Preface |
|
xiii | |
|
1 An Introduction to Biometrics |
|
|
1 | (10) |
|
|
|
1 | (2) |
|
1.2 Basic Functions of Biometrics |
|
|
3 | (1) |
|
1.3 Typical Biometric Systems |
|
|
4 | (2) |
|
1.4 How to Evaluate a Biometric System |
|
|
6 | (2) |
|
|
8 | (3) |
|
2 Fingerprint Recognition |
|
|
11 | (18) |
|
|
|
|
|
|
11 | (1) |
|
2.2 Fingerprint Acquisition |
|
|
12 | (3) |
|
2.3 Fingerprint Processing |
|
|
15 | (4) |
|
2.3.1 Ridge Orientation Estimation |
|
|
15 | (2) |
|
2.3.2 Ridge Orientation Modeling |
|
|
17 | (1) |
|
2.3.3 Fingerprint Image Enhancement |
|
|
18 | (1) |
|
|
19 | (3) |
|
2.4.1 Singular Point Detection |
|
|
20 | (2) |
|
|
22 | (2) |
|
2.5.1 Level-1 Matching Approach |
|
|
22 | (1) |
|
2.5.2 Level-2 Matching Approach: Minutiae Matching |
|
|
23 | (1) |
|
2.5.3 Level-3 Matching Approach |
|
|
24 | (1) |
|
|
24 | (5) |
|
3 Face Detection and Recognition |
|
|
29 | (36) |
|
|
|
29 | (2) |
|
|
31 | (7) |
|
|
31 | (1) |
|
3.2.1.1 Knowledge-based methods |
|
|
32 | (1) |
|
3.2.1.2 Feature-based methods |
|
|
32 | (2) |
|
3.2.1.3 Template-matching methods |
|
|
34 | (2) |
|
3.2.1.4 Appearance-based methods |
|
|
36 | (1) |
|
|
37 | (1) |
|
3.3 Classical Face Detection Algorithms |
|
|
38 | (17) |
|
3.3.1 AdaBoost Face Detection |
|
|
38 | (3) |
|
3.3.1.1 Attentional cascade |
|
|
41 | (1) |
|
3.3.2 SNoW Face Detection |
|
|
41 | (3) |
|
3.3.3 Rank-Deficient Face Detection |
|
|
44 | (3) |
|
3.3.4 Gabor-Based Neural Networks |
|
|
47 | (2) |
|
3.3.5 Neural Network-Based Face Detection |
|
|
49 | (2) |
|
|
51 | (4) |
|
3.4 Classical Face Recognition Algorithms |
|
|
55 | (6) |
|
|
55 | (2) |
|
|
57 | (2) |
|
|
59 | (2) |
|
3.5 Conclusions and Outlook |
|
|
61 | (4) |
|
|
65 | (22) |
|
|
|
|
|
|
66 | (1) |
|
4.2 Iris Recognition Algorithms |
|
|
67 | (10) |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
71 | (1) |
|
4.2.4 Template Generation |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (3) |
|
4.3 Some Applications of Iris Recognition |
|
|
77 | (4) |
|
4.3.1 PC-Tethered Systems |
|
|
77 | (1) |
|
|
77 | (1) |
|
4.3.3 Walk-Through Portal Systems |
|
|
78 | (1) |
|
|
79 | (2) |
|
4.4 Current Research Areas |
|
|
81 | (6) |
|
4.4.1 Off-Axis Iris Recognition |
|
|
82 | (1) |
|
4.4.2 Iris Recognition at a Distance |
|
|
82 | (2) |
|
4.4.3 Multispectral Iris Recognition |
|
|
84 | (3) |
|
5 Speaker Recognition for Biometric Systems |
|
|
87 | (30) |
|
|
|
|
87 | (1) |
|
|
88 | (1) |
|
5.3 Voice-Based Recognition Systems |
|
|
89 | (2) |
|
5.4 Preprocessing Algorithms |
|
|
91 | (3) |
|
5.4.1 A/D Conversion and Pre-emphasis |
|
|
91 | (1) |
|
5.4.2 Framing and Windowing |
|
|
91 | (3) |
|
|
94 | (7) |
|
5.5.1 Short-term Analysis |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
97 | (2) |
|
5.5.4 Mel Frequency Cepstrum |
|
|
99 | (2) |
|
5.5.5 Intersession Variability |
|
|
101 | (1) |
|
|
101 | (8) |
|
5.6.1 Dynamic Time Warping |
|
|
102 | (1) |
|
5.6.2 Vector Quantization |
|
|
103 | (1) |
|
5.6.3 Hidden Markov Model |
|
|
104 | (2) |
|
5.6.4 Gaussian Mixture Modeling |
|
|
106 | (1) |
|
5.6.4.1 Expectation maximization |
|
|
107 | (1) |
|
5.6.5 GMM Likelihood Ratio |
|
|
108 | (1) |
|
5.7 State of the Art in Speaker Recognition Systems |
|
|
109 | (2) |
|
|
111 | (6) |
|
|
117 | (16) |
|
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (3) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (2) |
|
|
121 | (1) |
|
6.3.2 Palmprint Recognition |
|
|
122 | (1) |
|
6.4 The Future of Palm Recognition |
|
|
123 | (5) |
|
|
123 | (1) |
|
|
124 | (1) |
|
6.4.1.2 Hand geometry and palm |
|
|
125 | (1) |
|
6.4.2 3D Palm Recognition |
|
|
125 | (2) |
|
6.4.3 Touchless Palm Recognition |
|
|
127 | (1) |
|
|
128 | (5) |
|
|
133 | (16) |
|
|
|
|
134 | (2) |
|
|
136 | (4) |
|
|
136 | (1) |
|
7.2.2 Multiple Snapshots of the Same Trait |
|
|
137 | (1) |
|
7.2.3 Multiple Representations and Matching Algorithms of the Same Trait |
|
|
138 | (1) |
|
7.2.4 Score Fusion Methods |
|
|
139 | (1) |
|
|
140 | (2) |
|
7.3.1 Human Identification |
|
|
141 | (1) |
|
|
141 | (1) |
|
7.3.3 Identification Cards |
|
|
142 | (1) |
|
|
142 | (7) |
|
8 Biometrics on Smart Card |
|
|
149 | (16) |
|
|
|
|
|
149 | (2) |
|
8.2 Fingerprint Matching Algorithm |
|
|
151 | (2) |
|
8.3 An Overview of Local and Global Structure |
|
|
153 | (2) |
|
8.4 Work Sharing Mechanism for On-Card Comparison |
|
|
155 | (3) |
|
|
158 | (1) |
|
|
159 | (2) |
|
8.7 Performance Comparison |
|
|
161 | (1) |
|
|
161 | (4) |
|
9 Smart Clothes for Biometrics and Beyond |
|
|
165 | (22) |
|
|
|
|
|
|
165 | (3) |
|
9.2 Smart Textile Sensors |
|
|
168 | (7) |
|
|
170 | (1) |
|
|
171 | (2) |
|
9.2.3 Textile-Based Piezo Sensor |
|
|
173 | (2) |
|
9.3 Smart Clothing as a Biomonitoring Platform |
|
|
175 | (3) |
|
9.4 Biometrics and Intelligent Services |
|
|
178 | (3) |
|
9.5 Conclusions and Future Work |
|
|
181 | (6) |
|
10 Spoof and Vulnerability of Biometric Systems |
|
|
187 | (26) |
|
|
|
187 | (3) |
|
10.2 Background: Doddington's Taxonomy |
|
|
190 | (1) |
|
10.3 Classification of Vulnerability |
|
|
191 | (1) |
|
10.3.1 Internal and External Vulnerabilities |
|
|
191 | (1) |
|
10.4 Biometric System Architecture Vulnerabilities |
|
|
192 | (7) |
|
|
193 | (1) |
|
|
193 | (2) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
10.5 Analysis of Vulnerabilities: Attack Trees |
|
|
199 | (1) |
|
10.6 Spoof vs. Common Biometric Technologies |
|
|
200 | (3) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
10.7 Reasons for Exploitation and Attacks |
|
|
203 | (2) |
|
|
204 | (1) |
|
10.7.2 Avoid Identification |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
10.8 Approaches to Safeguard Against Vulnerability |
|
|
205 | (6) |
|
|
206 | (1) |
|
|
207 | (2) |
|
10.8.3 Human Verification |
|
|
209 | (1) |
|
10.8.4 Multimodal Biometrics |
|
|
209 | (1) |
|
10.8.5 Passive and Active Biometrics |
|
|
209 | (1) |
|
10.8.6 Mitigation of Weak Users |
|
|
210 | (1) |
|
10.8.7 Biometric Encryption |
|
|
211 | (1) |
|
10.8.8 Revocable Biometrics |
|
|
211 | (1) |
|
|
211 | (2) |
|
11 Challenges in Biometrics: Accessibility, Usability, and the Legal Framework |
|
|
213 | (20) |
|
|
|
213 | (1) |
|
11.2 A Real Challenge for Biometrics |
|
|
214 | (1) |
|
|
215 | (2) |
|
|
217 | (5) |
|
11.4.1 The Fragmentation of the Privacy Issues |
|
|
218 | (2) |
|
11.4.2 Some Considerations on the Proportionality Principle Applied in the Context of the Biometric Technologies |
|
|
220 | (2) |
|
11.5 Accessibility and Usability in Biometrics |
|
|
222 | (3) |
|
11.5.1 The Elderly Dilemma |
|
|
223 | (1) |
|
11.5.2 Biometric Disabilities |
|
|
224 | (1) |
|
11.5.3 Voluntary Permanent Modifications |
|
|
225 | (1) |
|
11.6 Medical Aspects of Biometrics |
|
|
225 | (2) |
|
11.6.1 Direct Medical Implications |
|
|
226 | (1) |
|
11.6.2 Indirect Medical Implications |
|
|
227 | (1) |
|
11.7 Some Ethical Factors of Biometrics |
|
|
227 | (2) |
|
11.7.1 The Human Body as Password: Biometric Characteristics in "Good Shape" |
|
|
227 | (1) |
|
11.7.2 Biometrics in Preventing Human Trafficking |
|
|
228 | (1) |
|
11.8 The Standardization Activity |
|
|
229 | (1) |
|
11.8.1 The ISO/IEC JTC1 SC 37 "Biometrics" WG 6 on Cross-Jurisdictional and Societal Issues |
|
|
230 | (1) |
|
|
230 | (3) |
|
12 Cancellable Biometrics |
|
|
233 | (20) |
|
|
|
|
|
234 | (3) |
|
|
237 | (4) |
|
12.2.1 Noninvertible Feature Transformation Approach |
|
|
238 | (2) |
|
|
240 | (1) |
|
|
241 | (3) |
|
12.3.1 Electronic Passport |
|
|
242 | (1) |
|
12.3.2 Fingerprint Recognition ATMs |
|
|
243 | (1) |
|
12.3.3 Face Recognition Vending Machines |
|
|
243 | (1) |
|
12.4 Research Areas for Biometrics Security |
|
|
244 | (9) |
|
13 Continuous Biometric Verification |
|
|
253 | (32) |
|
|
|
|
253 | (3) |
|
|
256 | (3) |
|
13.2.1 Authentication Systems |
|
|
256 | (1) |
|
13.2.2 Biometrics and Multifactor Authentication |
|
|
257 | (2) |
|
13.3 Overview and Analysis of Existing Continuous Verification Approaches |
|
|
259 | (6) |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
261 | (2) |
|
|
263 | (1) |
|
13.3.5 Facial Recognition |
|
|
264 | (1) |
|
13.4 Video-Based Facial Recognition |
|
|
265 | (3) |
|
13.5 System Implementation |
|
|
268 | (7) |
|
13.5.1 System Architecture |
|
|
269 | (1) |
|
|
269 | (1) |
|
13.5.1.2 Face detection module |
|
|
270 | (1) |
|
13.5.1.3 Face segmentation module |
|
|
270 | (1) |
|
13.5.1.4 Lighting normalization module |
|
|
270 | (2) |
|
13.5.1.5 Facial feature matching module |
|
|
272 | (1) |
|
13.5.1.6 Graphical user interface |
|
|
272 | (1) |
|
13.5.2 Continuous Verification Workflow |
|
|
273 | (2) |
|
|
275 | (3) |
|
|
278 | (7) |
|
|
285 | (16) |
|
|
|
14.1 Introduction: Current Situation of Biometric Technology |
|
|
285 | (1) |
|
14.2 Trends in Biometric Technology |
|
|
286 | (9) |
|
|
286 | (1) |
|
|
286 | (1) |
|
14.2.1.2 Hacking and privacy attacking |
|
|
286 | (2) |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
14.2.5.1 Combinational consent biometric scheme |
|
|
291 | (1) |
|
14.2.5.2 Incorporating consent biometric scheme |
|
|
291 | (1) |
|
|
292 | (1) |
|
14.2.7 Biometrics Surveillance |
|
|
292 | (1) |
|
|
293 | (1) |
|
14.2.9 More Accurate and Robust |
|
|
294 | (1) |
|
|
294 | (1) |
|
14.2.11 More User-Friendly |
|
|
294 | (1) |
|
|
295 | (1) |
|
14.3 Trends in the Biometric Market |
|
|
295 | (2) |
|
|
297 | (4) |
Index |
|
301 | |