1st Edition

Vein Pattern Recognition
A Privacy-Enhancing Biometric





ISBN 9781138115316
Published June 14, 2017 by CRC Press
307 Pages 89 B/W Illustrations

USD $86.95

Prices & shipping based on shipping country


Preview

Book Description

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR’s growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations.

Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today—including fingerprint, eye, face, voice recognition, and dynamic signature verification.

Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

Table of Contents

Identity
Identity Management
     Security of Exclusion (SOE)
     Security of Inclusion (SOI)
     Security of Accountability (SOA)
Access Control
     Role-Based Access Control (RBAC)
Authorization and Authentication

Biometrics Modalities
What Makes A Good Biometric?
Primary Biometric Types
     Physical Characteristics
     Behavioral Characteristics
Nontraditional Biometric Systems
Comparison of Traditional Biometric Types

Anatomy of Biometric Systems
Components of a Biometric System
Stages of the Biometric Process
     Verification / Identification Transactions
Biometrics and Smart Cards

Vein Pattern Recognition Modality
VPR Authentication Process
People Considerations
Light Imaging
VPR Sub-Modalities
     Back of the Hand
     The Palm
     The Finger

Vein Pattern Recognition Applications
Physical Access
     Ports
     Financial Institutions
     Buildings
     Safe Deposit Boxes
     Self-Service Solutions
Logical Access
     Health Care Services
     Electronic Benefits Transfer
     Strong Authentication
Workforce Management
Memberships
     Loyalty
     Hospitality
     Education
Accountability
     Firearms
     Voting
     Drivers’ Licenses
     Travel and Border Crossings
Embedded Biometrics

Evaluation and Protection of Vein Pattern Recognition Systems
Biometric Performance Metrics
     Enrollment Metrics
     Verification Metrics
     Identification Metrics
Biometric Standards and Testing
     Conformance Tests
     Interoperability Tests
     Performance Tests
Circumventing Biometrics
     Attacking a Biometric System
     Thwarting the Attacks

Multibiometric Systems
Limitations of Unimodal Systems
Multiple Integration Strategies
How Multi-Biometric Systems Work
     Processing Speed Improvement
     Accuracy Improvement
     Normalization
Key Issues
     Multimodal Architecture
     Total Cost of Ownership
     User Enrollment and Training
Combining Biometric Methodologies

Plan Your Biometric System: A How-To Guide
Plan the Plan
Control the Plan
Execute the Plan
Design the Solution
Test the Solution
Deploy the Solution
Evaluate the Project

Issues in Vein Pattern Recognition
Privacy
     Privacy Threats
     Privacy Enhancements
     Privacy Legislation
     Balancing Privacy and Security
     Best Practices
     The Business Case
     Summary
Glossary
Index

...
View More

Author(s)

Biography

Chuck Wilson has worked in the information technology (IT) industry for more than 30 years. He worked in the card processing industry for more than two decades, and has been researching and writing about smart cards and biometrics for ten years. Wilson spent 12 years with Electronic Data Systems (EDS) managing payment services and electronic benefits transfer (EBT) businesses. Mr. Wilson was Senior Vice President of CardSystems Solutions Inc., in Addison, Texas, where he led the development of emerging payment products. He was also Senior Director at Hitachi America where he headed up the Hitachi Security Solutions business in North America, focusing on biometrics and smart card solutions.

Today, Wilson manages and directs the Identity Verification business practice for ii2P, based in Southlake, Texas. In June 2001, Wilson’s first book, Get Smart, was published regarding the emergence of smart cards in the United States and their pivotal roles in electronic commerce.

Reviews

… a clear road map for the past, present, and future of biometrics ... a practical guide to biometrics in a clear and easy to understand form, even for non-technicians. This thoroughly researched book covers the main technologies in use today and explains the principles of operation and appropriate uses of each. … provides significant details for each system. ... Read this book and get a glimpse of how bright the future can be if we are all empowered rather than encumbered by technology
— Kevin R. Walsh, Senior Vice President R&D, Oracle Corporation, Asia Pacific Division

Chapter Five is especially insightful, detailing the various uses of VPR biometrics and how it has seen significant use in Japan, especially in the financial sector for identity verification. … an excellent reference for anyone who wants to get a handle on the various types of biometric technologies.
— Ben Rothke, CISSP, CISA, in Security Management