CHAPTER 29
BIOMETRIC AUTHENTICATION
David R. Lease, Robert Guess, Steven Lovaas, and Eric Salveggio
29.2 IMPORTANCE OF IDENTIFICATION AND VERIFICATION
29.3 FUNDAMENTALS AND APPLICATIONS
29.3.2 Properties of Biometrics
29.3.3 Identification, Authentication, and Verification
29.3.5 Data Acquisition and Presentation
29.4 TYPES OF BIOMETRIC TECHNOLOGIES
29.4.2 Facial Scan/Recognition
29.4.6 Other Biometric Technologies
29.5 TYPES OF ERRORS AND SYSTEM METRICS
29.6 DISADVANTAGES AND PROBLEMS
29.6.2 Health and Disability Considerations
29.6.3 Environmental and Cultural Considerations
29.6.5 Attacks on Biometric Systems
29.7 RECENT TRENDS IN BIOMETRIC AUTHENTICATION
29.7.1 Government Advances in Biometric Authentication
29.7.2 Face Scanning at Airports and Casinos
29.7.3 Increased Deployment in the Financial Industry
29.7.4 Biometrics in the Healthcare Industry
29.7.5 Increased Deployment of Time and Attendance Systems
29.8 SUMMARY AND RECOMMENDATIONS
29.1 INTRODUCTION.
Once exclusively the purview of law enforcement, intelligence, and national security agencies, biometrics—the automated recognition of people based on their physiological ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.