Biometric authentication

A copula-based approach

Satish G. Iyengar, Pramod Kumar Varshney, Thyagaraju Damarla

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Abstract

Introduction The process of authentication involves verifying the identity of a person claiming access to one or more resources of a system. Authentication systems can be based on passwords, security tokens, biometrics, or combinations of them (O’Gorman 2003). Passwords are words, phrases, or alphanumeric personal identification numbers (PINs) that serve as short-form indicators of a person’s identity. They are usually created by authorized users during the enrollment or registration phase (e.g., creating computer user accounts) and are kept secret from others. Security tokens, on the other hand, are physical devices that the users are required to carry to be allowed access to the system. More recent designs of automatic human recognition systems involve the use of features such as face, fingerprints, iris, or behavioral traits such as gait or rate of keystrokes. For example, in building access control applications, a person’s face may be matched to templates stored in a database consisting of all enrolled users. Decision to allow or deny entry is then taken based on the similarity score generated by the face-matching algorithm. Such security systems that rely on biometrics have several advantages over the more conventional ones (passwords or security tokens). For example, a PIN, if leaked, may be used by an unauthorized person causing serious security concerns. However, a person’s physical signature belongs only to that individual and is extremely difficult if not impossible to emulate. Further, biometric systems may be more convenient and user friendly because there is no password to remember or any token to carry.

Original languageEnglish (US)
Title of host publicationMultibiometrics for Human Identification
PublisherCambridge University Press
Pages95-119
Number of pages25
ISBN (Print)9780511921056, 9780521115964
DOIs
StatePublished - Jan 1 2011

Fingerprint

Biometrics
Authentication
Security systems
Access control

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Iyengar, S. G., Varshney, P. K., & Damarla, T. (2011). Biometric authentication: A copula-based approach. In Multibiometrics for Human Identification (pp. 95-119). Cambridge University Press. https://doi.org/10.1017/CBO9780511921056.007

Biometric authentication : A copula-based approach. / Iyengar, Satish G.; Varshney, Pramod Kumar; Damarla, Thyagaraju.

Multibiometrics for Human Identification. Cambridge University Press, 2011. p. 95-119.

Research output: Chapter in Book/Report/Conference proceedingChapter

Iyengar, SG, Varshney, PK & Damarla, T 2011, Biometric authentication: A copula-based approach. in Multibiometrics for Human Identification. Cambridge University Press, pp. 95-119. https://doi.org/10.1017/CBO9780511921056.007
Iyengar SG, Varshney PK, Damarla T. Biometric authentication: A copula-based approach. In Multibiometrics for Human Identification. Cambridge University Press. 2011. p. 95-119 https://doi.org/10.1017/CBO9780511921056.007
Iyengar, Satish G. ; Varshney, Pramod Kumar ; Damarla, Thyagaraju. / Biometric authentication : A copula-based approach. Multibiometrics for Human Identification. Cambridge University Press, 2011. pp. 95-119
@inbook{f2ca59121ecd49d393d810de5ef20225,
title = "Biometric authentication: A copula-based approach",
abstract = "Introduction The process of authentication involves verifying the identity of a person claiming access to one or more resources of a system. Authentication systems can be based on passwords, security tokens, biometrics, or combinations of them (O’Gorman 2003). Passwords are words, phrases, or alphanumeric personal identification numbers (PINs) that serve as short-form indicators of a person’s identity. They are usually created by authorized users during the enrollment or registration phase (e.g., creating computer user accounts) and are kept secret from others. Security tokens, on the other hand, are physical devices that the users are required to carry to be allowed access to the system. More recent designs of automatic human recognition systems involve the use of features such as face, fingerprints, iris, or behavioral traits such as gait or rate of keystrokes. For example, in building access control applications, a person’s face may be matched to templates stored in a database consisting of all enrolled users. Decision to allow or deny entry is then taken based on the similarity score generated by the face-matching algorithm. Such security systems that rely on biometrics have several advantages over the more conventional ones (passwords or security tokens). For example, a PIN, if leaked, may be used by an unauthorized person causing serious security concerns. However, a person’s physical signature belongs only to that individual and is extremely difficult if not impossible to emulate. Further, biometric systems may be more convenient and user friendly because there is no password to remember or any token to carry.",
author = "Iyengar, {Satish G.} and Varshney, {Pramod Kumar} and Thyagaraju Damarla",
year = "2011",
month = "1",
day = "1",
doi = "10.1017/CBO9780511921056.007",
language = "English (US)",
isbn = "9780511921056",
pages = "95--119",
booktitle = "Multibiometrics for Human Identification",
publisher = "Cambridge University Press",
address = "United Kingdom",

}

TY - CHAP

T1 - Biometric authentication

T2 - A copula-based approach

AU - Iyengar, Satish G.

AU - Varshney, Pramod Kumar

AU - Damarla, Thyagaraju

PY - 2011/1/1

Y1 - 2011/1/1

N2 - Introduction The process of authentication involves verifying the identity of a person claiming access to one or more resources of a system. Authentication systems can be based on passwords, security tokens, biometrics, or combinations of them (O’Gorman 2003). Passwords are words, phrases, or alphanumeric personal identification numbers (PINs) that serve as short-form indicators of a person’s identity. They are usually created by authorized users during the enrollment or registration phase (e.g., creating computer user accounts) and are kept secret from others. Security tokens, on the other hand, are physical devices that the users are required to carry to be allowed access to the system. More recent designs of automatic human recognition systems involve the use of features such as face, fingerprints, iris, or behavioral traits such as gait or rate of keystrokes. For example, in building access control applications, a person’s face may be matched to templates stored in a database consisting of all enrolled users. Decision to allow or deny entry is then taken based on the similarity score generated by the face-matching algorithm. Such security systems that rely on biometrics have several advantages over the more conventional ones (passwords or security tokens). For example, a PIN, if leaked, may be used by an unauthorized person causing serious security concerns. However, a person’s physical signature belongs only to that individual and is extremely difficult if not impossible to emulate. Further, biometric systems may be more convenient and user friendly because there is no password to remember or any token to carry.

AB - Introduction The process of authentication involves verifying the identity of a person claiming access to one or more resources of a system. Authentication systems can be based on passwords, security tokens, biometrics, or combinations of them (O’Gorman 2003). Passwords are words, phrases, or alphanumeric personal identification numbers (PINs) that serve as short-form indicators of a person’s identity. They are usually created by authorized users during the enrollment or registration phase (e.g., creating computer user accounts) and are kept secret from others. Security tokens, on the other hand, are physical devices that the users are required to carry to be allowed access to the system. More recent designs of automatic human recognition systems involve the use of features such as face, fingerprints, iris, or behavioral traits such as gait or rate of keystrokes. For example, in building access control applications, a person’s face may be matched to templates stored in a database consisting of all enrolled users. Decision to allow or deny entry is then taken based on the similarity score generated by the face-matching algorithm. Such security systems that rely on biometrics have several advantages over the more conventional ones (passwords or security tokens). For example, a PIN, if leaked, may be used by an unauthorized person causing serious security concerns. However, a person’s physical signature belongs only to that individual and is extremely difficult if not impossible to emulate. Further, biometric systems may be more convenient and user friendly because there is no password to remember or any token to carry.

UR - http://www.scopus.com/inward/record.url?scp=84923556279&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84923556279&partnerID=8YFLogxK

U2 - 10.1017/CBO9780511921056.007

DO - 10.1017/CBO9780511921056.007

M3 - Chapter

SN - 9780511921056

SN - 9780521115964

SP - 95

EP - 119

BT - Multibiometrics for Human Identification

PB - Cambridge University Press

ER -