This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Graphics and Security: Exploring Visual Biometrics
July/August 2002 (vol. 22 no. 4)
pp. 16-21

Biometrics is the science of recognizing a person on the basis of physical or behavioral characteristics. Things you can carry, such as keys or ID badges, can of course be lost, stolen, or duplicated. The same goes for things that you know, such as passwords or personal ID numbers. Biometrics relies on who you are--on one of any number of unique characteristics that you can't lose or forget.

1. H. Wechsler et al., Face Recognition: From Theory to Application, Springer-Verlag, Berlin, 1998.
2. P.J. Phillips et al., The Feret Evaluation Methodology for Face-Recognition Algorithms, NISTIR 6264, Nat'l Inst. of Standards and Technology, Gaithersburg, Md., 1998, http://www.itl.nist.gov/iaui/894.03pubs.html#face .
3. A.K. Jain et al., "An Identity-Authentication System Using Fingerprints," Proc. EuroSpeech 97, IEEE CS Press, Los Alamitos, Calif., 1997, pp. 1348-1388.
4. N. Ratha, K. Karu, S. Chen, and A.K. Jain, "A Real-Time Matching System for Large Fingerprint Databases," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 18, no. 8, pp. 799-813, Aug. 1996.
5. K. Karu and A.K. Jain,"Fingerprint Classification," Pattern Recognition, vol. 29, no. 3, 1996, pp. 389-404.
6. L. Flom and A. Safir,Iris Recognition System, US patent 4,641,349, Patent and Trademark Office, Washington, D.C., 1987.
7. J.G. Daugman,“High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1,148-1,161, Nov. 1993.
8. D. Gabor,"Theory of Communication," J. Institute of Electrical Engineers, vol. 93, no. 26, Nov. 1946, pp. 429-457.
9. B. Schneier,"Cryptographic Design Vulnerabilities," Computer, vol. 31, no. 9, Sept. 1998, pp. 29-33.
1. A.R. Roddy and J.D. Stosz, “Fingerprint Features—Statistical Analysis and System Performance Estimates” Proc. IEEE, vol. 85, no. 9, pp. 1390-1421, 1997.

Citation:
Kirk L. Kroeker, "Graphics and Security: Exploring Visual Biometrics," IEEE Computer Graphics and Applications, vol. 22, no. 4, pp. 16-21, July-Aug. 2002, doi:10.1109/MCG.2002.1016693
Usage of this product signifies your acceptance of the Terms of Use.