7
BIOMETRIC IDENTIFICATION OF PERSONS Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek Tomas Bata University in Zlín Faculty of Applied Informatics Nad Stráněmi 4511, 760 05, Zlín, Czech Republic E-mail: [email protected] KEYWORDS Biometric systems, reliability, attack, fake fingerprint, dactyloscopy. ABSTRACT Algorithms - used for the identification and verification of individuals through fingerprint recognition technology have long been extensively used in Forensic Science and in the private sector. This work is concerned with the verification of the reliability of biometric systems that use fingerprints for their activities. Further, the eFinger programme is used to study similarities between men, women´s and family members´ fingerprints. INTRODUCTION Biometrics has been used since ancient times to recognise/distinguish people. People mutually recognised each other by voice, face or the way they walked. Some characteristics do not change during human life; while others, on the contrary continue to be shaped with increasing age [1]. Differentiating people by their fingerprints is one of the oldest Biometric recognition methods. From the earliest times, this method was used by a lot of civilisations that had some form of knowledge of papillary lines, which are included on human skin. The first provable evidence of the use of modern Biometrics however, dates back to somewhere around the mid-19th Century. This was when fingerprints began to be used in Criminology. William James Herschel was one of the first people to take advantage of Biometrics then. He used railway employees´ fingerprints to confirm their identity. Using fingerprints was the only possible way to prove the identity of individual workers, because the majority of them could neither read nor write - and therefore, one could not expect a signature from them. This fingerprint confirmed their identity when being paid their salary. In 1865, Francis Galton came out with a “Study of the Inheritance of Physical Characteristics.” The study dealt with the issue that newly-born babies take over and inherit some characteristics/properties from their parents. These characteristics can include both physical characteristics, as well as some properties - such as, behaviour or conduct. In 1869, Galton became co- founder of the science called Eugenics, which is the Science of Hereditary Diseases and Defects in the Foetus. A year later, Galton became the founder of research into twins. In 1880, he came up with a branch of science called Anthropometry, which deals with the measurement of human body dimensions. In 1892, Galton published his work entitled "Fingerprints", which led to the introduction of fingerprinting into practice in 1900. In the same year, Galton advocated the use of fingerprinting for identification and verification purposes. He demonstrated the permanence - and uniqueness, of papillary lines on the fingers. After this, fingerprinting/Dactyloscopy was introduced into police work [1]. BIOMETRICS In Biometrics, several terms exist that are (also) used in Security Technologies. These include identity, identification, authentication, authorisation, verification, and recognition/recognisance. The term Biometrics, is a combination of two words - the word “bio” = life, and “metric” = measurement. Overall then, Biometrics can be seen as a science that deals with the measurement and examination of “live” human characteristics [1] [2]. The notion of identity is derived from the word “idem” - the same. This term is used when - for instance, comparing an object, situation, concept, and such like. One can divide “Identity” into two types; namely, “electronic identity” and “physical identity”. One can have several “Electronic Identities” at the same time – e.g. an identity registered on a Web-site. Conversely, (with regard to) “Physical Identity”, we each have only one, which is unique. Two people, who should have/share the same physical identity, do not exist. It composed of physiological, anatomical and behavioural traits [2][3]. Identification represents the process of discovering and identifying the validity of individuals. To begin with, the person must register such that it passes-on one´s biometric data into the system, which is stored in a database. In the course of determining the identity of a person, a comparison of the information stored in the database (template) and the currently-scanned information (sample) is carried out. This comparison process for as long as it needs to find compliance with data in the database. The output is either - finding the identity … and authorisation to enter; or to refuse entry because there was no consensus in the data. Proceedings 31st European Conference on Modelling and Simulation ©ECMS Zita Zoltay Paprika, Péter Horák, Kata Váradi, Péter Tamás Zwierczyk, Ágnes Vidovics-Dancs, János Péter Rádics (Editors) ISBN: 978-0-9932440-4-9/ ISBN: 978-0-9932440-5-6 (CD)

BIOMETRIC IDENTIFICATION OF PERSONS · 2017. 4. 9. · BIOMETRIC IDENTIFICATION OF PERSONS Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek Tomas

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BIOMETRIC IDENTIFICATION OF PERSONS · 2017. 4. 9. · BIOMETRIC IDENTIFICATION OF PERSONS Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek Tomas

 

 

 BIOMETRIC IDENTIFICATION OF PERSONS

Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek

Tomas Bata University in Zlín Faculty of Applied Informatics

Nad Stráněmi 4511, 760 05, Zlín, Czech Republic E-mail: [email protected]

KEYWORDS

Biometric systems, reliability, attack, fake fingerprint, dactyloscopy.

ABSTRACT

Algorithms - used for the identification and verification of individuals through fingerprint recognition technology have long been extensively used in Forensic Science and in the private sector. This work is concerned with the verification of the reliability of biometric systems that use fingerprints for their activities. Further, the eFinger programme is used to study similarities between men, women´s and family members´ fingerprints.

INTRODUCTION

Biometrics has been used since ancient times to recognise/distinguish people. People mutually recognised each other by voice, face or the way they walked. Some characteristics do not change during human life; while others, on the contrary continue to be shaped with increasing age [1]. Differentiating people by their fingerprints is one of the oldest Biometric recognition methods. From the earliest times, this method was used by a lot of civilisations that had some form of knowledge of papillary lines, which are included on human skin. The first provable evidence of the use of modern Biometrics however, dates back to somewhere around the mid-19th Century. This was when fingerprints began to be used in Criminology. William James Herschel was one of the first people to take advantage of Biometrics then. He used railway employees´ fingerprints to confirm their identity. Using fingerprints was the only possible way to prove the identity of individual workers, because the majority of them could neither read nor write - and therefore, one could not expect a signature from them. This fingerprint confirmed their identity when being paid their salary. In 1865, Francis Galton came out with a “Study of the Inheritance of Physical Characteristics.” The study dealt with the issue that newly-born babies take over and inherit some characteristics/properties from their parents. These characteristics can include both physical characteristics, as well as some properties - such as, behaviour or conduct. In 1869, Galton became co-

founder of the science called Eugenics, which is the Science of Hereditary Diseases and Defects in the Foetus. A year later, Galton became the founder of research into twins. In 1880, he came up with a branch of science called Anthropometry, which deals with the measurement of human body dimensions. In 1892, Galton published his work entitled "Fingerprints", which led to the introduction of fingerprinting into practice in 1900. In the same year, Galton advocated the use of fingerprinting for identification and verification purposes. He demonstrated the permanence - and uniqueness, of papillary lines on the fingers. After this, fingerprinting/Dactyloscopy was introduced into police work [1]. BIOMETRICS

 In Biometrics, several terms exist that are (also) used in Security Technologies. These include identity, identification, authentication, authorisation, verification, and recognition/recognisance. The term Biometrics, is a combination of two words - the word “bio” = life, and “metric” = measurement. Overall then, Biometrics can be seen as a science that deals with the measurement and examination of “live” human characteristics [1] [2]. The notion of identity is derived from the word “idem” - the same. This term is used when - for instance, comparing an object, situation, concept, and such like. One can divide “Identity” into two types; namely, “electronic identity” and “physical identity”. One can have several “Electronic Identities” at the same time – e.g. an identity registered on a Web-site. Conversely, (with regard to) “Physical Identity”, we each have only one, which is unique. Two people, who should have/share the same physical identity, do not exist. It composed of physiological, anatomical and behavioural traits [2][3]. Identification represents the process of discovering and identifying the validity of individuals. To begin with, the person must register such that it passes-on one´s biometric data into the system, which is stored in a database. In the course of determining the identity of a person, a comparison of the information stored in the database (template) and the currently-scanned information (sample) is carried out. This comparison process for as long as it needs to find compliance with data in the database. The output is either - finding the identity … and authorisation to enter; or to refuse entry because there was no consensus in the data.

Proceedings 31st European Conference on Modelling and Simulation ©ECMS Zita Zoltay Paprika, Péter Horák, Kata Váradi, Péter Tamás Zwierczyk, Ágnes Vidovics-Dancs, János Péter Rádics (Editors) ISBN: 978-0-9932440-4-9/ ISBN: 978-0-9932440-5-6 (CD)

Page 2: BIOMETRIC IDENTIFICATION OF PERSONS · 2017. 4. 9. · BIOMETRIC IDENTIFICATION OF PERSONS Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek Tomas

BIOMETRI

For Biometribe divided iThese incluleg/foot/feet,purposes, onthe table belo

Table 1 Com

Method Fiof

P-S

Scanning Faces

+

Irises -

Retina -

Outer Ear +

Voice and Speech

+

Fingerprints +

Palm-prints

+

Scalloping of Nails

-

Veins on the Back of the Hands

-

IC IDENTIFI

ic identificatiointo several bude the he, and others.ne can make uow.

mparison of Bi

ield Use

Interfacewith Users

B-K

- The face isscanned from a distance upto 2m

+ Looking into the camera from a distance ofcca. 30 cm

+ The eye isfocused onthe centre of a sensorat a distance ofabout 2 cm

+ Users sets their ear close to a sensor

+ Users pronouncewords or phrases inta sensor

+ Fingers arepressed onthe surfaceof a sensor

+ Palms are pressed onthe surfaceof a sensor

+ Fingers areinserted into a special sensor

+ Hands are inserted into a sensor

ICATION M

on needs, the basic componead, the ar. For personuse of the me

ometric Meth

es Characteri

A-F

s

p

+

f m

+

n

r

f m

+

+

e

to

-

e n e r

+

n e r

+

e +

+

METHODS

human body nents – or fierm/hand(s),

nal identificatethods set ou

ods [1][4][5]

stics Accuracy

B

- ● ●

- ● ●●

- ● ●●

- ● ●

+ ●

- ● ●●

- ● ●●

- ● ●●

- ● ●

can elds.

the tion

ut in

cy

Veinthe Pof a

Veinthe Fing

SignDyn

ComKeystro

Dyn

P –B –A –B –P –

ThsomdepproDNthethrcondepexp

FigSta

BI

ThSyscathebio

ns in Palm

a Hand

- +

ns in

gers

- +

nature namics

+ +

mputer y-ke

namics

- +

– For Polic– K For Safe– F For Ana– For Beha– S For Polic

he human bodme propertiependent on stoperties over NA – in whiche characteristiroughout life nstancies of picted in Figupressed in per

gure 1: The Dability - expre

OMETRIC S

he basic comstem (BIS), anning of bioe decision-mometric featur

A palm is placed into a sensor

Fingers are inserted into a sensor

The signature is made with a special pen on a special surface

Users write a sample text on a special keyboard

cing - Forensic Ity - Commercialtomical - Judiciaavioral Charactece – Court Ident

dy undergoess/characteristiability in timetime - inclu

h almost no cics of the hu- especially

these biomure 1; the degrcentages [4],

Degree of Hussed in percen

SYSTEMS

mponent of ais a sensing metric characaking modules defined in t

+ -

+ -

- +

- +

Identification al Identification al Characteristiceristics tification

s many changics are moree. The two mude the (humchange occursuman voice during puber

metric characgree of tempor[7].

uman Biometntages

a Biometric module that

cteristics. Thele, which cthe database.

● ●

● ●

● ●

cs

ges, wherebye – or less,

most consistentman) iris, ands. Conversely,change a lotrty. The timecteristics areral stability is

tric Temporal

Identificationt ensures thee core part iscompares theThe output of

y , t d , t e e s

l

n e s e f

Page 3: BIOMETRIC IDENTIFICATION OF PERSONS · 2017. 4. 9. · BIOMETRIC IDENTIFICATION OF PERSONS Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek Tomas

the biomecommunicatithe space pro

Figure 2: Stru[5]

BIOMETRI

One of thesystems inclidentify the officially stodifferentiate/parameters aof the system

• FRRerroused

• FARerroused

Figure 3: DeThreshold, (T

The False AcRate (FRR)occurrence oerrors, it follFAR; and vic(Figure 3.), a“Threshold Vpractice; thasomeone errand FRR the as the EER -determine the

etric identifion interface, ovided.

ucture of a Bi

IC SYSTEMS

e important ludes the abil

identity of ored in a sys/identify anyare used to exm; these are: R – False Rejoneous rejectiod for this is: TR – False Aconeous rejectiod for this is: T

ependence of Th) [4]

cceptance Rat), and expreof a given errows that the hce versa. FRRat the “ThreshValue” dependat is to say, roneously acc values are eq- Equal Error e “approximat

fication syor “lock” - al

iometric Ident

S´ RELIABIL

characteristiclity to clearlythe rightful

stem databasey unknown xpress the deg

jection Rate on) – sometim

Type I Error Rceptance Raton) – sometim

Type II Error R

FAR and FR

te (FAR), andess the proor in percentahigher the FRR and FAR arehold Value”. Tds on the use if the bigge

epts or rejectqual, this equa

Rate. The EEte value of a s

ystem is llowing acces

tification Syst

LITY

cs of biomey and faultles

user - whoe - and also,

persons. Tgree of reliabi

– (probabilitymes, the term aRate te (probability

mes, the term aRate [4][6].

RR on Sensitiv

d False Rejectbability of ages. From thR - the lower e both dependThe setting of

of the systemer problem ists it. When Fality is referredER allows onesecurity system

 

the s to

tem,

etric ssly

o is , to

Two ility

y of also

y of also

vity

tion the

hese r the dent f the m in s if

FAR d to e to m.”

FIN

A. Opor diftheeva

FigRe

FigTra Ththetheopp B. Thdiffinnumthein t

Fig C. Thdetthidiflin

NGERPRINT

Optical Finge

ptical fingerprtransmission

fferent reflectie space betweealuated throug

gure 4: An Oeflections [3]

gure 5: An ansmission, [3

he optical sense backlightinge nail), and oposite side.

Capacitive Fi

he principle offferences in canger. The senmber of sensoe capacity diffthe papillary r

gure 6: The Pr

Thermal Fing

hermal fingertector” as a hs technology

fference betwees.

T SENSOR P

erprint Sensor

rint sensors arof light. Theseions of light en these linesgh a CCD or C

ptical Sensor

Optical Sens3]

or - using lighg of a finger fon recording t

ingerprint Sen

f this sensor apacity betwensing area isor micro-elect

fference betweridges in a fing

rinciple of a C

gerprint Reade

rprint scanneheat-sensitive is based on m

een peaks and

PRINCIPLES

rs

re based on te sensors expfrom papillar. The reflecte

CMOS sensor

r based on the

sor based on

ht transmissiofrom the uppthe sensor´s i

nsors

is based on meen the sensors equipped wtrodes in ordeeen the peaks

nger.

Capacitor Sens

ers

ers use a selement. The

measuring thed valleys in fin

S

the reflection,loit the use ofry lines - andd light is then.

e principle of

n a Scanning

n, is based onper side (fromimage on the

measuring the-plate and thewith a largeer to evaluates and recesses

sor [3]

small “pyro-e principle ofe temperaturenger papillary

 

, f d n

f

g

n m e

e e e e s

-f e y

Page 4: BIOMETRIC IDENTIFICATION OF PERSONS · 2017. 4. 9. · BIOMETRIC IDENTIFICATION OF PERSONS Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek Tomas

Figure 7: The D. Ultrasonic This sensor transmitter treflected antransmitter oand captured

Figure 8: An FALSE FIN Two approaproduction: 1. Fake finappropriate mcreate a fapreservation characteristic

Figure 9: PPlastic Moul Granulated pmaterial, whPlastic matefingerprints acreating fake

e Principle of

c Fingerprint R

transmits anto the fingerpnd deformed

or receiver. Thd.

n Ultrasonic R

NGERPRINT

aches can be

ngerprints canmaterials. Sevake fingerpr

of papillacs.

Plastic Fingeds).

plastic can be hich is malleaerials have are pressed ine fingerprint t

f a Thermal Se

Readers

n ultrasonic print. The sigd waves bhese are then

Reader + sampl

-MAKING M

e used for

n be createdveral materialrint - with ary lines

er-prints (Ge

used for the pable after besimilar prop

nto plastic maemplates. The

ensor [4]

signal from gnal captures y rotating evaluated fart

le [5], [8]

METHODS

false fingerp

d directly uss can be usedregard to

including th

elatine, Silico

production of eing warmed perties. Origiaterials - there fake fingerp

 

the the the

ther

print

sing d to the

heir

one,

this up. inal

reby print

templa 2. F In to resrentracancre

FigMo Bofincanexatoupropro TEREFIN ThimFinfinpla

Figfak

mplate is filledastic.

False Impress

order to prodbe highlighte

sulting imagendered in blansfer of the mn be used for eate rubber sta

gure 10: A Fobile Phone.

oth procedurengerprints - bunnot be usedample, gelatinuch sensors, boperties of maoperties, etc.

ESTING ELIABILITYNGERPRINT

he false fingmunity of ngerprint Senngerprints. Theastic material r

gure 11: FRke fingerprint

10

20

30

40

50

60

d with materia

sions Created b

duce a fingerpd - and pictur

e is invertedck and white

material is desto “screen pr

amps, etc.

ake Fingerpri

es can creatut do not hav

with Vibranne or siliconebecause someaterials that re

FINGERY WITH TTS

gerprints werfingerprint

nsor was use “fake fingerrubber stamp.

R of Capacitmade from a r

500

als like gelatin

by Secured L

print, a “latentures taken – i.d and trimme shades. Enhsigned to crearint” a plastic

int; Latent Fin

te relatively ve a long shency Control se cannot be ae methods do emain close to

RPRINT THE USE

re measured sensors. A

sed for testinrprints” were .

tive Fingerprirubber stamp

ne, silicone or

atent Traces

t print” needse. a scan; the

med and thenhanced imagete a form that material - or

ngerprint on a

high-qualityelf-life - theyscanners. Forapplied to allnot meet the

o human skin

SENSOROF FAKE

against theA Capacitive

ng the falsemade from a

int Sensor: A

1000

 

r

s e n e t r

a

y y r l e n

R E

e e e a

A

Page 5: BIOMETRIC IDENTIFICATION OF PERSONS · 2017. 4. 9. · BIOMETRIC IDENTIFICATION OF PERSONS Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek Tomas

Figure 12: Ffake fingerpr COMPARINFINGERPR The eFinger fingerprints. extracted frodatabase; the

Figure 13: Eand Points

Figure 14: Dextraction Euclidean Mmatch in idEuclidean Dgiven by:

ρ

FRR%[ ]

10

20

30

40

50

60

FRR of a Caparint is made fr

NG THERINTS

programme wThe papillary

om a set oe results are sh

Extracted Fing

Demonstration

Metrics were udentity of fi

Distance betwe

( ) (,A B aρ =

5

acitive Fingerprom plastic

E MATC

was used for thy ridge lines f fingerprints

hown in Figur

gerprint Papill

ns of the cour

used for the coingerprints –een Two Poi

) (21 1 2a b a− − −

500

print Sensor: T

CHING

he comparisonand points w

s stored in e 13.

lary Ridge Li

rse of fingerp

omparison of in which,

ints, A and B

)22b−

1000 numbeaccess

 

The

OF

n of were

the

ines

print

f the the

B is

(1)

Fig FoeFInummathethiunmacomnum 7 wandS1 TaWo

TaMe

Frofinfintheexccomof

er ofs

gure 15: Mutu

r the MIN INGER promerically in aximum matchere is 100% cs programmesatisfactory. Uatches - expremparison of mber of match

women´s, (Subd 9 males´, (S4 and S16), fi

ble 2. Compaomen

ble 3. Compaen

om the tablesngerprints, wongerprints; unle rate of matchceed the valumparison of smarkers T.

ual Compariso

DISTANCEogramme, cintervals rangh is expresseconcordance oe, values beUpon reachingessed by a numthe fingerprinhing markers.

bjects: S1, S3Subjects: S2, S

ngerprints we

arisons and M

arisons and M

above, it shomen show a hlike the men´shes between in

ue of 300; thasubjects matc

ons of Two Fin

E methods uconsensus isging from 0 ed by 1000; tof the two finelow 250 arg the minimumber greater ints reaches t

3, S4, S5, S6, S7, S9, S10, Sere matched an

Matches in Fi

Matches in Fi

ows that, whehigher degrees fingerprints.ndividual subj

at is to say, thched the mini

ngerprints

used in thes expressedto 1000. Thehat is to say,ngerprints. In

re consideredum number ofthan 250, thethe minimum

S8 and S15);S11, S12, S13,nd compared.

ingerprints in

ingerprints in

en comparinge of matching. Despite this,jects does nothe fingerprintmum number

 

e d e , n d f e

m

; ,

n

n

g g , t t r

Page 6: BIOMETRIC IDENTIFICATION OF PERSONS · 2017. 4. 9. · BIOMETRIC IDENTIFICATION OF PERSONS Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek Tomas

Table 4. Cbetween Fam

Furthermore,compliance members. SuSubjects S4,family membyellow colouS5, S6, S12brother, sistetable above, elements of strong matchcase, the matsufficient nucannot be ma CONCLUSI

Biometric swhich is givethis paper wimpair the reexample (pfingerprints –Some typesrecognise impairing tFurthermore,consensus (mfingerprints members. Ththis issue. Itwhen compaset of fingermatches betFingerprints minutia. Thu

ACKNOWL

This work wYouth and SNational Sus(MSMT-777DevelopmenCZ.1.05/2.1.

Comparisons mily Members

, an assessmebetween th

ubjects S2 an, S7 and S15bers - a brothured group in T and S13. Ther, mother - when compfamily mem

h between fatch compliancumber of finatched, or mad

ION

systems are en by the valu

was to suggeseliability of B

presented), is– e.g., by usis of fingerpfingerprint the reliabilit, the study a

matching) – orfor women a

he eFINGER pt is based onaring individurprint compartween familymatches only

us, they can be

LEDGMENT

was supported Sports of thestainability Pr8/2014) and a

nt Fund under 00/03.0089

and Matches

ent was made he fingerpri

nd S10 are sib5 represent aer, sister and Table 4 is madhis quartet isand their co

aring the carmbers, there iamily membece rate is less

ngerprint comde.

closely-linkedues: FAR and st ways that Biometric Sys the produng plastic and

print sensors copies, thu

ty of Biomalso resolves r respectively,and men, andprogramme wn Euclidean Dual points. Evrisons shows y members y on a minim

e distinguished

TS

by the Ministe Czech Repogramme projalso by the Eu

the project C

s in Fingerpr

for matches ints of famblings - brothanother groupcousin. The lde up of Subjes composed oousin). From rdinal fingerpis seemingly

ers. Even in than 250, so

mparison mark

d to reliabilFRR. The aimcan significanstems. One suction of fad rubber mod

are unable us significanmetric Syste

the question, the similarity between fam

was used to tacDistance Metven a very sm

that fingerprare very l

mum numberd from one oth

try of Educatiublic within ject No. LO13

uropean RegioCEBIA-Tech N

 

rints

and mily hers. p of last, ects of a

the print

no this – a

kers

lity, m of ntly

such false dels.

to ntly

ems. n of y of mily ckle trics mall rint-low. r of her.

ion, the

303 onal No.

RE

[1]

[2]

[3]

[4]

[5]

[6]

[7]

[8]

AU

199of 200theof Zlíareadd

degUnwowaequbetsenresautadd

EFERENCES

RAK, R. Biomcommercial ap247-2365-5. COUFAL, T<http://hw.cz/t

BITTO, O. Etouches.: Comp

LI, Haizhou, Lbiometrics. NeISBN 978-981

JORGENSEN, ZBiometric for Symposium oSecurity. 2011

AHMED, AwadTechnology baDependable an

NAZAR, Akif, IBiometrics for Recognition an

Fujitsu <http://www.fu

UTHOR BIO

MfroCzdeBa

97 to 2008 heTechnology,

08 he has beee Department Applied Inforín, Czech Reeas: power lindress is: adam

Petrthe BTechinduelecR&D

gree in Tecniversity in Zorking in the uas engaged uipment instaltween 1997 anior lecturer asearch work thenticity anadress is: neum

S

metrics and idenpplications, BEN

T. What is teorie-praxe/art20Encryption and puter Media, 200

Liyuan LI a Karew Jersey: Worl-4287-84-5.

Z a T. YU. On MAuthentication.

n Information, ; 476-482

d E. Ahmed a Isased on Mouse Dnd Secure Compussa TRAORÉ a AMouse Dynamic

nd Artificial IntelPalmsecure.

ujitsu.com/cz/solu

GRAPHIES 

MILAN ADÁMom the Olomzech Republicgree in Techn

ata Universitye worked as se

Brno Univeren working asof Electronic rmatics of thepublic. Curre

nes, camera [email protected]

r NEUMANNBrno Technichnology in 1ustrial experietronics and D engineer. chnical Cybelin in 2001. Huniversity resin the SM

llation and serand 2009. He at Tomas Batis aimed at

alysis and [email protected].

ntity of people: N, Prague, 2008

FingerChip 020-co-je-fingercbiometrics: or

05. ISBN 80-8668r-Ann TOH. Advrld Scientific, c2

Mouse Dynamics Proceedings ofComputer and

ssa TRAORÉ. A Dynamics. IEEE uting. 2007; 4: 16AHMED Awad Ecs. International Jlligence. 2008; 22

Fujitsu [onutions/high-tech/

MEK graduamouc Palackyc. He receivnical Cyberney in Zlin in enior lecturer rsity of Technas an associate

and Measuree Tomas Bata ent work covystem, sensorz.

N has been grcal University 974. He has

ence in the fiequality manHe receive

ernetics at He has been search area sinMT technolorvicing more is currently

ata Universitythe electronilure diagnosi.cz 

the forensic and8. ISBN 978-80-

[online]. 2007.hip.html>. arcane bits and86-48-5. vanced topics in2012, xv, 500 s.

as a Behavioralf the 6th ACMCommunications

New BiometricsTransactions on

5-179. E. Ahmed InverseJournal of Pattern2: 461-495. nline]. 2014./palmsecure/>.

ated in 1990y University,ed his Ph.D.

etics at Tomas2002. From

at the Facultynology. Frome professor atment, FacultyUniversity iners followingrs. His e-mail

raduated fromin Electronicacquired the

eld of medicalnagement asd his Ph.D.Tomas Batalecturing andnce 1994. He

ogy training,than 10 yearsworking as a

y in Zlin. Hisic components. His e-mail

 

d -

.

d

n .

l M

s

s n

e n

.

0 , . s

m y

m t y n g l

m c e l s . a d e , s a s t l

Page 7: BIOMETRIC IDENTIFICATION OF PERSONS · 2017. 4. 9. · BIOMETRIC IDENTIFICATION OF PERSONS Milan Adámek, Petr Neumann, Dora Lapková, Martin Pospíšilík and Miroslav Matýsek Tomas

 

Her e-mail ad

at Tomas Bassistant andand CommuInformatics oRepublic. Htopics: eleeffectivenessconstruction electrical dcommunicaticooperation Gestão, Bejpospisilik@f

DORA LAfrom the Tin 2012. oriented inself-defencphysical s

ddress is: dlap

MARTIN 2008 from Prague, MicroelectrPh.D. degr

Bata Universid researcher atunication Sysof the Tomas B

His current reectromagnetics of materia

of electricdevices conion. The secuwith Escola

eja, Portugalfai.utb.cz.

APKOVÁ haTomas Bata U

Her scientinto professioce, physicalsecurity [email protected]

POSPÍŠILÍKCzech Techni

Czech ronics. Havinee in Engineeity in 2013, t the Departmstems of FacBata Universiesearch coverc compatibials for avioncal circuits nsidering theurity issues ara Superior dl. His e-ma

s been graduaUniversity in Zific research

onal defence l securitynical equipmb.cz

K graduated ical UniversityRepublic, ng received ering Informa

he became ment of Compuculty of Applity in Zlín, Czrs the followility, shieldnics, design and testing e security

re investigatedde Tecnologiaail address

 

ated Zlin

h is and and

ment.

in y in

in his

atics an

uter lied

zech wing ding

of of of

d in a e

is: