|
|
1 | (50) |
|
|
2 | (1) |
|
|
3 | (7) |
|
1.2.1 Enrollment and recognition phases |
|
|
4 | (1) |
|
|
4 | (2) |
|
1.2.3 Feature extraction module |
|
|
6 | (3) |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.3 Biometric Functionalities |
|
|
10 | (3) |
|
|
10 | (1) |
|
|
11 | (2) |
|
1.4 Biometric System Errors |
|
|
13 | (14) |
|
1.4.1 Performance measures |
|
|
17 | (10) |
|
1.5 The Design Cycle of Biometric Systems |
|
|
27 | (12) |
|
1.5.1 Nature of the application |
|
|
28 | (1) |
|
1.5.2 Choice of biometric trait |
|
|
29 | (7) |
|
|
36 | (1) |
|
1.5.4 Choice of features and matching algorithm |
|
|
36 | (1) |
|
|
37 | (2) |
|
1.6 Applications of Biometric Systems |
|
|
39 | (2) |
|
1.7 Security and Privacy Issues |
|
|
41 | (3) |
|
|
44 | (7) |
|
Bibliographical and Historical Remarks |
|
|
45 | (2) |
|
|
47 | (4) |
|
2 Fingerprint Recognition |
|
|
51 | (46) |
|
|
51 | (3) |
|
2.2 Friction Ridge Pattern |
|
|
54 | (6) |
|
|
54 | (5) |
|
|
59 | (1) |
|
2.3 Fingerprint Acquisition |
|
|
60 | (4) |
|
|
60 | (2) |
|
|
62 | (2) |
|
|
64 | (8) |
|
2.4.1 Ridge orientation and frequency estimation |
|
|
64 | (3) |
|
2.4.2 Singularity extraction |
|
|
67 | (3) |
|
|
70 | (1) |
|
2.4.4 Minutiae extraction |
|
|
71 | (1) |
|
|
72 | (9) |
|
|
74 | (2) |
|
|
76 | (1) |
|
2.5.3 Match score generation |
|
|
77 | (1) |
|
2.5.4 Latent fingerprint matching |
|
|
78 | (2) |
|
2.5.5 Fingerprint individuality |
|
|
80 | (1) |
|
2.5.6 Performance evaluation |
|
|
80 | (1) |
|
|
81 | (3) |
|
2.7 Fingerprint Synthesis |
|
|
84 | (1) |
|
2.7.1 Level 1 feature synthesis |
|
|
84 | (1) |
|
2.7.2 Level 2 feature synthesis |
|
|
85 | (1) |
|
|
85 | (6) |
|
|
87 | (1) |
|
2.8.2 Palmprint recognition in forensics |
|
|
88 | (2) |
|
2.8.3 Palmprint recognition for access control |
|
|
90 | (1) |
|
|
91 | (6) |
|
Bibliographical and Historical Remarks |
|
|
92 | (2) |
|
|
94 | (3) |
|
|
97 | (44) |
|
|
97 | (7) |
|
3.1.1 Psychology of face recognition |
|
|
98 | (2) |
|
|
100 | (3) |
|
3.1.3 Design of a face recognition system |
|
|
103 | (1) |
|
|
104 | (5) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (2) |
|
|
109 | (7) |
|
3.3.1 Viola-Jones face detector |
|
|
111 | (5) |
|
3.4 Feature Extraction and Matching |
|
|
116 | (13) |
|
3.4.1 Appearance-based face recognition |
|
|
118 | (4) |
|
3.4.2 Model-based face recognition |
|
|
122 | (2) |
|
3.4.3 Texture-based face recognition |
|
|
124 | (3) |
|
3.4.4 Performance evaluation |
|
|
127 | (2) |
|
|
129 | (8) |
|
3.5.1 Handling pose, illumination, and expression variations |
|
|
129 | (1) |
|
3.5.2 Heterogeneous face recognition |
|
|
130 | (2) |
|
|
132 | (5) |
|
|
137 | (4) |
|
Bibliographical and Historical Remarks |
|
|
137 | (1) |
|
|
138 | (3) |
|
|
141 | (34) |
|
|
141 | (3) |
|
4.2 Design of an Iris Recognition System |
|
|
144 | (2) |
|
|
146 | (5) |
|
|
151 | (8) |
|
4.4.1 Segmentation using the integro-differential operator |
|
|
152 | (1) |
|
4.4.2 Segmentation using Geodesic Active Contours (GAC) |
|
|
153 | (6) |
|
4.4.3 Generating iris masks |
|
|
159 | (1) |
|
|
159 | (2) |
|
4.6 Iris Encoding and Matching |
|
|
161 | (3) |
|
|
164 | (5) |
|
4.7.1 Quality assessment techniques |
|
|
164 | (5) |
|
4.8 Performance Evaluation |
|
|
169 | (1) |
|
|
170 | (5) |
|
Bibliographical and Historical Remarks |
|
|
171 | (1) |
|
|
172 | (3) |
|
5 Additional Biometric Traits |
|
|
175 | (34) |
|
|
175 | (1) |
|
|
176 | (6) |
|
|
177 | (1) |
|
|
178 | (2) |
|
5.2.3 Challenges in ear recognition |
|
|
180 | (2) |
|
|
182 | (4) |
|
5.3.1 Feature extraction and matching |
|
|
183 | (2) |
|
5.3.2 Challenges in gait recognition |
|
|
185 | (1) |
|
|
186 | (4) |
|
|
186 | (2) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
5.4.5 Challenges in hand geometry recognition |
|
|
190 | (1) |
|
|
190 | (16) |
|
|
191 | (3) |
|
|
194 | (7) |
|
|
201 | (5) |
|
|
206 | (3) |
|
|
207 | (2) |
|
|
209 | (50) |
|
|
209 | (3) |
|
6.2 Sources of Multiple Evidence |
|
|
212 | (9) |
|
6.2.1 Multi-sensor systems |
|
|
213 | (2) |
|
6.2.2 Multi-algorithm systems |
|
|
215 | (2) |
|
6.2.3 Multi-instance systems |
|
|
217 | (1) |
|
6.2.4 Multi-sample systems |
|
|
218 | (1) |
|
|
219 | (2) |
|
6.3 Acquisition and Processing Architecture |
|
|
221 | (3) |
|
6.3.1 Acquisition sequence |
|
|
221 | (1) |
|
6.3.2 Processing sequence |
|
|
222 | (2) |
|
|
224 | (29) |
|
6.4.1 Sensor-level fusion |
|
|
226 | (1) |
|
6.4.2 Feature-level fusion |
|
|
227 | (5) |
|
|
232 | (14) |
|
|
246 | (4) |
|
6.4.5 Decision-level fusion |
|
|
250 | (3) |
|
|
253 | (6) |
|
Bibliographical and Historical Remarks |
|
|
254 | (2) |
|
|
256 | (3) |
|
7 Security Of Biometric Systems |
|
|
259 | (48) |
|
|
259 | (5) |
|
|
264 | (4) |
|
|
264 | (2) |
|
7.2.2 Infrastructure attacks |
|
|
266 | (2) |
|
7.3 Attacks at the User Interface |
|
|
268 | (10) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (3) |
|
7.3.4 Countermeasure: spoof detection |
|
|
272 | (6) |
|
7.4 Attacks on Biometric Processing |
|
|
278 | (5) |
|
7.4.1 Attacks on the system modules |
|
|
278 | (2) |
|
7.4.2 Attacks at the interconnections |
|
|
280 | (3) |
|
7.5 Attacks on the Template Database |
|
|
283 | (19) |
|
7.5.1 Countermeasure: biometric template security |
|
|
284 | (18) |
|
|
302 | (5) |
|
Bibliographical and Historical Remarks |
|
|
302 | (2) |
|
|
304 | (3) |
Index |
|
307 | |