Biometric Technologies and Verification Systems -  John R. Vacca

Biometric Technologies and Verification Systems (eBook)

eBook Download: PDF
2007 | 1. Auflage
656 Seiten
Elsevier Science (Verlag)
978-0-08-048839-4 (ISBN)
Systemvoraussetzungen
60,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost 'smart cards' are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

John Vacca is an information technology consultant, professional writer, editor, reviewer and internationally-known, best-selling author based in Pomeroy, Ohio. Since 1982, John has authored 72 books, including:

Identity Theft (Cybersafety) (Publisher: Chelsea House Pub (April 1, 2012 ); System Forensics, Investigation, And Response (Publisher: Jones & Bartlett Learning (September 24, 2010); Managing Information Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Network and Systems Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Computer and Information Security Handbook (Publisher: Morgan Kaufmann (an imprint of Elsevier Inc.) (June 2, 2009)); Biometric Technologies and Verification Systems (Publisher: Elsevier Science & Technology Books (March 16, 2007)); Practical Internet Security (Hardcover): (Publisher: Springer (October 18, 2006)); Optical Networking Best Practices Handbook (Hardcover): (Publisher: Wiley-Interscience (November 28, 2006)); Computer Forensics: Computer Crime Scene Investigation (With CD-ROM), 2nd Edition (Publisher: Charles River Media (May 26, 2005)
John Vacca has also written more than 600 articles in the areas of advanced storage, computer security and aerospace technology (copies of articles and books are available upon request). John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995. In addition, John is also an independent online book reviewer. Finally, John was one of the security consultants for the MGM movie titled: 'AntiTrust,' which was released on January 12, 2001.
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "e;smart cards"e; are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.* Contains elements such as Sidebars, Tips, Notes and URL links* Heavily illustrated with over 150 illustrations, screen captures, and photographs* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

Front cover 1
Biometric Technologies and Verification Systems 4
Copyright page 5
Table of contents 8
Foreword 12
Acknowledgments 14
Introduction 16
Part 1: Overview of Biometric Technology and Verification Systems 30
Chapter 1. What Is Biometrics? 32
Improved Biometrics Is Critical to Security! But Is It? 34
Different Biometric Standards 35
Consortium Helps Advance Biometric Technologies 38
How Biometric Verification Systems Work 40
Summary/Conclusion 45
References 46
Chapter 2. Types of Biometric Technology and Verification Systems 48
Biometric Technologies for Personal Identification 51
Business and Federal Applications of Biometric Technologies 70
Challenges and Issues in Using Biometrics 74
Risk Management Is the Foundation of Effective Strategy 75
Barriers to Future Growth 81
Summary/Conclusion 82
References 82
Chapter 3. Biometric Technology and Verification Systems Standards 84
Background 86
NIST’s Accomplishments 89
International Civil Aviation Organization 95
Summary/Conclusion 96
References 99
Part 2: How Biometric Eye Analysis Technology Works 100
Chapter 4. How Iris Pattern Recognition Works 102
What Is Iris Pattern Recognition? 102
How Does Iris Pattern Recognition Work? 105
The Biology Behind the Technology 106
Current and Future Use 110
Summary/Conclusion 112
References 113
Chapter 5. How Retina Pattern Recognition Works 114
The Anatomy and the Uniqueness of the Retina 114
The Technology Behind Retinal Pattern Recognition 116
The Strengths and Weaknesses of Retinal Pattern Recognition 119
The Applications of Retinal Pattern Recognition 120
Summary/Conclusion 121
References 121
Part 3: How Biometric Facial Recognition Technology Works 122
Chapter 6. How Video Face Recognition Works 124
How Facial Recognition Technology Works 126
The Face 127
The Software 128
Summary/Conclusion 130
References 132
Chapter 7. How Facial Thermal Imaging in the Infrared Spectrum Works 134
Methodology 135
Results and Discussion 137
Summary/Conclusion 139
Reference 140
Part 4: How Biometric Fingerscanning Analysis Technology Works 142
Chapter 8. How Finger Image Capture Works 144
What Is Finger Image Capture? 144
Practical Applications for Finger Image Capture 144
Accuracy and Integrity 145
Biometric Versus Nonbiometric Fingerprinting 152
Fingerprint Market Size 154
Fingerprint Growth Drivers and Enablers 154
Fingerprint Growth Inhibitors 155
Applications 156
Fingerprint Feature Extraction 156
Fingerprint Form Factors 159
Types of Scanners: Optical, Silicon, and Ultrasound 160
Summary/Conclusion 162
References 162
Chapter 9. How Fingerscanning Verification and Recognition Works 164
Verification and Recognition 164
Verification Algorithms 172
Summary/Conclusion 173
References 174
Part 5: How Biometric Geometry Analysis Technology Works 176
Chapter 10. How Hand Geometry Image Technology Works 178
Applications for Hand Scanning 178
Combining Biometric Methods 179
How It Works 179
Hand Geometry Strengths and Weaknesses 181
Enhanced Biometric Technology 183
Highest User Acceptance 183
Applications 183
Hand Geometry Market Size 185
Summary/Conclusion 185
References 185
Chapter 11. How Finger Geometry Technology Works 186
One or Two Fingers? 186
A Mixed Reaction 193
Summary/Conclusion 194
References 194
Part 6: How Biometric Verification Technology Works 196
Chapter 12. How Dynamic Signature Verification Technology Works 198
Requirements of a Dynamic Signature Verification System 198
Dynamic Signature Verification Costs 201
Advantages of Dynamic Signature Verification 201
Disadvantages of Dynamic Signature Verification 202
Summary/Conclusion 202
References 203
Chapter 13. How Voice Recognition Technology Works 204
Voice Recognition: Security and Costs 207
Areas of Opportunity: Education 208
Summary/Conclusion 208
References 209
Chapter 14. How Keystroke Dynamics Technology Works 210
What Is Keystroke Dynamics? 210
How Effective Is Keystroke Dynamics? 212
Keystroke Dynamics in Corporate Use 212
Markets for Keystroke Dynamics 214
Summary/Conclusion 215
References 215
Chapter 15. How Palm Print Pattern Recognition Technology Works 216
History 216
Approach: Concept 218
United States Government Evaluations 220
Standards Overview 221
Summary/Conclusion 221
Reference 222
Chapter 16. How Vein Pattern Analysis Recognition Technology Works 224
History 224
Approach: Vascular Pattern in the Back of Hands 227
Summary/Conclusion 229
References 230
Chapter 17. How Ear-Shape Analysis Technology Works 232
Related Work 233
Technical Approach: Ear-Shape Model Building 235
Experimental Results: Data Acquisition 238
Summary/Conclusion 240
References 242
Chapter 18. How Body Odor and /or Scent Analysis Technology Works 244
Body Odor 246
Sensing System 251
Pattern-Recognition System 252
Olfactory Signal Processing and Pattern-Recognition System 253
Prototype Electronic Nose 255
Problems 256
Electronic Versus Human Nose 257
Who Works with It? 258
Current Applications 259
Future Applications 260
Messengers in Your Mouth 261
Problems Now and Later 262
Pores and Wrinkles 264
Summary/Conclusion 265
References 266
Chapter 19. How DNA Measurement Technology Works 268
How Is DNA Measurement Used as a Biometric Identifier? 269
DNA Template: DNA Fingerprinting 271
DNA Template: DNA Profiling 272
How Does It Work? 274
Digitalization and Storage 275
Technology: State of Development 279
Challenges and Limitations 279
Applications 281
Future Trends 281
Summary/Conclusion 283
References 283
Part 7: How Privacy-Enhanced Biometric-Based Verification/Authentication Works 286
Chapter 20. How Fingerprint Verification/Authentication Technology Works 288
History 289
Fingerprints 290
Fingerprint Verification 291
Feature Types 296
Image Processing and Verification 298
Technology: State of Development 308
Security 309
Privacy 310
Summary/Conclusion 312
References 314
Chapter 21. Vulnerable Points of a Biometric Verification System 316
Fingerprint Verification 318
Vulnerable Points of a Biometric System 321
Brute Force Attack Directed at Matching Fingerprint Minutiae 323
A More Realistic Model 326
WSQ-Based Data Hiding 327
The Decoder 334
Image-Based Challenge/Response Method 335
Cancelable Biometrics 337
Summary/Conclusion 343
References 344
Chapter 22. How Brute Force Attacks Work 346
Biometric Cryptography: Key Generation Using Feature and Parametric Aggregation to Show How Brute Force Attacks Work 347
Brute Force Attacks in General 350
Biometric Crypto Algorithms to Repel Brute Force Attacks 357
Summary/Conclusion 364
References 365
Chapter 23. How Data-Hiding Technology Works 368
Watermarking Techniques 372
Hiding Biometric Data 373
Experimental Results 376
Hiding a Fingerprint 380
Summary/Conclusion 386
References 387
Chapter 24. Image-Based Challenges/Response Methods 388
Image-Based Biometric User Verification Systems 388
Image-Based Biometric Verification Systems for Credit Cards 392
Summary/Conclusion 407
References 408
Chapter 25. How Cancelable Biometrics Work 410
Replaceable Biometrics 416
Cancelable Biometric Algorithm 418
Summary/Conclusion 420
References 421
Part 8: Large-Scale Implementation/Deployment of Biometric Technologies and Verification Systems 422
Chapter 26. Specialized Biometric Enterprise Deployment 424
Biometrics: Life Measures 426
The Case for Biometrics in Enterprise Security 427
Present State of Enterprise Specialized Biometric Security 432
Example Enterprise Scenarios 438
Summary/Conclusion 442
References 445
Chapter 27. How to Implement Biometric Technology and Verification Systems 446
Social Aspects of Biometric Technologies and Verification Systems 454
Economic Aspects of Biometric Technologies 460
Optimal Identity 461
The Emergence of Standards 462
Costs and Benefits 463
Supply 466
State of the Market 466
Legal Aspects of Biometric Technologies 471
Technical Aspects of Biometric Technologies 476
Biometrics as a Way to Increase Privacy, Anonymity, and Security 481
Summary/Conclusion 486
References 486
Part 9: Biometric Solutions and Future Directions 488
Chapter 28. How Mapping-the-Body Technology Works 490
Tracking 494
Recognition 499
Performance 507
Biometric Verification of Anthropometric Data, Gait Signatures, Human Activities, and Human Movement Disorders 511
Summary/Conclusion 525
References 528
Chapter 29. Selecting Biometric Solutions 530
Choosing the Right Biometric Solution 540
Uses for Biometrics 547
Selecting a Biometric Technology Solution 549
The Future of Biometrics 552
Smart Card Biometric Technology Solutions 554
Biometrics—Secure Verification by Smart Card 560
RFID Biometric Solutions 562
Summary/Conclusion 567
References 568
Chapter 30. Biometric Benefits 570
The Benefits of Working Biometrics 570
How Well Do Biometrics Work? 579
The Future of Biometrics 586
Scenario on Biometrics in Everyday Life 592
Scenario on Biometrics in Business 596
Scenario on Biometrics in Health 598
Scenario on Biometrics at the Border 600
Concluding Remarks on Scenario Exercises 604
Summary/Conclusion 606
References 615
Glossary 616
Index 636

Erscheint lt. Verlag 16.3.2007
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Betriebssysteme / Server
Informatik Netzwerke Sicherheit / Firewall
Informatik Software Entwicklung User Interfaces (HCI)
Technik Elektrotechnik / Energietechnik
ISBN-10 0-08-048839-0 / 0080488390
ISBN-13 978-0-08-048839-4 / 9780080488394
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 7,6 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99