Abstract
In this paper, we present a simple model that enables a low-cost but highly-scalable method for national border control applications. The proposed model could allow combining multi-modal biometrics with public key infrastructures (PKIs), in order to reduce the possibility of undesirable factors significantly. Instead of requiring tamper-resistant smart-card-level devices in a passport, we could print a barcode on it. The proposed model will be instantiated in our separate work.
This study was supported in part by a grant of the Korea Health 21 R&D Project, Ministry of Health & Welfare, Republic of Korea. (0412-MI01-0416-0002).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Daugman, J.: High confidence personal identifications by rapid video analysis of iris texture. In: IEEE Conference on Security Technologies, pp. 50–60 (1992)
Denso Inc., QRmaker: User’s Manual. Denso Corporation, Aichi, Japan (1998)
Fukunaga, K.: Introduction to statistical pattern recongition. Academic Press, Orlando (1972)
Jain, A., Hong, L., Pankanti, S.: Biometric identification. Commun. of the ACM (February 2000)
Jolliffe, I.: Principal Component Analysis. Springer, Heidelberg (1986)
Kwon, T.: Practical digital signature generation using biometrics. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 728–737. Springer, Heidelberg (2004)
Kwon, T., Moon, H.: Future Work (2005) (in submission)
V. Matyáš and Z. Říha, Biometric authentication - security and usability, http://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf
Moon, H.: Performance Evaluation Methodology for Face Recognition Algorithms, Ph.D. Thesis, Dept. of Computer Science and Eng., SUNY Buffalo (1999)
Palmer, R.: The Bar Code Book, 3rd edn. Helmers Publishing (1995)
Phillips, P., Moon, H., Rizvi, S., Rauss, P.: The FERET Evaluation Methodology for Face-Recognition Algorithms. IEEE Pattern Analysis and Machine Intelligence (22), 1090–1104 (2000)
Soutar, C.: Biometric system performance and security (2002), Manuscrypt available at http://www.bioscrypt.com/assets/bio_paper.pdf
Soutar, C., Roberge, D., Stoianov, A., Golroy, R., Vijaya Kumar, B.: Biometric Encryption. In: ICSA Guide to Cryptography, McGraw-Hill, New York (1999), Available at http://www.bioscrypt.com/assets/Biometric_Encryption.pdf
Turk, M., Pentland, A.: Eigenfaces for recognition. Journal of Cognitive Neuroscience 3(1), 71–86 (1991)
U.S. DoS, USVISIT, http://fpc.state.gov/20738.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, T., Moon, H. (2005). Multi-modal Biometrics with PKIs for Border Control Applications. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_61
Download citation
DOI: https://doi.org/10.1007/11424758_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25860-5
Online ISBN: 978-3-540-32043-2
eBook Packages: Computer ScienceComputer Science (R0)