• Corpus ID: 8868397

Measurement Requirements Biometric Systems Biometric Recognition: Security and Privacy Concerns

  title={Measurement Requirements Biometric Systems Biometric Recognition: Security and Privacy Concerns},
  author={Anil K. Jain}
33 I s Alice authorized to enter this facility? Is Bob entitled to access this Web site or privileged informa-tion? Are we administering our service exclusively to the enrolled users? Does Charlie have a criminal record? Every day, a variety of organizations pose questions such as these about personal recognition. One emerging technology that is becoming more widespread in such organizations is biometrics—automatic personal recognition based on physiological or behavioral characteristics. 1 The… 

Figures and Tables from this paper


Biometrics: Personal Identification in Networked Society
This book covers the general principles and ideas of designing biometric-based systems and their underlying tradeoffs, and the exploration of some of the numerous privacy and security implications of biometrics.
Inside risks: the uses and abuses of biometrics
Imagine a remote system that uses face recognition as a biometric, and since the system does not verify when and where the picture was taken—only that it matches the picture of Alice's face in the file—it can be fooled.
Biometrics: privacy's foe or privacy's friend?
This paper contends that while biometric concerns may pose legitimate privacy concerns, these issues can be adequately addressed and in the final analysis, biometrics emerges as privacy's friend.
Impact of artificial "gummy" fingers on fingerprint systems
Gummy fingers, namely artificial fingers that are easily made of cheap and readily available gelatin, were accepted by extremely high rates by 11 particular fingerprint devices with optical or capacitive sensors.
A Fuzzy Vault Scheme
Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing.
Handbook of Fingerprint Recognition
This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
FVC2002: Second Fingerprint Verification Competition
The FVC 2002 database, the test protocol and the main differences between FVC2000 and FVC2002 are discussed.
The CentralNic Password Survey Report
  • Password Clues
  • 2001