1st Edition

Vein Pattern Recognition A Privacy-Enhancing Biometric

By Chuck Wilson Copyright 2010
    308 Pages 89 B/W Illustrations
    by CRC Press

    307 Pages 89 B/W Illustrations
    by CRC Press

    Continue Shopping

    As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR’s growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations.

    Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today—including fingerprint, eye, face, voice recognition, and dynamic signature verification.

    Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

    Identity Management
         Security of Exclusion (SOE)
         Security of Inclusion (SOI)
         Security of Accountability (SOA)
    Access Control
         Role-Based Access Control (RBAC)
    Authorization and Authentication

    Biometrics Modalities
    What Makes A Good Biometric?
    Primary Biometric Types
         Physical Characteristics
         Behavioral Characteristics
    Nontraditional Biometric Systems
    Comparison of Traditional Biometric Types

    Anatomy of Biometric Systems
    Components of a Biometric System
    Stages of the Biometric Process
         Verification / Identification Transactions
    Biometrics and Smart Cards

    Vein Pattern Recognition Modality
    VPR Authentication Process
    People Considerations
    Light Imaging
    VPR Sub-Modalities
         Back of the Hand
         The Palm
         The Finger

    Vein Pattern Recognition Applications
    Physical Access
         Financial Institutions
         Safe Deposit Boxes
         Self-Service Solutions
    Logical Access
         Health Care Services
         Electronic Benefits Transfer
         Strong Authentication
    Workforce Management
         Drivers’ Licenses
         Travel and Border Crossings
    Embedded Biometrics

    Evaluation and Protection of Vein Pattern Recognition Systems
    Biometric Performance Metrics
         Enrollment Metrics
         Verification Metrics
         Identification Metrics
    Biometric Standards and Testing
         Conformance Tests
         Interoperability Tests
         Performance Tests
    Circumventing Biometrics
         Attacking a Biometric System
         Thwarting the Attacks

    Multibiometric Systems
    Limitations of Unimodal Systems
    Multiple Integration Strategies
    How Multi-Biometric Systems Work
         Processing Speed Improvement
         Accuracy Improvement
    Key Issues
         Multimodal Architecture
         Total Cost of Ownership
         User Enrollment and Training
    Combining Biometric Methodologies

    Plan Your Biometric System: A How-To Guide
    Plan the Plan
    Control the Plan
    Execute the Plan
    Design the Solution
    Test the Solution
    Deploy the Solution
    Evaluate the Project

    Issues in Vein Pattern Recognition
         Privacy Threats
         Privacy Enhancements
         Privacy Legislation
         Balancing Privacy and Security
         Best Practices
         The Business Case


    Chuck Wilson has worked in the information technology (IT) industry for more than 30 years. He worked in the card processing industry for more than two decades, and has been researching and writing about smart cards and biometrics for ten years. Wilson spent 12 years with Electronic Data Systems (EDS) managing payment services and electronic benefits transfer (EBT) businesses. Mr. Wilson was Senior Vice President of CardSystems Solutions Inc., in Addison, Texas, where he led the development of emerging payment products. He was also Senior Director at Hitachi America where he headed up the Hitachi Security Solutions business in North America, focusing on biometrics and smart card solutions.

    Today, Wilson manages and directs the Identity Verification business practice for ii2P, based in Southlake, Texas. In June 2001, Wilson’s first book, Get Smart, was published regarding the emergence of smart cards in the United States and their pivotal roles in electronic commerce.

    … a clear road map for the past, present, and future of biometrics ... a practical guide to biometrics in a clear and easy to understand form, even for non-technicians. This thoroughly researched book covers the main technologies in use today and explains the principles of operation and appropriate uses of each. … provides significant details for each system. ... Read this book and get a glimpse of how bright the future can be if we are all empowered rather than encumbered by technology
    — Kevin R. Walsh, Senior Vice President R&D, Oracle Corporation, Asia Pacific Division

    Chapter Five is especially insightful, detailing the various uses of VPR biometrics and how it has seen significant use in Japan, especially in the financial sector for identity verification. … an excellent reference for anyone who wants to get a handle on the various types of biometric technologies.
    — Ben Rothke, CISSP, CISA, in Security Management