Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Multi-modal Biometrics with PKIs for Border Control Applications

  • Conference paper
Computational Science and Its Applications – ICCSA 2005 (ICCSA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3480))

Included in the following conference series:

  • 979 Accesses

Abstract

In this paper, we present a simple model that enables a low-cost but highly-scalable method for national border control applications. The proposed model could allow combining multi-modal biometrics with public key infrastructures (PKIs), in order to reduce the possibility of undesirable factors significantly. Instead of requiring tamper-resistant smart-card-level devices in a passport, we could print a barcode on it. The proposed model will be instantiated in our separate work.

This study was supported in part by a grant of the Korea Health 21 R&D Project, Ministry of Health & Welfare, Republic of Korea. (0412-MI01-0416-0002).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Daugman, J.: High confidence personal identifications by rapid video analysis of iris texture. In: IEEE Conference on Security Technologies, pp. 50–60 (1992)

    Google Scholar 

  2. Denso Inc., QRmaker: User’s Manual. Denso Corporation, Aichi, Japan (1998)

    Google Scholar 

  3. Fukunaga, K.: Introduction to statistical pattern recongition. Academic Press, Orlando (1972)

    Google Scholar 

  4. Jain, A., Hong, L., Pankanti, S.: Biometric identification. Commun. of the ACM (February 2000)

    Google Scholar 

  5. Jolliffe, I.: Principal Component Analysis. Springer, Heidelberg (1986)

    Google Scholar 

  6. Kwon, T.: Practical digital signature generation using biometrics. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 728–737. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Kwon, T., Moon, H.: Future Work (2005) (in submission)

    Google Scholar 

  8. V. Matyáš and Z. Říha, Biometric authentication - security and usability, http://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf

  9. Moon, H.: Performance Evaluation Methodology for Face Recognition Algorithms, Ph.D. Thesis, Dept. of Computer Science and Eng., SUNY Buffalo (1999)

    Google Scholar 

  10. Palmer, R.: The Bar Code Book, 3rd edn. Helmers Publishing (1995)

    Google Scholar 

  11. Phillips, P., Moon, H., Rizvi, S., Rauss, P.: The FERET Evaluation Methodology for Face-Recognition Algorithms. IEEE Pattern Analysis and Machine Intelligence (22), 1090–1104 (2000)

    Google Scholar 

  12. Soutar, C.: Biometric system performance and security (2002), Manuscrypt available at http://www.bioscrypt.com/assets/bio_paper.pdf

  13. Soutar, C., Roberge, D., Stoianov, A., Golroy, R., Vijaya Kumar, B.: Biometric Encryption. In: ICSA Guide to Cryptography, McGraw-Hill, New York (1999), Available at http://www.bioscrypt.com/assets/Biometric_Encryption.pdf

  14. Turk, M., Pentland, A.: Eigenfaces for recognition. Journal of Cognitive Neuroscience 3(1), 71–86 (1991)

    Article  Google Scholar 

  15. U.S. DoS, USVISIT, http://fpc.state.gov/20738.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kwon, T., Moon, H. (2005). Multi-modal Biometrics with PKIs for Border Control Applications. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_61

Download citation

  • DOI: https://doi.org/10.1007/11424758_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25860-5

  • Online ISBN: 978-3-540-32043-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics