This Article 
 Bibliographic References 
 Add to: 
Biometric Authentication for Border Control Applications
August 2008 (vol. 20 no. 8)
pp. 1091-1096
For homeland and national security, the deployment of multi-modal biometrics is desirable with e-passports, but is hindered by privacy infringement and high cost implementation. We propose an authentication methodology which combines multi-modal biometrics and cryptographic mechanisms for border control applications. Specifically, we accommodate face and fingerprint without a mandatory requirement of (tamper-resistant) smart-card-level devices. We could imprint a (publicly readable) bar codes on the passport with regard to easier world-wide deployment. Additionally, we present a solution based on certification and key management method to control the validity of passports within the current PKI technology paradigm.

[1] K. Etemad and R. Chellappa, “Discriminant Analysis for Recognition of Human Face Images,” J. Optical Soc. of America A, pp. 1724-1733, 1997.
[2] D. Maio, D. Maltoni, R. Cappelli, J. Wayman, and A. Jain, “FVC2002: Second Fingerprint Verification Competition,” Proc. 16th Int'l Conf. Pattern Recognition (ICPR '02), vol. 3, pp. 811-814, , 2002.
[3] ICAO, Machine Readable Travel Documents Home Page, /, Mar. 2007.
[4] ICAO, PKI for Machine Readable Travel Documents Offering ICC Read-Only Access, version 1.1, ICAO MRTD, 2004.
[5] ICAO, Biometrics Deployment of Machine Readable Travel Documents, version2.0, ICAO MRTD, 2004.
[6] ICAO, Development of a Logical Data Structure—LDS for Optional Capacity Expansion Technologies, version 1.7, ICAO MRTD, 2004.
[7] ICAO, Issues of the ICAO Public Key Directory (PKD), ICAO MRTD, Apr. 2006.
[8] B. Jacobs, Biometry in Passports, passportindex.html, Nov. 2006.
[9] A. Juels, D. Molnar, and D. Wagner, “Security and Privacy Issues in E-passports,” Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SECURECOMM '05), Sept. 2005.
[10] T. Kwon and H. Moon, “Multi-Modal Biometrics with PKI Technologies for Border Control Applications,” Proc. IEEE Int'l Conf. Intelligence and Security Informatics (ISI '05), pp. 99-114, 2005.
[11] H. Moon, “Performance Evaluation Methodology for Face Recognition Algorithms,” PhD dissertation, Dept. of Computer Science and Eng., State Univ. of New York, Buffalo, 1999.
[12] P. Phillips, H. Moon, S. Rizvi, and P. Rauss, “The FERET Evaluation Methodology for Face-Recognition Algorithms,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, pp. 1090-1104, 2000.
[13] R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, pp. 120-126, 1978.
[14] C. Soutar, D. Roberge, A. Stoianov, R. Golroy, and B. Vijaya Kumar, “Biometric Encryption,” ICSA Guide to Cryptography. McGraw-Hill, 1999.
[15] M. Turk and A. Pentland, “Eigenfaces for Recognition,” J.Cognitive Neuroscience, vol. 3, no. 1, pp. 71-86, 1991.
[16] US DoS, USVISIT, http://fpc.state.gov20738.htm, May 2003.

Index Terms:
Security and Privacy Protection, Authentication, Verification
Taekyoung Kwon, Hyeonjoon Moon, "Biometric Authentication for Border Control Applications," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1091-1096, Aug. 2008, doi:10.1109/TKDE.2007.190716
Usage of this product signifies your acceptance of the Terms of Use.