Difference between revisions of "Biometrics Bibliography"

From ForensicsWiki
Jump to: navigation, search
Line 99: Line 99:
 
   
 
   
 
  abstract = {Reliable and accurate verification of people is extremely important in a number of business transactions as well as access to privileged information. Automatic verification methods based on physical biometric characteristics such as fingerprint or iris can provide positive verification with a very high accuracy. However, the biometrics-based methods assume that the physical characteristics of an individual (as captured by a sensor) used for verification are sufficiently unique to distinguish one person from another. Identical twins have the closest genetics-based relationship and, therefore, the maximum similarity between fingerprints is expected to be found among identical twins. We show that a state-of-the-art automatic fingerprint verification system can successfully distinguish identical twins though with a slightly lower accuracy than nontwins. }
 
  abstract = {Reliable and accurate verification of people is extremely important in a number of business transactions as well as access to privileged information. Automatic verification methods based on physical biometric characteristics such as fingerprint or iris can provide positive verification with a very high accuracy. However, the biometrics-based methods assume that the physical characteristics of an individual (as captured by a sensor) used for verification are sufficiently unique to distinguish one person from another. Identical twins have the closest genetics-based relationship and, therefore, the maximum similarity between fingerprints is expected to be found among identical twins. We show that a state-of-the-art automatic fingerprint verification system can successfully distinguish identical twins though with a slightly lower accuracy than nontwins. }
 +
}
 +
 +
</bibtex>
 +
 +
<bibtex>
 +
@article{sou001,
 +
author = {Colin Soutar },
 +
title = {Implementation of Biometric Systems — Security and Privacy Considerations },
 +
journal = {Information Security Technical Report},
 +
volume = {7},
 +
number = {4},
 +
month = {December},
 +
year = {2002},
 +
pages = {49--55},
 +
doi = {http://dx.doi.org/10.1016/S1363-4127(02)00406-5  },
 +
publisher = {Elsevier Science Ltd},
 +
 +
abstract = {As biometric systems are deployed within security systems, or as part of identification programs, implementation issues relating to security and privacy need to be considered. The role of a biometric system is to recognize (or not) an individual through specific physiological or behavioral traits. The use of the word ‘recognize’ is significant — defined in the Oxford Dictionary as “identify as already known”. In other words, a biometric system does not establish the identity of an individual in any way, it merely recognizes that they are who they say they are (in a verification or a ‘positive identification’ system), or that they were not previously known to the system (in a ‘negative identification’ system, for example, to avoid double enrollment in a welfare system). This tie between the actual identity of an individual and the use of biometrics is subtle and provokes much debate, particularly relating to privacy and other societal issues. This paper seeks to clarify come of these issues by providing a framework, and by distinguishing between technology and societal issues.  }
 +
}
 +
 +
</bibtex>
 +
 +
<bibtex>
 +
@article{jain001,
 +
author = {Anil K. Jain, Salil Prabhakar,and Sharath Pankanti},
 +
title = {On the similarity of identical twin fingerprints },
 +
journal = {Pattern Recognition },
 +
volume = {35},
 +
number = {11},
 +
month = {November},
 +
year = {2002},
 +
pages = {2653--2663},
 +
doi = {http://dx.doi.org/10.1016/S0031-3203(01)00218-7 },
 +
publisher = {Elsevier B.V.},
 +
 +
abstract = {Reliable and accurate verification of people is extremely important in a number of business transactions as well as access to privileged information. Automatic verification methods based on physical biometric characteristics such as fingerprint or iris can provide positive verification with a very high accuracy. However, the biometrics-based methods assume that the physical characteristics of an individual (as captured by a sensor) used for verification are sufficiently unique to distinguish one person from another. Identical twins have the closest genetics-based relationship and, therefore, the maximum similarity between fingerprints is expected to be found among identical twins. We show that a state-of-the-art automatic fingerprint verification system can successfully distinguish identical twins though with a slightly lower accuracy than nontwins.  }
 
  }
 
  }
  

Revision as of 15:13, 19 October 2007

Lynne Coventry, Antonella De Angeli, Graham Johnson - Usability and biometric verification at the ATM interface
CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems pp. 153--160, New York, NY, USA,2003
http://portal.acm.org/citation.cfm?id=642611.642639
Bibtex
Author : Lynne Coventry, Antonella De Angeli, Graham Johnson
Title : Usability and biometric verification at the ATM interface
In : CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems -
Address : New York, NY, USA
Date : 2003

Doroteo T. Toledano, Rub\'en Fern\'andez Pozo, \'Alvaro Hern\'andez Trapote, Luis Hern\'andez G\'omez - Usability evaluation of multi-modal biometric verification systems
Interact. Comput. 18(5):1101--1122, New York, NY, USA,2006
Bibtex
Author : Doroteo T. Toledano, Rub\'en Fern\'andez Pozo, \'Alvaro Hern\'andez Trapote, Luis Hern\'andez G\'omez
Title : Usability evaluation of multi-modal biometric verification systems
In : Interact. Comput. -
Address : New York, NY, USA
Date : 2006

M. Angela Sasse - Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems
IEEE Security and Privacy 5(3):78--81, Piscataway, NJ, USA,2007
Bibtex
Author : M. Angela Sasse
Title : Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems
In : IEEE Security and Privacy -
Address : Piscataway, NJ, USA
Date : 2007

Adams Wai-Kin Konga, David Zhanga, Guangming Luc - A study of identical twins’ palmprints for personal verification
Pattern Recognition 39(11):2149--2156,2006
Bibtex
Author : Adams Wai-Kin Konga, David Zhanga, Guangming Luc
Title : A study of identical twins’ palmprints for personal verification
In : Pattern Recognition -
Address :
Date : 2006

Balaji Ganeshana, Dhananjay Theckedathb, Rupert Younga, Chris Chatwina - Biometric iris recognition system using a fast and robust iris localization and alignment procedure
Optics and Lasers in Engineering 44(1):1--24, January 2006
Bibtex
Author : Balaji Ganeshana, Dhananjay Theckedathb, Rupert Younga, Chris Chatwina
Title : Biometric iris recognition system using a fast and robust iris localization and alignment procedure
In : Optics and Lasers in Engineering -
Address :
Date : January 2006

Arun Ross, Anil Jain - Information fusion in biometrics
Pattern Recognition Letters 24(13):2115--2125, September 2003
Bibtex
Author : Arun Ross, Anil Jain
Title : Information fusion in biometrics
In : Pattern Recognition Letters -
Address :
Date : September 2003

Colin Soutar - Implementation of Biometric Systems — Security and Privacy Considerations
Information Security Technical Report 7(4):49--55, December 2002
Bibtex
Author : Colin Soutar
Title : Implementation of Biometric Systems — Security and Privacy Considerations
In : Information Security Technical Report -
Address :
Date : December 2002

Anil K. Jain, Salil Prabhakar,and Sharath Pankanti - On the similarity of identical twin fingerprints
Pattern Recognition 35(11):2653--2663, November 2002
Bibtex
Author : Anil K. Jain, Salil Prabhakar,and Sharath Pankanti
Title : On the similarity of identical twin fingerprints
In : Pattern Recognition -
Address :
Date : November 2002

Surveys

Things to check:

NIST Face Recognition Vendor Test (FRVT) 2006 and the Iris Challenge Evaluation (ICE) 2006

- Public Attitudes Toward the Uses of Biometric Identification Technologies by Government and the Private Sector
,2002
http://dematerialisedid.com/PDFs/Biometricsurveyfindings.pdf
Bibtex
Author :
Title : Public Attitudes Toward the Uses of Biometric Identification Technologies by Government and the Private Sector
In : -
Address :
Date : 2002