Biometrics

Guest Editors' Introduction • Ron Vetter and Karl Ricanek Jr. • February 2010

Theme Articles


This month's theme includes the following featured articles:

Iris Recognition: The Path Forward
Iris recognition systems have made tremendous inroads over the past decade, but work remains to improve their accuracy in less-than-ideal environments. More »

Fingerprint Matching
Fingerprint matching has applications beyond law enforcement, such as identity management and access control. Learn about an automated fingerprint recognition system and key challenges and research opportunities. More »

Face Recognition by Computers and Humans
Research into face recognition offers research opportunities that will challenge scientists and engineers for years to come. More »

Unconstrained Biometric Identification:
Emerging Technologies

Research from the Center for Advanced Studies in Identity Sciences is aggressively addressing the challenges of face and iris recognition of subjects in unconstrained environments.
More »

Biometrics Could Streamline Border Crossings
The US and the EU are moving toward biometrically enabled travel documents and new border-control proposals meant to increase security and convenience for legitimate travelers. However, technology and policy differences characterize a bumpy journey. More »

The Biometric Menagerie
Biometric systems work better for some users than others. A thorough investigation into this phenomenon exposes novel, important, and encouraging insights into the nature of biometric match results. More »

What else is new? »

 

Biometrics This month, Computing Now explores biometrics—the authentication of persons based on physical or behavioral characteristics. Biometric technology can be found in many aspects of our daily life, from paying for groceries to accessing personal computers and buildings to automatically labeling and organizing digital pictures.

Historical Background

Biometrics has a long history dating back several thousand years, when biometric information was used to process payment (food rations) for thousands of workers building the pyramids. Historical documents indicate that notes were kept detailing names and birthplaces along with physical characteristics (height, weight/girth, scars, deformities) and behavioral traits (rude, sullen, braggadocio, happy) to ensure that workers did not cheat the payment system.

In more modern times, biometrics can be traced back to work by Henry Fauld (1880), Francis Galton (1888), and Edward Henry (1899) on identification based on fingerprint patterns. The events of 9/11 instigated more recent research and development activities in biometrics. The premise of this research is to discover techniques that could uniquely distinguish a potential terrorist from the general population (1-to-N-million search). The outgrowth of this effort has been efforts to develop biometric systems that can verify identity (verification), which performs 1-to-1 matches, a much easier task than identification.

The fevered pace of biometrics research has created new modalities based on keyboarding patterns or mouse movements, walking patterns (gait), types of utterances (speech), the configuration of veins in the finger or hand (veinal), geometries of the finger or hand, the face, and the complex structures of the melanin-rich area of the eye (iris). These emerging biometric modalities have created vast commercial opportunities outside the more common public sector uses. In fact, Acuity Market Intelligence, a technology strategy company located in Louisville, Colorado, predicts a compound annual growth rate of 19.69 percent for biometric technology from 2009 to 2017, at which point commercial deployment of biometrics will outpace public sector use.

Technological Diversity

This month's articles showcase the diversity of biometric technology and its uses by describing popular biometric modalities including fingerprint, face, and iris recognition; discussing what’s next for these traditional techniques; and highlighting new modalities that may soon be available as commercial products.

Four foundational articles are taken from Computer’s February 2010 special issue on biometrics.

In “Iris Recognition: The Path Forward,” Arun Ross provides a systematic overview of the components of an iris recognition system, describes its prowess for identification, and indicates directions for improvements and future research.

In "Fingerprint Matching," Anil K. Jain and coauthors provide a thorough review of the use of fingerprints, which are unique to each person, from the inception of this technology in the mid-1800s to law-enforcement and civilian applications today. The authors point out that, although fingerprints have been used for identification for more than a century, challenging research problems remain in perfecting automatic recognition.

"Face Recognition by Computers and Humans" by Rama Chellapa and colleagues details the difficulties with automatic face recognition by computers, discusses the mechanics of human face recognition, and compares the two approaches.

The final article from Computer’s special issue, "Unconstrained Biometric Identification: Emerging Technologies," discusses the next generation in biometrics for identification, which removes the current constraints placed on face and iris recognition. The authors articulate the face recognition problems associated with facial aging and introduce soft biometrics in the form of age estimation from a face. The remaining articles discuss various uses of biometrics from streamlining border crossings to the intricacies of matching a person to new modalities for verification.

In "Biometrics Could Streamline Border Crossings," Greg Goth provides compelling arguments for the use of biometrics in travel security and discusses the necessity for governments to work together to define the use of the technology.

"The Biometric Menagerie," by Neil Yager and Ted Dunstone, offers insights into why it’s more difficult to authenticate some people using biometric systems. This article distinguishes matching problems associated with "goats" (subjects that are difficult to match), "wolves" (subjects that match well to others), and "doves" (subjects that match well only to themselves).

"A Novel Approach to Design of User Re-Authentication Systems" by Harini Jagadeesan and Michael Hsiao, and "Biometric Authentication Based on Infrared Thermal Hand Vein Patterns" by Amioy Kumar and coauthors, introduce two little-known biometrics. The first article provides experimental data on the efficacy of re-authenticating a PC user based on mouse and typing gestures. The second article discusses evidence for a new physical biometric system based on hand veins. The system acquires the biometric signal from infrared images of a hand, which are computed by Gabor filters to produce a biometric template for matching. (Login is required for these two articles.)

We hope you find these articles on biometrics informative and enjoy reading them as much as we have. Be sure to complete the online poll and give your opinion on different aspects of this topic.

 

Ron VetterRon Vetter, the cofounder of Mobile Education, LLC, and a professor in the Computer Science Department at the University of North Carolina, Wilmington, is a member of Computer’s editorial board. Contact him at vetterr at uncw dot edu.  

 

Karl Ricanek Jr.

Karl Ricanek Jr. is the director of the Face Aging Group Research Lab and an associate professor in the Computer Science Department at UNC Wilmington. He has worked in the area of biometrics since 1997. Contact him at ricanekk at uncw dot edu.

 

 

What's New

Proxying: The Next Step in Reducing IT Energy Use
Proxying is a simple and effective means of allowing network hosts to sleep while maintaining network presence. More »

Plenty of Room Outside the Firm
The fundamental functions of computing are numeric calculation and bookkeeping, but the public Internet and "emergent collectives" have led to disruptive applications, providing a new area of computer science research. More »

Building a Better Boot Camp
The security field is vast, and the temptation is to keep adding to the collection of topics we consider to be basic. We explore the question of what precisely is basic training in information assurance today. More »

Wearable Displays—for Everyone!
Spectacles, a wireless display platform integrated into eyeglass frames, integrates video see-through display hardware components into a socially acceptable, wearable form factor. More »

Reliability Challenges and System Performance at the Architecture Level
A review of component-level issues for nanoscale devices includes methods to help detect and correct system errors while still delivering performance and managing complexity. More »

Architecting Storage for the Cloud Computing Era
Advances in processor design are widening the performance gap between CPUs and storage disk drives. Two broad research efforts address the challenges. More »

Web 3.0: The Dawn of Semantic Search
Emerging Web 3.0 applications use semantic technologies to augment the underlying Web system's functionalities. More »

Architects as Service Providers
Providing architecture as a service to application developers facilitates communication between architecture and development teams and sustains the architecture's effectiveness throughout a project's lifetime. More »

CancerSpace: A Simulation-Based Game for Improving Cancer-Screening Rates
CancerSpace aims to promote strategies and research-tested interventions that physicians and other healthcare workers can implement to overcome barriers and make cancer screening more efficient and cost-effective. More »

Information Overload: A Collaborative Dance Performance
A complex artistic-engineering collaboration integrates digital media with live dance to express ways we relate to technology's impact on our lives. More »

Event Monitoring and Service in a Flat World—Benefits and Challenges
Organizations that expand their IT infrastructures into a global business environment need reliable event monitoring to help manage it.
More
»

Whip Until Solved
It's possible to use iterated projections to design an algorithm for solving Sudoku puzzles—but, as you'll see, iteration doesn't always give the desired result. More »

Personal Information Access Using Proactive Search and Mobile Hypertext
A new framework combining proactive search with mobile hypertext lets mobile phone users avoid text entry and tailors search results to suit the context. More »