VIII
Preface
who is ill, unable to speak, and in pain, for example, as the authors suggest. This chap-
ter describes existing methods and presents unique work on the use of 3D facial data
for the automatic recognition of facial expressions.
More generally, the issue of computer automated facial recognition technologies for
forensic purposes is raised in Chapter 5. Herein we learn about the challenges normal
aging presents to computer face recognition. As faces age, they change. How much do
they change? How does this aff ect computer face recognition? We see that a er many
years a person’s face may be amazingly diff erent. However, what if our faces change
slightly on a daily basis? Would this subtle change aff ect computer face recognition?
Chapter 5 explores face aging in face recognition, and introduces an experiment on face
changes in one person in one day.
Aside from recognizing entire faces, much work in biometrics may be found in explor-
ing identity markers based on single features, such as the iris of the eye. Chapter 6
reviews the latest developments in iris recognition used on handheld iris recognition
devices, both for government or private sector endeavors. Through a mobile biometric
identifi cation system (MBI system) case study, we learn about hardware specifi cs, iris
recognition algorithms, and system performance. Current solutions and the step-by-
step format of this chapter are sure to captivate interest.
From ecology to human identifi cation, it can be seen that biometrics has both breadth
and depth of utility. And with all the biometric data collected in large databases, one
issue that has been raised with regard to the use of these data is the issue of privacy.
Chapter 7 addresses the issue of privacy through an explanation of biometric data-
mining. Biometrics systems recognize us in two ways—physically (e.g., fi ngerprints) or
behaviorally (e.g., voice); and biometric data-mining merges these aspects of recogni-
tion such that we may be identifi ed by how we use computers, for example keystroke
pa erns, mouse movements, and online behaviors. Detailed examples and intrigu-
ing descriptions of biometric data-mining and its implications are presented in this
chapter.
Continuing in the theme of privacy issues, Chapter 8 introduces us to the BioAPI 2.0—a
new industry standard in biometric systems that allows for interoperability while
maintaining security and privacy. If one biometric can serve as a security measure (for
example, the iris of the eye is read rather than a key being used to unlock a door), then
security may be increased if more than one biometric system may be used. However,
because biometric systems are composed of various segments and those segments do
various things that are o en isolated—they are non-interchangeable between systems.
Vendors of biometric systems are therefore limited; and interfacing is compromised.
The BioAPI 2.0 is explained in this chapter as a means to creating an interface that al-
lows diff erent biometric systems to work together. The authors provide an excellent
background and detailed information on the BioAPI 2.0.
Also working on improving the technology and usability of biometric systems are the
authors of Chapter 9 who research multi-modal biometrics solutions for embedded
systems. Embedded systems that collect, store, modify, and retrieve data, such as
personal information, are o en at risk. In this chapter, the researchers discuss the
development of multi-modal biometric systems as opposed to less robust uni-modal