric authentication. It is shown how biometric algorithms and a data logging module can be integrated into Unix and Windows NT/2000. In addition to the explained system components a human observer is necessary to collect extended data like user behavior and environmental conditions, which cannot be automatically recorded by the data logging module. From the combination of these two types of data, conclusions on the biometric algorithm in the context of its implementation in operating systems' authentication can be drawn. The resulting benefits for the development of appropriate biometric algorithms concerning aspects of robustness (security, safety), performance measures and usability will be discussed for iris-biometrics.
- Microsoft Developer's Library. http://msdn.microsoft.com, 2001.Google Scholar
- Biometrics Working Group (BWG): Best Practices in Testing and Reporting Performance of Biometric Devices, Version 1.0, http://www.cesg.gov.uk/biometrics/, January 2000.Google Scholar
- A. Brömme. A Discussion on Privacy Needs and (Mis)Use of Biometric IT-Systems. In Proceedings of the IFIP WG 9.6/11.7 Working Conference on Security and Control of IT in Society (SCITS-II), 15-16 June 2001, Bratislava, Slovakia, pages 145-156, 2001.Google Scholar
- F. Büllingen and A. Hillebrand. Vergleichende Untersuchung biometrischer Identifikationssysteme (BIOIS) - Teiluntersuchung Technikfolgen-Abschätzung. Technical report, Bundesamt für Sicherheit in der Informationstechnik (BSI) und Frauenhofer Institut für Graphische Datenverarbeitung (IGD), March 2000.Google Scholar
- Bundesamt für Sicherheit in der Informationstechnik (BSI). Studie BIOIS: Vergleichende Untersuchung biometrischer Identifikationssysteme - Technische Untersuchung, Offener Abschlussbericht, May 2001.Google Scholar
- J. G. Daugman. Recognizing Persons by their Iris-Patterns. In {8}, 1999. Google ScholarDigital Library
- W. M. E. Hart. Adler's Physiology of the Eye - Clinical Application. Mosby-Year Book Inc., 1992.Google Scholar
- A. K. Jain, R. Bolle, and S. E. Pankanti. Biometrics-Personal Identification in Networked Society. Kluwer Academic Publishers, 1999. Google ScholarDigital Library
- T. Klein. Linux-Sicherheit: Security mit Open-Source-Software. dpunkt-Verlag, Heidelberg, 2001.Google Scholar
- M. Kronberg. Implementation eines biometrischen Authentisierungssystems in Windows NT. Master's thesis, Supervisors: K. Brunnstein and A. Brömme. Faculty of Informatics, University of Hamburg, AGN, 2001.Google Scholar
- G. E. Lassmann. Bewertungskriterien zur Vergleichbarkeit biometrischer Verfahren - Kriterienkatalog. Technical report, Arbeitsgruppe 6: Biometrische Identifikationsverfahren, TeleTrust Deutschland e.V., August 1998.Google Scholar
- T. Mansfield, G. Kelly, D. Chandler, and J. Kane. Biometric Product Testing Final Report. Technical report, Centre for Mathematics and Scientific Computing, National Physical Laboratory, 2001.Google Scholar
- D. Polemi. Biometric Techniques: Review and Evaluation of Biometric Techniques for Identification and Authentication - Final Report. Technical report, Institute of Communication and Computer Systems, National Technical University of Athens, April 1995.Google Scholar
- V. Samar and C. Lai. Making Login Services Independent of Authentication Technologies. Technical report, SunSoft, Inc., 1995.Google Scholar
- V. Samar and R. J. Schemers. Unified Login with Pluggable Authentication Modules (PAM). Technical report, SunSoft, Inc., 1995.Google Scholar
- R. E. Walsh. Single Sign-On in Windows NT, 2000 & The Solaris Operating Environment: A Review. Technical report, Sun Laboratories, 2001.Google Scholar
- J. L. E. Wayman. National Biometric Test Center - Collected Works 1997-2000, August 2000.Google Scholar
- D. D. Zhang. Automated Biometrics - Technologies and Systems. Kluwer Academic Publishers, Boston, 2000.Google Scholar
Index Terms
- A conceptual framework for testing biometric algorithms within operating systems' authentication
Recommendations
Biometric Authentication by Handwriting Using Leap Motion
IMCOM '16: Proceedings of the 10th International Conference on Ubiquitous Information Management and CommunicationIn recent years, biometrics authentication becomes popular. No key is required in biometrics authentication while password must be remembered in password authentication. Moreover, living parts for biometrics authentication cannot be stolen with usual ...
An efficient approach to iris detection for iris biometric processing
Detection of iris in an eye image poses a number of challenges, such as inferior image quality, occlusion of eyelids, eyelashes etc. Owing to these problems, it is not possible to achieve 100% accuracy in any iris-based biometric authentication system. ...
One-Shot-Learning for Visual Lip-Based Biometric Authentication
Advances in Visual ComputingAbstractLip-based biometric authentication is the process of verifying an individual’s identity based on visual information taken from lips whilst speaking. To date research in this area has involved more traditional approaches and inconsistent results ...
Comments