Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $34.99
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
22Activity

Table Of Contents

Introduction
Increased Security
Increased Convenience
Increased Accountability
Benefits of Biometrics in Identification Systems
Fraud Detection
Fraud Deterrence
Conclusion: Evaluating the Benefits of Biometric Systems
Definitions
Discussion: Verification and Identification
When Are Verification and Identification Appropriate?
Between Verification and Identification: 1:Few
Logical versus Physical Access
How Biometric Matching Works
Enrollment and Template Creation
Templates
Biometric Matching
Conclusion
False Match Rate
Importance of FMR
When Are False Matches Acceptable?
Single False Match Rate versus System False Match Rate
False Match Rate in Large-Scale Identification Systems
False Nonmatch Rate
➣Changes in a user’s biometric data
Importance of FNMR
Changes in a User’s Biometric Data
Changes in User Presentation
Changes in Environment
Real-World False Nonmatch Rates
Single FNMR versus System FNMR
Failure-to-Enroll (FTE) Rate
Importance of FTE Rates
Relation of Failure-to-Enroll to False Nonmatch Rate
FTE Across Different Populations
Single FTE Rates versus System FTE Rates
FTE in Large-Scale Identification Systems
Derived Metrics
Equal Error Rate (EER)
Ability-to-Verify (ATV) Rate
Components
How Finger-Scan Technology Works
Image Acquisition
Image Processing
Location of Distinctive Characteristics
Template Creation
Template Matching
Competing Finger-Scan Technologies
Optical Technology
Silicon Technology
Ultrasound Technology
Feature Extraction Methods: Minutiae versus Pattern Matching
Finger-Scan Deployments
Finger-Scan Strengths
Proven Technology Capable of High Levels of Accuracy
Range of Deployment Environments
Ergonomic, Easy-to-Use Devices
Ability to Enroll Multiple Fingers
Finger-Scan Weaknesses
Inability to Enroll Some Users
Performance Deterioration over Time
Association with Forensic Applications
Need to Deploy Specialized Devices
Finger-Scan: Conclusion
How Facial-Scan Technology Works
Distinctive Characteristics
Competing Facial-Scan Technologies
Eigenface
Feature Analysis
Neural Network
Automatic Face Processing
Facial-Scan Deployments
Facial-Scan Strengths
Ability to Leverage Existing Equipment and Imaging Processes
Ability to Operate without Physical Contact or User Complicity
Ability to Enroll Static Images
Facial-Scan Weaknesses
Acquisition Environment Effect on Matching Accuracy
Facial-Scan: Conclusion
How It Works
Distinctive Features
Template Generation
Deployments
Iris-Scan Strengths
Resistance to False Matching
Stability of Characteristic over Lifetime
Suitability for Logical and Physical Access
Iris-Scan Weaknesses
Difficulty of Usage
False Nonmatching and Failure-to-Enroll
User Discomfort with Eye-Based Technology
Need for a Proprietary Acquisition Device
Iris-Scan: Conclusion
Data Acquisition
Data Processing
Voice-Scan Strengths
Ability to Leverage Existing Telephony Infrastructure
Resistance to Imposters
Lack of Negative Perceptions Associated with Other Biometrics
Voice-Scan Weaknesses
Effect of Acquisition Devices and Ambient Noise on Accuracy
Perception of Low Accuracy
Lack of Suitability for Today’s PC Usage
Large Template Size
Voice-Scan: Conclusion
Hand-Scan
Hand-Scan Strengths
Hand-Scan Weaknesses
Retina-Scan
Retina-Scan Strengths
Retina-Scan Weaknesses
Automated Fingerprint Identification Systems (AFIS)
How AFIS and Finger-Scan Differ
Signature-Scan
Signature-Scan Strengths
Signature-Scan Weaknesses
Keystroke-Scan
Keystroke-Scan Strengths
Keystroke-Scan Weaknesses
Defining the Seven Biometric Applications
Capacities in Which Individuals Use Biometric Systems
Introduction to IBG’s Biometric Solution Matrix
How Well Can Biometrics Solve the Authentication Problem?
Are Biometrics the Only Possible Authentication Solution?
Criminal Identification
Today’s Criminal Identification Applications
Future Criminal Identification Trends
Related Biometric Technologies and Vertical Markets
Cost to Deploy Biometrics in Criminal Identification
Citizen Identification
Typical Applications
Future Trends in Citizen Identification
Related Biometric Technologies and Vertical Markets
Cost to Deploy Biometrics in Citizen Identification
Issues Involved in Deployment
Surveillance
Today’s Surveillance Applications
Future Trends in Surveillance
Cost to Deploy Biometrics in Surveillance
PC/Network Access
Today’s PC/Network Access Applications
Future Trends in PC/Network Access
Costs to Deploy Biometrics in PC/Network Access
Physical Access/Time and Attendance
Today’s Physical Access/Time and Attendance Applications
Future Physical Access/Time and Attendance Trends
E-Commerce/Telephony
Today’s E-Commerce/Telephony Applications
Future E-Commerce/Telephony Trends
Costs to Utilize Biometrics in E-Commerce/Telephony
Retail/ATM/Point of Sale
Today’s Retail/ATM/Point-of-Sale Applications
Future Retail/ATM/Point-of-Sale Trends
Cost to Deploy Biometrics in Retail/ATM/POS
Five Primary Biometric Vertical Markets
Law Enforcement
Technologies Used in Law Enforcement
Typical Law Enforcement Deployments
Government Sector
Technologies Used in the Government Sector
Typical Government-Sector Deployments
Financial Sector
Technologies Used in the Financial Sector
Typical Financial-Sector Deployments
Healthcare
Technologies Used in Healthcare
Typical Healthcare Deployments
Travel and Immigration
Technologies Used in Travel and Immigration
Typical Travel and Immigration Deployments
Additional Biometric Verticals
Biometric Deployments on a Privacy Continuum
Informational Privacy
Personal Privacy
Privacy-Sympathetic Qualities of Biometric Technology
Overt versus Covert
Opt-in versus Mandatory
Verification versus Identification
Public Sector versus Private Sector
Personal Storage versus Storage in Template Database
Behavioral versus Physiological Biometric Technology
Template Storage versus Identifiable Data Storage
BioPrivacy Technology Risk Ratings
BioPrivacy Best Practices: Scope and Capabilities
Limit System Scope
Do Not Use Biometrics as a Unique Identifier
Limit Retention of Biometric Information
Evaluate a System’s Potential Capabilities
Limit Storage of Identifiable Biometric Data
Limit Collection and Storage of Extraneous Information
Make Provisions for System Termination
IBG BioPrivacy Best Practices: Data Protection
Protect Postmatch Decisions
Limit System Access
BioPrivacy Best Practices: User Control of Personal Data
Make System Usage Voluntary and Allow for Unenrollment
Enable Anonymous Enrollment and Verification
Make Provisions for Third-Party Auditing and Oversight
Hold Operators Accountable for System Use and Misuse
Fully Disclose Audit Findings
Disclose the System Purpose and Objectives
Disclose Whether Enrollment Is Optional or Mandatory
Why Standards?
Application Programming Interfaces
BioAPI
BAPI
Deployers, Developers, and Biometric APIs
Information Security for Financial Services
Additional Efforts
Fingerprint Template Interoperability
P. 1
Biometrics: Identity Verification in a Networked World

Biometrics: Identity Verification in a Networked World

Ratings:

3.0

(1)
|Views: 905 |Likes:
Published by Wiley
An insight into the biometric industry and the steps for successful deployment

Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see widespread deployment in network, e-commerce, and retail applications. This book provides in-depth analysis of biometrics as a solution for authenticating employees and customers. Leading authority, Samir Nanavati explores privacy, security, accuracy, system design, user perceptions, and lessons learned in biometric deployments. He also assesses the real-world strengths and weaknesses of leading biometric technologies: finger-scan, iris-scan, facial-scan, voice-scan, and signature-scan. This accessible book is a necessary step in understanding and implementing biometrics.

Demystifies the complex world of optical networks for IT and business managers

Over the past few years, the cost of fiber optic networking has decreased, making it the best solution for providing virtually unlimited bandwidth for corporate LANs and WANs, metropolitan networks, Internet access, and broadband to the home. The only strategic book on optical networking technologies written from a real-world business perspective, Optical Networking demystifies complex fiber technologies for managers, and details the practical business benefits an optical network can offer. Debra Cameron explores established and emerging markets for optical networks as well as the enabling technologies, applications, network architectures, key deployment issues, and cost considerations. She also provides in-depth case studies of optical networks now in use in the United States and abroad.

An insight into the biometric industry and the steps for successful deployment

Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see widespread deployment in network, e-commerce, and retail applications. This book provides in-depth analysis of biometrics as a solution for authenticating employees and customers. Leading authority, Samir Nanavati explores privacy, security, accuracy, system design, user perceptions, and lessons learned in biometric deployments. He also assesses the real-world strengths and weaknesses of leading biometric technologies: finger-scan, iris-scan, facial-scan, voice-scan, and signature-scan. This accessible book is a necessary step in understanding and implementing biometrics.

Demystifies the complex world of optical networks for IT and business managers

Over the past few years, the cost of fiber optic networking has decreased, making it the best solution for providing virtually unlimited bandwidth for corporate LANs and WANs, metropolitan networks, Internet access, and broadband to the home. The only strategic book on optical networking technologies written from a real-world business perspective, Optical Networking demystifies complex fiber technologies for managers, and details the practical business benefits an optical network can offer. Debra Cameron explores established and emerging markets for optical networks as well as the enabling technologies, applications, network architectures, key deployment issues, and cost considerations. She also provides in-depth case studies of optical networks now in use in the United States and abroad.

More info:

Publish date: Apr 29, 2002
Added to Scribd: Sep 09, 2010
Copyright:Traditional Copyright: All rights reservedISBN:9780471264781
List Price: $34.99 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
See more
See less

09/16/2014

320

9780471264781

$34.99

USD

You're Reading a Free Preview
Pages 4 to 51 are not shown in this preview.
You're Reading a Free Preview
Pages 54 to 320 are not shown in this preview.

Activity (22)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
windua liked this
Maisan Abu-Ayied liked this
Alisa Hebibovic liked this
Moosa Alrasheedi liked this
mayurshah24 liked this
Kathleen Blair liked this
windua liked this
windua liked this

You're Reading a Free Preview

Download