Abstract
We would like to outline our opinions about the usability of biometric authentication systems. We outline the position of biometrics in the current field of computer security in the first section of our paper. The second chapter introduces a more systematic view of the process of biometric authentication — a layer model (of the biometric authentication process). The third section discusses the advantages and disadvantages of biometric authentication systems. We also propose a classification of biometric systems that would allow us to compare the biometrics systems reasonably, along similar lines to Common Criteria [1] or FIPS 140–1/2 [4]. We conclude this paper with some suggestions where we would suggest to use biometric systems and where not.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35612-9_23
Chapter PDF
Similar content being viewed by others
References
Common Criteria for Information Technology Security Evaluation, v 2.1, 1999.
Department of Defense (1985). Trusted Computer System Evaluation Criteria.
Jain, A., Bolle, R. and Pankanti S. (1999). BIOMETRICS: Personal Identification in Networked Society. Kluwer Academic Publishers.
National Institute of Standards and Technology (1994 and 2001 ). Security Requirements for Cryptographic Modules, FIPS PUB 140–1 /2.
Newham, E. (1995). The biometric report. SBJ Services.
Maty, V., Iiuha, Z. (2000). Biometric Authentication Systems. Technical report. http://www.ecom-monitor.com/papers/biometricsTR2000.pdf.
Mansfield, T. (2001) Biometric Product Testing - Final Report, National Physical Laboratory, 2001, http://www.npl.co.uk/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Matyáš, V., Říha, Z. (2002). Biometric Authentication — Security and Usability. In: Jerman-Blažič, B., Klobučar, T. (eds) Advanced Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 100. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35612-9_17
Download citation
DOI: https://doi.org/10.1007/978-0-387-35612-9_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4405-7
Online ISBN: 978-0-387-35612-9
eBook Packages: Springer Book Archive