Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Identity Management with Biometrics
Identity Management with Biometrics

Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication

By Lisa Bock
$29.99
Book Oct 2020 368 pages 1st Edition
eBook
$29.99
Print
$43.99
Subscription
$15.99 Monthly
eBook
$29.99
Print
$43.99
Subscription
$15.99 Monthly

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now
Table of content icon View table of contents Preview book icon Preview Book

Identity Management with Biometrics

Chapter 1: Exploring Biometric Technology

Companies today are designing devices and computer systems to provide password-free authentication by using biometrics, which are the behavioral or physiological characteristics that are unique to an individual. Devices now include fingerprint technology, facial and voice recognition, and other methods such as haptics to provide authorized access to a device. Today, many organizations are adopting the use of biometrics to enable their employees to enter buildings, access cloud resources, and log in to phones and computers. As a result, IT managers may have to face the prospect of deploying a large-scale biometric system.

But just what is meant by biometrics, and why is the global market share of biometrics expected to double in the next five years? This chapter will answer these and other questions. It will cover the basics of biometric technology and terminology and compare various methods. We’ll see how, in addition to providing...

Describing biometric technology

Today, when you use your mobile device, you may need to use your fingerprint or face to gain access to the device. More and more companies are adopting biometric technology to provide password-free authentication for mobile devices, Internet of Things (IoT) devices, and computer systems. In addition, the use of biometrics in financial technology (fintech) has accelerated as a method for securing financial transactions.

For many of us, using biometrics has become commonplace, as biometric authentication is being used to sign in to websites along with applications on your mobile device. Today, many other biometric techniques are being explored and developed to automatically recognize and authenticate an individual.

Because of the widespread use of biometrics, in this section, we’ll take a look at the definition of biometrics and compare how using biometrics can provide identification and authentication. Let’s begin by exploring what...

Appreciating modern biometrics

When we discuss biometrics, and specifically using automated systems, you might ask, where did the concept originate? In this section, we’ll travel through the evolution of biometrics, from the early use of body measurements to the FBI’s identification division’s use of fingerprints in 1924, to today’s sophisticated systems. Let’s have a look at some of the early uses of biometrics to identify an individual.

Traveling back in time

Historically, the use of biometrics can date back over several centuries, where the use of a fingerprint was used to validate a business transaction. Next, let’s start by learning how the early manual methods paved the way to automation.

Using manual methods

In the late 1880s, there were several individuals, including Henry Faulds and Sir Francis Galton, who outlined the use of quantifiable identification methods such as face and fingerprints to identify individuals. However...

Comparing biometric categories

Biometrics can verify an individual’s identity by using a unique attribute or behavior. Although we may think of biometrics as one general topic, the science of biometrics is divided into two separate categories:

  • Physiological biometrics: Represents attributes that can be measured
  • Behavioral biometrics: Represents the way we do things

Although both categories provide a way to evaluate a unique attribute, each category is significantly different in the way they are assessed, as shown in the following diagram:

Figure 1.5 – Physiological versus behavioral biometrics

Figure 1.5 – Physiological versus behavioral biometrics

In this section, we will compare physiological and behavioral biometrics, so that you can get a better understanding of each type. We’ll also cover some of the common biometrics in each category. First, let’s outline physiological biometrics.

Measuring physiological attributes

Physiological biometrics are based...

Summary

By now, you have a better understanding of the basics of biometric technology. In addition to providing authentication, we learned that we can also use biometrics to identify an individual. You can now appreciate the rich history of biometrics, from early manual methods to today’s advanced systems. In this chapter, we explored how biometrics can provide a straightforward simple authentication process. You then learned how biometric technologies are ideal in many different applications and environments.

You now understand that biometrics can be assessed in one of two ways. We can use physiological biometrics or attributes that can be measured, such as a face and fingerprints. We can also evaluate behavioral biometrics, which are the way we do things such as signature or gait recognition. Because each individual has both behavioral and physiological characteristics, we may find that using both can complement one another and provide a more robust method to secure a...

Questions

Now it’s time to check your knowledge. Select the best response, and then check your answers, found in the Assessment section at the end of the book.

  1. Which of the following would fall under Something you know authentication?

    a. Smart card

    b. Password or PIN

    c. Fingerprint

    d. Token

  2. Which of the following would fall under Something you have authentication?

    a. Smart card

    b. Password or PIN

    c. Fingerprint

    d. Voice

  3. _____ uses a one-to-one comparison.

    a. Smart face

    b. Identification

    c. Deep face

    d. Authentication

  4. _____ represents biometric attributes that can be measured.

    a. Smart face

    b. Behavioral

    c. Physiological

    d. Authentication

  5. Using voice recognition is an example of a _____biometric.

    a. Smart face

    b. Behavioral

    c. Physiological

    d. Authentication

  6. The FBI’s identification division began using fingerprints in _____.

    a. 1924

    b. 1960

    c. 1999

    d. 2010

  7. Keystroke biometrics are a _____ biometric that gathers the way each individual hits the keyboard...

Further reading

Please refer to the following links for more information:

Left arrow icon Right arrow icon

Key benefits

  • Explore the next iteration of identity protection and overcome real-world challenges
  • Understand different biometric use cases to deploy a large-scale biometric system
  • Curated by renowned security ambassador and experienced author Lisa Bock

Description

Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you’ll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You’ll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You’ll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you’ll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies.

What you will learn

Review the advantages and disadvantages of biometric technology Understand the characteristics of an optimal biometric system Discover the uses of biometrics and where they are used Compare different types of errors and see how to tune your system Understand the benefits of multi-factor authentication Work with commonly used biometrics such as face, fingerprint, and iris Analyze a biometric system for usability and accuracy Address privacy concerns and get a glimpse of the future of biometrics

Product Details

Country selected

Publication date : Oct 15, 2020
Length 368 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781838988388
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Oct 15, 2020
Length 368 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781838988388
Category :
Concepts :

Table of Contents

20 Chapters
Preface Chevron down icon Chevron up icon
1. Section 1 –Understanding Biometric Authentication Chevron down icon Chevron up icon
2. Chapter 1: Exploring Biometric Technology Chevron down icon Chevron up icon
3. Chapter 2: Biometrics and Mobile Devices Chevron down icon Chevron up icon
4. Chapter 3: Recognizing Biometric Characteristics Chevron down icon Chevron up icon
5. Chapter 4: Comparing Advantages and Modalities Chevron down icon Chevron up icon
6. Section 2 – Applying Biometric Technologies Chevron down icon Chevron up icon
7. Chapter 5: Implementing Fingerprint Technology Chevron down icon Chevron up icon
8. Chapter 6: Using Facial Recognition Chevron down icon Chevron up icon
9. Chapter 7: Learning Iris Recognition Chevron down icon Chevron up icon
10. Chapter 8: Using Voice Recognition Chevron down icon Chevron up icon
11. Chapter 9: Considering Alternate Biometrics Chevron down icon Chevron up icon
12. Section 3 – Deploying a Large-Scale Biometric System Chevron down icon Chevron up icon
13. Chapter 10: Selecting the Right Biometric Chevron down icon Chevron up icon
14. Chapter 11: Integrating the Biometric System Chevron down icon Chevron up icon
15. Chapter 12: Testing and System Deployment Chevron down icon Chevron up icon
16. Chapter 13: Discovering Practical Biometric Applications Chevron down icon Chevron up icon
17. Chapter 14: Addressing Privacy Concerns Chevron down icon Chevron up icon
18. Assessments Chevron down icon Chevron up icon
19. Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Empty star icon Empty star icon Empty star icon Empty star icon Empty star icon 0
(0 Ratings)
5 star 0%
4 star 0%
3 star 0%
2 star 0%
1 star 0%
Top Reviews
No reviews found
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.