Preface

A biometric system is a technological system that uses information about a person or other biological organism to identify that person. The biometric industry is rapidly changing and progressing. What used to be a futuristic concept has now become a reality. To work correctly and effectively, biometric systems depend and rely on data about specific biological traits. Biometric systems are widely used in various real-life applications. These include personal recognition, identification, verification, and more. Biometric systems may also be needed for safety, security, permission, banking, crime prevention, forensics, medical applications, communication, face finding, and so on.

The increasing trends, needs, and applications of biometric systems require new developments to achieve desired objectives. This involves capturing, storing, finding, retrieving, analyzing, and using biometrics in everyday life under the computing environment. Being a computer-based technology, biometric systems carry out automatic processing, manipulation, and interpretation of personal information. This book explores biometric systems education, research, applications, techniques, tools, and algorithms that originate from areas such as image processing, computer vision, pattern recognition, signal processing, artificial intelligence, intelligent systems, soft computing, computer engineering, electrical engineering, and computer science in general.

Chapters focus on the latest developments, theories, methods, approaches, algorithms, analysis, systems, hardware, and software for advancements in biometrics and related systems. It is a useful resource for professionals, researchers, academicians, engineers, scientists, and policymakers involved in biometrics.

Chapter 1, "Introductory Chapter: On Biometrics with Iris" by Sarfraz and Alfialy, provides an introduction to the topic with a focus on iris biometrics. Although there are various types of biometrics, such as fingerprint, face, speaker/voice, gait, keystroke, odor, and many more, much recent research has focused on the iris. As such, this chapter presents a comprehensive overview of iris recognition in biometric systems. It includes a comparative study as well as discusses future trends.

Chapter 2, "Biometric-Based Human Recognition Systems: An Overview" by Palma and Montessoro, provides an overview of the most used biometric traits along with their properties, the various biometric system operating modalities, and various related security aspects. It discusses the different stages of a biometric recognition process as well as the various threats that can compromise the security of a biometric system.

Chapter 3, "Assessment of How Users Perceivethe Usage of Biometric Technology Applications" by Habibu et al., discusses how biometrics transactions rely on enduser perceptions and responses. If end users are fearful, hesitant, or uneasy about biometric technology applications, misuse and implementation complications can occur. This chapter investigates end user motivation, understanding, consciousness, and acceptance of biometric technology applications via a public survey of 300 people in Uganda.

Chapter 4, "Behavioral Biometrics: Past, Present and Future" by Sharma and Elmiligi, discusses behavioral biometrics. Behavioral biometric authentication identifies users based on a set of unique behaviors that can be observed when users perform daily activities or interact with smart devices. This chapter discusses the different types of behavioral biometrics and explores various classifications of behavioral biometricsbased on their use models. The chapter highlights trending research directions in behavioral biometrics authentication and presents examples of current commercial solutions based on behavioral biometrics.

Chapter 5 "Biometrics of Aquatic Animals" by Farrag, discusses the use of biometrics in aquatic studies.

It presents research on biometrics of different aquatic animals, such as dolphins, sharks, rays, molluscs, crustaceans, protozoa, and so on, from different locations. Biometrics is considered an identifier for any new exotic or invasive species and it is the first step in biodiversity and stock management. This chapter also presents databases with some recent trends including animal biometric recognition systems for different applications and environments.

Chapter 6, "MedMetrics: Biometrics Passports in Medical and Clinical Healthcare That Enable AI and Blockchain" by Lu, introduces an emerging area of biometrics called MedMetrics, which combines medical and biological biometrics of patients based on their electronic health records, International Classification of Disease codes, time-series test results, and biological record to create coded "healthcare passports." This infrastructure can be used to identify patients, allowing healthcare providers and patients to access and add to encrypted patient records.

Chapter 7, "Quantum Biometrics" by Kominis et al. examines the human visual system's ability to perform efficient photon counting, which has been used to devise a new biometric authentication methodology. It presents and summarizes a recent proposal to use quantum light sources, particularly a single-photon source, to enhance the performance of the authentication process.

Chapter 8, "Feature Extraction Using Observer Gaze Distributions for Gender Recognition" by Nishiyama, studies the gaze distribution of observers viewing images of subjects for gender recognition. The authors propose a methodology that hypothesizes that the regions corresponding to the concentration of the observer gaze distributions contain discriminative features for gender recognition. Experimental results show that the observers mainly focused on the head region, not the entire body. Thus, gaze-guided feature extraction significantly improves the accuracy of gender recognition.

Chapter 9 "Image Acquisition for Biometric: Face Recognition" by Dabhade et al., discusses how to acquire face images using MATLAB. It considers image acquisition devices and image processes in the facial recognition process.

 Chapter 10, "Your Vital Signs as Your Password?" by Alrubaish and Saqib, investigates the ability to use vital signs obtained via electrocardiogram (ECG) and electroencephalogram (EGG) as unimodal authentication. It highlights recent techniques, their requirements and limitations, and whether they are ready to be used in the real market. It discusses the applicability of unique study and observes that the vital signs can be considered as personal a PASSWORDpasswords due to their uniqueness and resistance to spoofing and other attacks. its uniqueness, but it needs more improvements to be deployed to the market.

Finally, Chapter 11, "Voice Signal Filtering Methods for Speaker Biometric Identification" by Eugene Fedorov et al., examines various methods of suppressing noise in a voice signal to be used for biometric identification. The chapter discusses several types of filtering methods and presents the results of numerical research of denoising methods for voice signals from the TIMIT database with additive Gaussian noise and multiplicative Gaussian noise.

### **Muhammad Sarfraz**

Department of Information Science, College of Life Sciences, Kuwait University, Sabah AlSalem University City, Shadadiya, Kuwait

### **Chapter 1**
