Preface
Biometrics uses methods for unique recognition of humans based upon one or more
intrinsic physical or behavioral traits. In computer science, particularly, biometrics is
used as a form of identity access management and access control. It is also used to
identifyindividualsingroupsthatareundersurveillance.
The key objective of the book is to provide comprehensive reference and text on
humanauthent
icationandpeopleidentityverificationfromphysiological,behavioural
and other points of view (medical biometrics). It aims to publish new insights into
currentinnovationsincomputersystems and technologyforbiometrics development
anditsapplications.
Thebookconsistsof13chapte
rs,eachfocusingonacertainaspectoftheproblem.The
book chapters are divided into three sections: physical biometrics, behavioral
biometrics and medical biometrics. In the first physical biometrics section, there are
seven chapters. Chapter 1 provides an in‐depth look at speaker recognition and
addressmanypractical andal
gorithmic issues related tothedesignandutilizationof
speakerrecognition.Inchapter2theauthorproposessomenewalgorithmsforfinger
vein recognition such as using oriented filtering, template matching with relative
distance and angle and wavelet moment fusing with PCA and LDA transform. In
chapter 3 the author gives the recent advancements in the field of minutia‐based
fingerprintextractionandrecognition.Chapter4providesacomprehensiveideaabout
some of the well‐known non‐minutiae based descriptorsduring the last two decades
and also proposes a novel non‐minutiae based fingerprint descriptor with tessellated
invariantmomentfeaturesan
dSupportVectorMachine(SVM).Inchapter5theretina
scanning technique isconsidered in detail throughout its historical evolutionand try
tousethebirefringenceoftheretinalnervefiberlayer(RNFL)asabasisforsuccessful
identification. Chapter 6 proposes a fully‐automatic authentication system using the
retinal vessel tree pattern as biometric characteristic. As the most reliable personal
identification,DNA isintrinsicallydigitalanddoesnotchangeduring a person’slife,
and even after death. In chapter 7 the author proposes a method for generating a
personal ID comprising short tandem repeat (STR) and single nucleotide
polymorphism(SNP)inform
ationwhichareusedinpersonalidentificationinforensic
application.