D. Maltoni, D. Maio, AK Jain, S. Prabhakar Handbook of Fingerprint

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, 2003 Index (Copyright 2003, Springer Verlag. All rights Reserved.) Index Border control; 43 A Brute force; 280; 293; 302 Abstract labels; 239 C Acceptability; 7 AFIS. See Automatic fingerprint Calibration; 60 identification systems Cancelable biometrics; 301 Analysis. See Fingerprint analysis Cellular phones; 43 Arch; 174 Certificate authority; 292 Arcing; 244 Certifier; 292 Attended biometric application; 6; 8 Challenge-response; 299 Authentication; 3 Circumvention; 7; 40; 281 Automatic capture; 15 Class set reduction; 241 Automatic fingerprint identification Class set reordering; 241 systems; 1; 12; 24; 27; 50; 53; 57; 79; Classification. See Fingerprint 129; 135; 137; 150; 169; 197; 202; 264 classification Automatic teller machine; 43 Classifier combination. See Integration Closed biometric system; 7 B Coercion; 40; 282; 307 Collectability; 7 Bagging; 244 Collusion; 282 Behavioral characteristic; 2 Combination. See Integration Best practices; 17; 21; 169 Common biometric exchange file format; Binarization; 113 41; 294; 308 Biometric identifier; 2; 9 Comparison of biometrics; 7 Biometric recognition; 2 Composite. See Mosaicking Biometric system; 3 Compression. See Fingerprint image applications; 5; 43 compression errors; 13 Computer network logon; 43 evaluation; 19 Confidence intervals; 21; 35 Biometrics. See Biometric identifier Confidence value; 239 Boosting; 244 Confusion matrix; 190 Bootstrap; 21 Contamination; 40; 282 Borda count; 241 342 Index Contextual filters; 107; 116; 208 E Cooperative biometric application; 6; 8 Ear biometric; 9 Core; 84; 102; 150; 151; 158; 166; 176; Echography; 65 264 e-Commerce; 43 detection; 96; 102; 200 Edit distance; 153 Corpse identification; 43 Edward Henry; 23; 84; 173 Correctional facility; 43 Electronic data security; 43 Correlation; 137 Electrostatic discharge; 63 differential; 138 Encryption. See Cryptography in Fourier domain; 140 Enrollment; 3 nagative; 236 Equal-error rate; 15 normalized; 138 Error-correcting code; 304 Cost-benefit analysis; 308 Covert acquisition; 282 F Covert biometric application; 6 Credit card; 43 Face biometric; 9 Criminal investigation; 43 Failure to capture; 15 Criminal stigma; 46 Failure to enroll; 15 Cross-correlation. See Correlation Failure to match; 15 Crossing number; 119 Fake finger; 54; 286 Cryptographic strength; 26; 280 False acceptance; 13 Cryptography; 41; 296 False match; 13 public-key; 297 False match rate; 14 symmetric; 296 False non-match; 13 Curse of dimensionality; 237 False non-match rate; 14 False rejection; 13 D Fault-line; 101 Feature language; 38 Dab impressions; 58 Feature saliency; 29 Denial of service; 42; 281; 285 Feature suitability; 29 Digital signature; 296 Finger geometry biometric; 10 Direction; 88 FingerCode; 166; 167; 188; 189; 191; 197 Direction difference; 141 Fingerprint acquisition. See Fingerprint Discrete Wavelet Transform; 79 sensing Distance from feature space; 249 Fingerprint analysis; 83 Distance learning; 43 Fingerprint applications; 43 Distinctiveness; 7 Fingerprint binarization; 94 DNA biometric; 9 Fingerprint classification; 33; 173 Double loop; 174 continuous classification; 34; 195 Driver’s license; 43 sub-classification; 194 Dynamic programming; 153 Index 343 Fingerprint classification methods; 176; errors; 17 178 Fingerprint image characteristics; 55 multiple classifier-based approaches; area; 56; 75 187 depth; 56 neural network-based approaches; 185 dynamic range; 56 performance; 190 geometric accuracy; 56 rule-based approaches; 180 number of pixels; 56 statistical approaches; 183 quality; 56 structural approaches; 182 resolution; 55 syntactic approaches; 181 Fingerprint image compression; 27; 79 Fingerprint configuration; 263 Fingerprint image storage; 26; 79 Fingerprint enhancement; 104; 113; 114; Fingerprint indexing; 1; 19; 33; 173; 194; 116; 132; 176; 186 241; 245 recoverable region; 105 Fingerprint individuality; 25; 231; 257 unrecoverable region; 105 Fingerprint matching; 31; 131 well-defined region; 105 correlation-based; 33; 135; 137 Fingerprint feature extraction; 28; 86 minutiae-based; 33; 135; 141 core detection; 96 performance; 168 enhancement; 104 ridge feature-based; 33; 135; 164 local ridge frequency; 91 Fingerprint mosaicking; 77 local ridge orientation; 87 Fingerprint quality; 55; 56; 104; 105 minutiae detection; 113 Fingerprint recognition; 3 minutiae filtering; 124 Fingerprint registration; 102; 150; 151 registration features; 96 Fingerprint representation; 28; 83 ridge count; 128 Fingerprint retrieval; 194 segmentation; 94 performance; 199 singularity detection; 96 strategies; 197 Fingerprint generation; 203 Fingerprint scanner; 26; 42; 53; 54; 132 area; 208 attack; 284; 285 background; 221 cryptography; 291 distortion; 219 examples; 69 frequency image; 213 Fingerprint scanner features; 69 global rotation; 221 automatic finger detection; 69 global translation; 221 encryption; 69 in batch; 228 frames per second; 69 orientation image; 209 interface; 69 perturbation; 221 operating system; 69 ridge pattern; 214 Fingerprint sensing; 26; 53 validation; 224 ink-technique; 53 variation in ridge thickness; 218 live-scan; 53; 59 Fingerprint identification; 3 off-line; 53; 57 344 Index on-line; 53 Identification system. See Fingerprint Fingerprint sensor; 54 identification Fingerprint verification; 3 Impostor distribution; 14 errors; 13 Indexing. See Fingerprint indexing Focal point; 103 Information content; 26; 233; 294 Formation of fingerprints; 24 Infrared imaging; 9 Francis Galton; 22; 85; 173 Input; 131 Frustrated total internal reflection; 59 Integration; 36; 236 Fully automatic system; 5; 8 architecture; 237 Fusion. See Integration level; 239 Fuzzy vault; 307 loosely coupled; 37; 239 FVC2000; 17; 75; 169; 200; 203; 229 rules; 241 FVC2002; 75; 136; 169; 203; 229; 279 scheme; 241 strategies; 237; 241 G tightly coupled; 37; 239 Inter-class variability; 28; 134; 175 Gabor filters; 109 Internet access; 43 Gait biometric; 9 Intra-class variability; 28; 31; 131; 175 Galton details; 85 displacement; 131 Galton’s classification; 173 noise; 132 Galton-Henry classification; 174 non-linear distortion; 132 Generation. See Fingerprint generation partial overlap; 132 Genuine distribution; 14 pressure; 132 Geometrical distortion; 60 rotation; 131 skin condition; 132 H Intrinsic coordinate system; 155 Habituated users; 6; 8 Inverse Discrete Wavelet Transform; 80 Habituation; 67 Iris biometric; 10 Hand geometry biometric; 10 IrisCode; 266; 304 Hand vein biometric; 9 Irregularity operator; 100 Henry Fauld; 22 Henry’s classification; 174 J Herschel; 22 Juan Vucetich; 173 Hill climbing; 41; 231; 294 History of fingerprints; 21 K Holograms; 60 Hough transform; 146 Key; 43; 296 private; 297 I public; 297 replacement; 42 Identical twins. See Twins session; 299 Index 345 Keystroke biometric; 10 problem formulation; 141 with pre-alignment; 150 L without alignment; 154 Missing children; 43 Latent; 1; 26; 58; 176 Mix-spectrum; 92 Left loop; 174 Modulation transfer function; 57; 110 Linear symmetry; 124 Morphological operators; 95; 118; 218 Logistic regression; 241 Mosaicking; 78. See Fingerprint mosaicking M Multibiometric system; 233 Magnetic card; 3 Multiclassifier system; 236 Masquerade attack; 204 Multimodal biometric system; 36; 233 Master fingerprint; 204; 208 Matcher; 33 N Matching. See Fingerprint matching National ID card; 43 Matching pairs; 13 Natural distribution; 176 Matching score; 13 Negative recognition system; 5; 13 Mated pair; 33 Nehemiah Grew; 21 Mayer; 22 Neyman-Pearson; 242; 250; 252 Measurement value; 239 NIST Special Database 14; 35; 58; 191; Mechanical guide; 77 199 Medical records management; 43 classification results; 192 Minute details. See Minutiae NIST Special Database 4; 34; 35; 190 Minutiae; 30; 85 classification results; 191 bifurcation; 30; 85; 119 NIST Special Databases; 169 crossover; 85 Non-attended biometric application; 6 duality; 86 Nonce; 299 termination; 30; 85; 119 Non-contact; 9; 10 trifurcation; 85 Non-cooperative biometric application; 6; Minutiae correspondence; 143 8 Minutiae detection; 113 Non-habituated users; 6 binarization-based; 114 Non-invertible transform; 302 grayscale-based; 120 Non-linear distortion; 35; 132; 138; 160; Minutiae filtering; 124 216; 219; 273; 289 gray-scale-based; 126 Non-matching pairs; 13 structure-based; 124 Non-standard environment; 6 Minutiae matching; 141 alignment; 142 O distortion; 160 global vs local; 156 Odor biometric; 10 point pattern matching; 144; 145 Off-line system; 4 346 Index One-way hash function; 298; 302 Private biometric application; 6 On-line system; 4 Private biometrics; 301 Open biometric system; 7 Probability of (minutiae) occurrence; 262; Operational evaluation; 20 263 Optical sensors; 59 Probability of a false association; 265 direct reading; 62 Probability of a false correspondence; 259 electro-optical; 62 Probability of fingerprint configuration; FTIR; 59 261 FTIR with a sheet prism; 61 Public biometric application; 6 optical fibers; 61 Purkinje; 22; 173 Orientation; 87 consistency; 88 Q reliability; 88 Quality index. See Fingerprint quality Overt biometric application; 6; 8 R P Rank label; 241 Parenthood determination; 43 Rank values; 239 Passport control; 43 Receiver operating characteristic curve; 15 PCASYS; 187 Recognition; 3 Penetration rate; 19; 190 Recognition system; 3 Performance; 7 Registration point; 103 Permanence; 7; 258 Replay attack; 40; 285; 296 Personal digital assistant; 43 Representation.
Recommended publications
  • Report Legal Research Assistance That Can Make a Builds

    Report Legal Research Assistance That Can Make a Builds

    EUROPEAN DIGITAL RIGHTS A LEGAL ANALYSIS OF BIOMETRIC MASS SURVEILLANCE PRACTICES IN GERMANY, THE NETHERLANDS, AND POLAND By Luca Montag, Rory Mcleod, Lara De Mets, Meghan Gauld, Fraser Rodger, and Mateusz Pełka EDRi - EUROPEAN DIGITAL RIGHTS 2 INDEX About the Edinburgh 1.4.5 ‘Biometric-Ready’ International Justice Cameras 38 Initiative (EIJI) 5 1.4.5.1 The right to dignity 38 Introductory Note 6 1.4.5.2 Structural List of Abbreviations 9 Discrimination 39 1.4.5.3 Proportionality 40 Key Terms 10 2. Fingerprints on Personal Foreword from European Identity Cards 42 Digital Rights (EDRi) 12 2.1 Analysis 43 Introduction to Germany 2.1.1 Human rights country study from EDRi 15 concerns 43 Germany 17 2.1.2 Consent 44 1 Facial Recognition 19 2.1.3 Access Extension 44 1.1 Local Government 19 3. Online Age and Identity 1.1.1 Case Study – ‘Verification’ 46 Cologne 20 3.1 Analysis 47 1.2 Federal Government 22 4. COVID-19 Responses 49 1.3 Biometric Technology 4.1 Analysis 50 Providers in Germany 23 4.2 The Convenience 1.3.1 Hardware 23 of Control 51 1.3.2 Software 25 5. Conclusion 53 1.4 Legal Analysis 31 Introduction to the Netherlands 1.4.1 German Law 31 country study from EDRi 55 1.4.1.1 Scope 31 The Netherlands 57 1.4.1.2 Necessity 33 1. Deployments by Public 1.4.2 EU Law 34 Entities 60 1.4.3 European 1.1. Dutch police and law Convention on enforcement authorities 61 Human Rights 37 1.1.1 CATCH Facial 1.4.4 International Recognition Human Rights Law 37 Surveillance Technology 61 1.1.1.1 CATCH - Legal Analysis 64 EDRi - EUROPEAN DIGITAL RIGHTS 3 1.1.2.
  • Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics

    Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics

    Acta Polytechnica Hungarica Vol. 16, No. 1, 2019 Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics Nemanja Maček1, Saša Adamović2, Milan Milosavljević3, Miloš Jovanović4, Milan Gnjatović5, Branimir Trenkić6 1,6 School of Electrical and Computer Engineering of Applied Studies, 283 Vojvode Stepe st., Beograd, Serbia, e-mails: {nmacek, btrenkic}@viser.edu.rs 2,3,4 Singidunum University, 32 Danijelova st., Beograd, Serbia, e-mails: {sadamovic, mmilosavljevic}@singidunum.ac.rs, [email protected] 5 Faculty of Technical Sciences, University of Novi Sad, 6 Trg Dositeja Obradovića st., Novi Sad, Serbia, e-mail: [email protected] Abstract: This paper1 presents an approach to designing secure modular authentication framework based on iris biometrics and its’ implementation into mobile banking scenario. The system consists of multiple clients and an authentication server. Client, a smartphone with accompanying application, is used to capture biometrics, manage auxiliary data and create and store encrypted cancelable templates. Bank’s authentication server manages encryption keys and provides the template verification service. Proposed system keeps biometric templates encrypted or at least cancelable during all stages of storage, transmission and verification. As templates are stored on clients in encrypted form and decryption keys reside on bank's authentication server, original plaintext templates are unavailable to an adversary if the phone gets lost or stolen. The system employs public key cryptography and pseudorandom number generator on small-sized templates, thus not suffering from severe computational costs like systems that employ homomorphic encryption. System is also general, as it does do not depend on specific cryptographic algorithms. Having in mind that modern smartphones have iris scanners or at least high- quality front cameras, and that no severe computational drawbacks exist, one may conclude that the proposed authentication framework is highly applicable in mobile banking authentication.
  • Privacy by Design Solutions for Biometric One-To-Many Identification Systems

    Privacy by Design Solutions for Biometric One-To-Many Identification Systems

    Privacy by Design Solutions for Biometric One-to-Many Identification Systems IPC Technical Report June 2014 Acknowledgements Our deepest thanks go to Dr. George Tomko, whose invention of Biometric Encryption and early work inspired this paper and formed the basis of the hybrid OLG System. 416-326-3333 1-800-387-0073 2 Bloor Street East Fax: 416-325-9195 Suite 1400 Toronto, Ontario TTY (Teletypewriter): 416-325-7539 Information and Privacy M4W 1A8 Website: www.ipc.on.ca Commissioner of Ontario Canada Privacy by Design: www.privacybydesign.ca Privacy by Design Solutions for Biometric One-to-Many Identification Systems TABLE OF CONTENTS 1. Introduction ..................................................................................................1 2. Biometric one-to-many systems and Privacy by Design .....................................4 3. Biometric Encryption: Making Biometrics “Untraceable” by Design .....................5 4. Cryptographically secure biometric architectures ............................................15 5. Biometric Setbase or Weak Links ..................................................................21 6. Everything is coming together: Next steps ......................................................24 7. Conclusions ...............................................................................................25 Appendix A ....................................................................................................26 References .....................................................................................................29
  • Center for Unified Biometrics and Sensors University at Buffalo, State University of New York Govind@Buffalo.Edu

    Center for Unified Biometrics and Sensors University at Buffalo, State University of New York [email protected]

    Advances in Fingerprint Recognition at CUBS Venu Govindaraju Director of Center for Unified Biometrics and Sensors University at Buffalo, State University of New York [email protected] Abstract The Center for Unified Biometrics and Sensors (CUBS) at the University at Buffalo, SUNY is developing biometrics identification systems for civilian, law enforcement and homeland security applications. The center is involved in traditional research developing matching algorithms for several biometric modalities (e.g., fingerprint, signature, face) and in identifying exploratory areas of research that will address problems anticipated in wide- scale deployment of biometrics. In this paper we describe some of our recent research in fingerprint verification. In particular, we will describe a new non-stationary fingerprint enhancement algorithm based on Fourier domain analysis and a partial fingerprint matching algorithm that uses novel approaches from graph and optimization theory. We will also present new score computation algorithm that treats fingerprint verification as a classification problem. Finally, we will describe a novel technique for protecting the privacy and security of fingerprint templates that is based on symmetric hash functions. INTRODUCTION In an increasingly digital world, reliable personal authentication is an important human computer interface activity. National security, e-commerce, and access to computer networks are some examples where establishing a person's identity is vital. Existing security measures rely on knowledge-based approaches like passwords or token-based approaches such as swipe cards and passports to control access to physical and virtual spaces. Though ubiquitous, such methods are not very secure. Tokens such as badges and access cards may be shared or stolen.
  • Authentication in Mobile Cloud Computing a Survey

    Authentication in Mobile Cloud Computing a Survey

    Journal of Network and Computer Applications 61 (2016) 59–80 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca Review Authentication in mobile cloud computing: A survey Mojtaba Alizadeh a,b, Saeid Abolfazli c,n, Mazdak Zamani d, Sabariah Baharun b, Kouichi Sakurai a a Department of Informatics, Graduate School and Faculty of Information Science, Kyushu University, Fukuoka, Japan b Malaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi, Malaysia c YTL Communications and Xchanging, Malaysia d Department of Computer Science, Kean University, NJ, USA article info abstract Article history: Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model that incor- Received 29 March 2015 porates multitude of heterogeneous cloud-based resources to augment computational capabilities of the Received in revised form plethora of resource-constraint mobile devices. In MCC, execution time and energy consumption are 21 September 2015 significantly improved by transferring execution of resource-intensive tasks such as image processing, 3D Accepted 18 October 2015 rendering, and voice recognition from the hosting mobile to the cloud-based resources. However, Available online 6 November 2015 accessing and exploiting remote cloud-based resources is associated with numerous security and privacy Keywords: implications, including user authentication and authorization. User authentication in MCC is a critical Cloud computing requirement in securing cloud-based computations and communications. Despite its critical role, there is Mobile cloud computing a gap for a comprehensive study of the authentication approaches in MCC which can provide a deep Security insight into the state-of-the-art research.
  • Requirements, Threat Models and Report on Building Blocks for Hardware Security

    Requirements, Threat Models and Report on Building Blocks for Hardware Security

    Requirements, Threat Models and Report on Building Blocks for Hardware Security Project number: 238811 Project acronym: UNIQUE Project title: Foundations for Forgery-Resistant Security Hardware Start date of the project: 01.09.2009 Duration: 30 months Deliverable type: Report Deliverable reference number: 238811/ D1.1 / Final |1.1 Deliverable title: Requirements, Threat Models and Report on Building Blocks for Hardware Security WP contributing to the deliverable: WP1 Due date: 2010-08-31 Actual submission date: 2010-08-31 Responsible organization: TUD (Heike Schröder, Stefan Katzenbeisser) Authors: All partners contributed Abstract: Deliverable D1.1 provides the basis for the foundation of the technical work in the UNIQUE project. For this purpose the identification of requirements, threat models, and building blocks has been done. Keywords: use cases, requirements, building blocks, hardware level technology, design technique Dissemination level: Public Revision: FINAL | 1.1 Instrument: STREP Thematic Priority: ICT D1.1 Table of Contents 1 Introduction ............................................................................................................................4 2 Threat Scenario .......................................................................................................................5 2.1 Counterfeiting .....................................................................................................................5 2.1.1 Semiconductor Device Re-marking ..................................................................................5
  • Preparation and Submission of a Manuscript for the Proceedings

    Preparation and Submission of a Manuscript for the Proceedings

    ASAKER and ZAHRAN BIOMETRICS SECURITY AND PRIVACY PROTECTION AHMED A. ASAKER Reactors Department, Nuclear Research Center – Egyptian Atomic Energy Authority Cairo, Egypt Email: [email protected] OSAMA ZAHRAN Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering Menoufia University, Menoufia, Egypt Email: [email protected] Abstract Physical security at nuclear facilities is an important licensing and design consideration. The ultimate objective of the physical protection system (PPS) is to prevent the accomplishment of unauthorized overt or covert actions to nuclear facilities and nuclear materials. When a physical protection system is applied to a nuclear facility or to nuclear materials, its objective is to prevent radiological sabotage of facilities and theft of nuclear materials. Thus an effective system of physical protection also plays an important role in preventing illicit trafficking of nuclear materials. One of the main pillars of physical protection is controlling personnel access to facilities via Identification technology Systems. Identification technology is changing as fast as the facilities, information, and communication it protects. Recent years have seen a rapid adaptation of using various biometric systems for trusted human automatic recognition and controlling personnel access to nuclear facilities attributed to its high accuracy performance, discriminability, difficulty to be imitated and faked, and stability. Biometrics refers to the physiological or behavioural characteristics of an individual. Many physical characteristics, such as face, fingerprints, iris and behavioural characteristics, such as voice and gait are believed to be unique to an individual. With the exponential growth of using biometric systems, there is an increasing concern that the privacy anonymity of individuals can be compromised by biometric technologies.
  • Beyond PKI: the Biocryptographic Key Infrastructure Beyond PKI: the Biocryptographic Key Infrastructure

    Beyond PKI: the Biocryptographic Key Infrastructure Beyond PKI: the Biocryptographic Key Infrastructure

    Beyond PKI: The Biocryptographic Key Infrastructure Beyond PKI: The Biocryptographic Key Infrastructure W.J. Scheirer, W. Bishop and T.E. Boult Abstract Public Key Infrastructure is a widely deployed security technology for handling key distribution and validation in computer security. Despite PKI’s popu- larity as a security solution, Phishing and other Man-in-the-Middle related attacks are accomplished with ease throughout our computer networks. The major problems with PKI come down to trust, and largely, how much faith we must place in crypto- graphic keys alone to establish authenticity and identity. In this chapter, we look at a novel biometric solution that mitigates this problem at both the user and certificate authority levels. More importantly, we analyze the problem of applying unprotected biometric features directly into PKI, and propose the integration of a secure, revoca- ble biometric template protection technology that supports transactional key release. A detailed explanation of this new Biocryptographic Key Infrastructure is provided, including composition, enrollment, authentication, and revocation details. The BKI provides a new paradigm for blending elements of physical and virtual security to address network attacks that more conventional approaches have not been able to stop. 1 Introduction To motivate the contribution of this paper, we first turn to the technology that under- pins the problem. Public Key Infrastructure (PKI) [10, 1, 9, 30] has been a popular, yet often maligned technology since its widespread adoption in the 1990s. PKI (Fig- W. J. Scheirer and T.E. Boult Vision and Security Technology Lab, Department of Computer Science, University of Colorado, Colorado Springs, CO 80918-7150, USA e-mail: [email protected], [email protected] W.
  • Biometrics: PET Or PIT? Koops, E.J.; Sprokkereef, A.C.J

    Biometrics: PET Or PIT? Koops, E.J.; Sprokkereef, A.C.J

    Tilburg University D3.16: Biometrics: PET or PIT? Koops, E.J.; Sprokkereef, A.C.J. Publication date: 2009 Document Version Publisher's PDF, also known as Version of record Link to publication in Tilburg University Research Portal Citation for published version (APA): Koops, E. J., & Sprokkereef, A. C. J. (2009). D3.16: Biometrics: PET or PIT? FIDIS. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 27. sep. 2021 FIDIS Future of Identity in the Information Society Title: “D3.16: Biometrics: PET or PIT?” Author: WP3 Editors: Annemarie Sprokkereef (TILT) Bert-Jaap Koops (TILT) Reviewers: Mireille Hildebrandt (VUB) Eleni Kosta (KU Leuven, ICRI) Identifier: D3.16 Type: [Report] Version: 1.0 Date: 20 August 2009 Status: [Final] Class: [Public] File: fidis-WP3-del3.16-biometrics-PET-or-PIT.pdf Summary Biometrics plays a vital role in identity management. Biometric data are, however, sensitive and vulnerable, and there is a need to develop biometric applications as a privacy-enhancing technology (PET) rather than a privacy- invasive technology (PIT).
  • Multimodal Biometric System Using Deep Learning Techniques

    Multimodal Biometric System Using Deep Learning Techniques

    INTERNATIONAL JOURNAL FOR INNOVATIVE RESEARCH IN MULTIDISCIPLINARY FIELD ISSN: 2455-0620 Volume - 6, Issue - 12, Dec – 2020 Monthly, Peer-Reviewed, Refereed, Indexed Journal with IC Value: 86.87 Impact Factor: 6.719 Received Date: 08/12/2020 Acceptance Date: 22/12/2020 Publication Date: 31/12/2020 Multimodal Biometric system using Deep Learning Techniques 1Dr.T.Manikumar, 2Dr.A.John Sanjeev Kumar, 3T.Sakkammal, 4Dr.N.Gnanasankaran 1Assistant Professor, 2Assistant Professor, 3Assistant Professor, 4Assistant Professor 1, 2, 3 Department of Computer Applications and Information Technology, Department of Data Science, Department of Computer Science,Department of Computer Science 1, 4Thiagarajar College,Madurai,India,2The American College,Madurai,India,3Meenakshi College of Arts and Science, Dindigul, India Email – [email protected], 2 [email protected] , [email protected] 4 [email protected]. Abstract: The use of biometric for identification purposes requires that a particular biometric factor be unique for each individual that it can be calculated, and that it is invariant over time. Biometrics such as signatures, photographs, fingerprints, voiceprints and retinal blood vessel patterns all have noteworthy drawbacks. Although signatures and photographs are cheap and easy to obtain and store, they are impossible to identify automatically with assurance, and are easily forged. Human iris on the other hand as an internal organ of the eye and as well protected from the external environment, yet it is easily visible from within one meter of distance makes it a perfect biometric for an identification system with the ease of speed, reliability and automation. Iris recognition is regarded as the most reliable and accurate biometric identification system available.
  • Future of Identity in the Information Society Summary

    Future of Identity in the Information Society Summary

    FIDIS Future of Identity in the Information Society Title: “D3.16: Biometrics: PET or PIT?” Author: WP3 Editors: Annemarie Sprokkereef (TILT) Bert-Jaap Koops (TILT) Reviewers: Mireille Hildebrandt (VUB) Eleni Kosta (KU Leuven, ICRI) Identifier: D3.16 Type: [Report] Version: 1.0 Date: 20 August 2009 Status: [Final] Class: [Public] File: fidis-WP3-del3.16-biometrics-PET-or-PIT.pdf Summary Biometrics plays a vital role in identity management. Biometric data are, however, sensitive and vulnerable, and there is a need to develop biometric applications as a privacy-enhancing technology (PET) rather than a privacy- invasive technology (PIT). Building on earlier FIDIS research, this report studies technical, organizational, and policy decisions in the development of biometrics applications that influence their becoming PETs or PITs. These decisions balance the interests of individuals to have control over their pers- onal data against commercial, societal, and political interests, security, con- venience, and efficiency. This report identifies criteria for determining the ‘PET’ content of technologies and looks at several case studies of decision- making processes in biometrics: biometric pseudonyms and iris recognition, Privacy Impact Assessments, voice recognition, the German ePass, and the Dutch central database of passport biometrics. These case studies suggest a possible gap between expectations and assessments based on technical knowledge and between economic and political expectations of and require- ments for biometric applications. Based on this finding, recommendations are given to enhance awareness of privacy-enhancing technologies and to apply value-sensitive design in the development of biometric applications. Copyright © 2004-08 by the FIDIS consortium - EC Contract No. 507512 The FIDIS NoE receives research funding from the Community’s Sixth Framework Program FIDIS D3.16 Future of Identity in the Information Society (No.
  • Computer Security Dec13

    A Selected list of Books on A Bibliography Compiled By Resource Centre (Prepared on : 13th Dec. 2010) Resource Centre Near Indroda Circle Gandhinagar - 382 007 (Available in the Resource Centre) 1. Acquisti, Alessandro ...[et al.] (eds.) Digital privacy : theory, technologies, and practices New York. Auerbach Publications, 2007 005.8 ACQ 018761 2. Acquisti, Alessandro ...[et al.] (eds.) Digital privacy : theory, technologies, and practices New York. Auerbach Publications, 2007 005.8 ACQ 018761 3. Afyouni, Hassan A. Database security and auditing : protecting data integrity and accessibility Boston. Thomson Course Technology, 2006 005.8 AFY 016388 4. Aggarwal, Charu C. & Yu, Philip S. Privacy-preserving data mining : models and algorithms New York. Springer, 2008 005.74 AGG 021394 5. Aggelou, George Mobile ad hoc networks: from wireless LANs to 4G networks. New York. McGraw-Hill, 2005. 004.688 AGG 013373 6. Agnew, Grace., Digital rights management : a librarian's guide to technology and practice Oxford. Chandos Publishing, 2008 025.12 AGN 020194 7. Agre, Philip E. Technology and Privacy London . The MIT Press , 2001 005.8 A276T 003689 8. Agre, Philip E. , Technology and Privacy London . The MIT Press , 2001 005.8 A276T 003689 9. Al Agha, Khaldoun, ed. & Omidyar, Cambyse Guy, ed. Mobile and wireless communications networks: 5th IFIP-TC6 International Conference: proceedings. New Jersey. World Scientific, 2003. 621.3821 ALA 009057 10. Alder, Raven ... [et al.] How to cheat at configuring Open Source security tools New Delhi. Syngress, 2007 005.8 ALD 017787 11. Aleksy, Markus, Korthaus, Axel & Schader, Martin., Implementing distributed systems with Java and CORBA New York. Springer, 2005 005.44 ALE 019696 12.