CHAPTER 29

BIOMETRIC AUTHENTICATION

David R. Lease, Robert Guess, Steven Lovaas, and Eric Salveggio

29.1 INTRODUCTION

29.2 IMPORTANCE OF IDENTIFICATION AND VERIFICATION

29.3 FUNDAMENTALS AND APPLICATIONS

29.3.1 Overview and History

29.3.2 Properties of Biometrics

29.3.3 Identification, Authentication, and Verification

29.3.4 Application Areas

29.3.5 Data Acquisition and Presentation

29.4 TYPES OF BIOMETRIC TECHNOLOGIES

29.4.1 Finger Scan

29.4.2 Facial Scan/Recognition

29.4.3 Hand Geometry Scan

29.4.4 Iris Scan

29.4.5 Voice Recognition

29.4.6 Other Biometric Technologies

29.5 TYPES OF ERRORS AND SYSTEM METRICS

29.5.1 False Accept

29.5.2 False Reject

29.5.3 Crossover Error Rate

29.5.4 Failure to Enroll

29.6 DISADVANTAGES AND PROBLEMS

29.6.1 General Considerations

29.6.2 Health and Disability Considerations

29.6.3 Environmental and Cultural Considerations

29.6.4 Cost Considerations

29.6.5 Attacks on Biometric Systems

29.6.6 Privacy Concerns

29.7 RECENT TRENDS IN BIOMETRIC AUTHENTICATION

29.7.1 Government Advances in Biometric Authentication

29.7.2 Face Scanning at Airports and Casinos

29.7.3 Increased Deployment in the Financial Industry

29.7.4 Biometrics in the Healthcare Industry

29.7.5 Increased Deployment of Time and Attendance Systems

29.8 SUMMARY AND RECOMMENDATIONS

29.9 FURTHER READING

29.10 NOTES

29.1 INTRODUCTION.

Once exclusively the purview of law enforcement, intelligence, and national security agencies, biometrics—the automated recognition of people based on their physiological ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.