80
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Performance issues in biometric authentication based on information theoretic concepts: A review

, &
Pages 273-285 | Published online: 01 Sep 2014

References

  • B. Schiener, “Applied Cryptography”, John Wiley & Sons, 1996.
  • A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Trans on Information Forensics and Security, vol. 1, no. 2, pp. 125–143, 2006.
  • J L. Wayman, A K. Jain, D. Maltoni, and D. Maio (Eds.), “Biometric Systems: Technology, Design and Performance Evaluation”. New York: Springer Verlag, 2005.
  • A. Ross, K. Nandkumar, and A. K. Jain. “Handbook of Multibiometrics”, Springer Verlag, 2006.
  • J. Daugman, “Probing the uniqueness and randomness of Iris Codes: Results from 200 billion iris pair comparisons,” Proc. IEEE, vol. 94, no. 11, pp. 1927–1935, 2006.
  • R. Duda, P. Hart, and D. Stork, “Pattern Classification”, Wiley student edition, 1997.
  • R G. Gallager, “Information Theory and Reliable Communication”, John Wiley & Sons, 1968.
  • T. Cover, and J. Thomas, “Elements of Information Theory”, John Wiley & Sons, 1991.
  • S. Verdù, and S. McLaughlin, “Information Theory: 50 years of Discovery”. Wiley Series, 1999.
  • J. Wozencraft, and B. Reiffen, “Sequential Decoding”, Cambridge, MA, MIT Press and Wiley, 1974.
  • J. Bhatnagar, and A. Kumar, “On Estimating Some Performance Indices for Biometric Identification,” Pattern Recognition, vol. 42, no. 5, pp. 1805–1818, 2009.
  • J. Bhatnagar, B. Lall, and R K. Patney, “On Formulating a Probability of Random Correspondence for Biometrics Using Error Exponent,” accepted Proc. of IEEE (Computer Society) conference NaBIC 2009. Bhatnagar JR, et al.: Performance Issues in Biometric Authentication IETE TECHNICAL REVIEW | VOL 27 | ISSUE 4 | JUL-AUG 2010 285
  • R G. Gallager, “A Simple Derivation of the Coding Theorem and Some Applications,” IEEE Trans on Info. Theory, vol. 11, No. 1, 1965, pp. 3–18.
  • S C. Dass, Y. Zhu, and A. K. Jain, “Validating a Biometric Authentication: Sample size requirements,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, pp. 1902–1919, 2006.
  • J. Bhatnagar, and A. Kumar, “On Some Performance Measures for Biometric Identification,” Proc. of IEEE ICB, 2007, pp. 1035–1048.
  • J. Bhatnagar, A. Kumar, and N. Saggar, “A Novel Approach to Improve Biometric Recognition Using Rank Level Fusion,” Proc. of IEEE CVPR, 2007, pp. 43–51.
  • N A. Schmid, and J A. O’Sullivan, “Performance Prediction Methodology for Biometric System Using Large Deviations Approach,” IEEE Trans Signal Processing: Supplement on Secure Media, vol. 52, no. 10, pp. 3036–3045, 2004.
  • S. Pankanti, S. Prabhakar, and A. K Jain, “On the Individualityof Fingerprints,” IEEE Trans Pattern Analysis and Machine Intelligence, vol. 24, no. 8, pp. 1010–1025, 2002.
  • Y. Zhu, S.C. Dass, and A.K Jain, “Statistical Models for Assessing Individuality of Fingerprints,” IEEE Trans. on Information Forensics and Security, vol. 2, no. 3, pp. 391–401, 2007.
  • A. Adler, R. Youmaran, and S. Loyka, “http://www.sce.carleton.ca/ faculty/adler//publications”.
  • T.Weismann, “Universally Attainable Error Exponents for Rate Distortion Coding of Noisy Sources,” IEEE Trans on Info. Theory, vol. 50, No. 6, 2004, pp. 1229–1246.
  • J. Bhatnagar, and A. Kumar, “Estimating Minimum Sample Size Requirements for Reliable Identification,” Proc. of IEEE CVPR, 2006, pp. 18- 25.
  • S. Cole, “Is Fingerprint Identification Valid Rhetorics of Reliability in Fingerprint Proponents Discourse” Law & Policy, vol. 28(1), pp. 109–135, 2006.
  • W. Feller, “An Introduction to Probability Theory and Its Applications”, Vol. 2, New York: Wiley, 1966

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.