Biometrics: A tool for information security

被引:562
作者
Jain, Anil K. [1 ]
Ross, Arun
Pankanti, Sharath
机构
[1] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[2] W Virginia Univ, Dept Comp Sci & Elect Engn, Morgantown, WV 26506 USA
[3] IBM Corp, Thomas J Watson Res Ctr, Exploratory Comp Vis Grp, Yorktown Hts, NY 10598 USA
关键词
biometrics; cryptosystems; digital rights management; grand challenge; information security; multibiometrics;
D O I
10.1109/TIFS.2006.873653
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Establishing identity is becoming critical in our vastly interconnected society. Questions such as "Is she really who she claims to be?," "Is this person authorized to use this facility?" or "Is he in the watchlist posted by the government?" are routinely being posed in a variety of scenarios ranging from issuing a driver's license to gaining entry into a country. The need for reliable user authentication techniques has increased in the wake of heightened concerns about security and rapid advancements in networking, communication, and mobility. Biometrics, described as the science of recognizing an individual based on his or her physical or behavioral traits, is beginning to gain acceptance as a legitimate method for determining an individual's identity. Biometric systems have now been deployed in various commercial, civilian, and forensic applications as a means of establishing identity. In this paper, we provide an overview of biometrics and discuss some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security. The primary contribution of this overview includes: 1) examining applications where biometrics can solve issues pertaining to information security; 2) enumerating the fundamental challenges encountered by biometric systems in real-world applications; and 3) discussing solutions to address the problems of scalability and security in large-scale authentication systems.
引用
收藏
页码:125 / 143
页数:19
相关论文
共 81 条
[21]  
Brin David., 1998, TRANSPARENT SOC WILL
[22]   PERSON IDENTIFICATION USING MULTIPLE CUES [J].
BRUNELLI, R ;
FALAVIGNA, D .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1995, 17 (10) :955-966
[23]   Speaker recognition: A tutorial [J].
Campbell, JP .
PROCEEDINGS OF THE IEEE, 1997, 85 (09) :1437-1462
[24]   Performance evaluation of fingerprint verification systems [J].
Cappelli, R ;
Maio, D ;
Maltoni, D ;
Wayman, JL ;
Jain, AK .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2006, 28 (01) :3-18
[25]  
DASS SC, 2005, P 5 INT C AUD VID BA, P1049
[26]  
Daugman J, 2003, PATTERN RECOGN, V36, P279, DOI 10.1016/S0031-3203(02)00030-4
[27]   SESAM: A biometric person identification system using sensor fusion [J].
Dieckmann, U ;
Plankensteiner, P ;
Wagner, T .
PATTERN RECOGNITION LETTERS, 1997, 18 (09) :827-833
[28]  
Eriksson A., 1997, P EUR C SPEECH TECHN, P1043
[29]   BioID: A multimodal biometric identification system [J].
Frischholz, RW ;
Dieckmann, U .
COMPUTER, 2000, 33 (02) :64-+
[30]   On the error-reject trade-off in biometric verification systems [J].
Golfarelli, M ;
Maio, D ;
Maltoni, D .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (07) :786-796