Preface

**Section 3 Security and Template Protection 171**

**Challenges 173**

**Analyses (MSA) 221**

**Sensor Network 251**

**Recognition 275**

and Tai-hoon Kim

Fen Miao, Shu-Di Bao and Ye Li

and Claude Roux

**Section 4 Others 219**

**VI** Contents

Chapter 8 **Multi-Biometric Template Protection: Issues and**

Christian Rathgeb and Christoph Busch

Chapter 9 **Generation of Cryptographic Keys from Personal Biometrics: An Illustration Based on Fingerprints 191** Bon K. Sy and Arun P. Kumara Krishnan

Chapter 10 **An AFIS Candidate List Centric Fingerprint Likelihood Ratio Model Based on Morphometric and Spatial**

Chapter 11 **Physiological Signal Based Biometrics for Securing Body**

Chapter 12 **Influence of Skin Diseases on Fingerprint Quality and**

Vladimir B. Balakirsky and A. J. Han Vinck

Chapter 13 **Algorithms for Processing Biometric Data Oriented to Privacy**

Joshua Abraham, Paul Kwan, Christophe Champod, Chris Lennard

Michal Dolezel, Martin Drahansky, Jaroslav Urbanek, Eva Brezinova

**Protection and Preservation of Significant Parameters 305**

In recent years, biometrics has developed rapidly with its worldwide applications for daily life. New trends and novel developments have been proposed to acquire and process many different biometric traits. The ignored challenges in the past and potential problems need to be thought together and deeply integrated.

The key objective of the book is to keep up with the new technologies on some recent theoretical development as well as new trends of applications in biometrics. The topics covered in this book reflect well both aspects of development. They include the new development in forensic speaker recognition, 3D and thermo face recognition, finger vein recognition, contact-less biometric system, hand geometry recognition, biometric performance evaluation, multi-biometric template protection, and novel subfields in the new challenge fields.

The book consists of 13 chapters. It is divided into four sections, namely, theory and method, performance evaluation, security and template protection, and other applications. Chapter 1 explores the latest techniques which are being deployed in the various branches of speaker recognition, and highlights the technical challenges that need to be overcome. Chapter 2 presents a novel biometric system based on 3D and thermo face recognition, including specify data acquisition, image processing and recognition algorithms. In Chapter 3, the author proposes a scattering removal method for finger-vein image restoration, which is based on a biological optical model which reasonably described the effects of skin scattering. Chapter 4 gives an overarching survey of existing principles of contact-based hand geometry systems and mentions trends in the contact-less systems. Chapter 5 introduces a new subfield, namely, Genetic and Evolutionary Biometrics (GECs), which shows how GECs can be hybridized with a well-known feature extraction technique needed for recognition, recognition accuracy, and computational complexity.

Section 2 is a collection of two chapters on performance evaluation. Chapter 6 analyzes the efficiently and reliably whether the state-of-the-art speaker recognition techniques can be employed in this context, as well as the limitations and their strengths to be improved to migrate from old-school manual or semi-automatic techniques to new, reliable and objective automatic methods. Chapter 7 presents the performance evaluation of biometric systems related to three aspects: data quality, usability, and security. Security as respect to the privacy of an individual is focused on emerging trends in this research fields.

Section 3 groups two methods for security and template protection. Chapter 8 gives an overarching analysis of existing problems that affect forensic speaker recognition. Chapter 9 provides a solution for the template security protection by multi-biometric fusion.

Finally, Section 4 groups a number of novel other biometric approaches or applications. In chapter 10, the author proposes a Likelihood Ratio model using morphometric and spatial analysis based on Support Vector Machine for matching both genuine and close imposter populations typically recovered from AFIS candidate lists. Chapter 11 describes the procedures of biometric solutions for securing body sensor network, including the entity identifiers generation scheme and relevant key distribution solution. Chapter 12 introduces a new, interesting and important research and development works in the skin diseased fingerprint recognition, especially the process of quality estimation of various diseased fingerprint images and the process of fingerprint enhancement. Chapter 13 proposes the algorithms for processing biometric data oriented to privacy protection and preservation of significant parameters.

The book was reviewed by editors Dr. Jucheng Yang and Dr. Shanjuan Xie. We deeply appreciate the efforts of our guest editors: Dr. Norman Poh, Dr. Loris Nanni, Dr. Dongsun Park and Dr. Sook Yoon, Dr. Qing Li, Ms. Congcong Xiong as well as a number of anonymous reviewers.

> **Dr. Jucheng Yang** Professor Special Professor of Haihe Scholar College of Computer Science and Information Engineering Tianjin University of Science and Technology Tianjin, China

**Section 1**

**Theory and Method**

**Dr. Shanjuan Xie** Post-doc Division of Electronics & Information engineering Chonbuk National University Jeonju, Jeonbuk Republic of Korea

**Section 1**

**Theory and Method**

Section 3 groups two methods for security and template protection. Chapter 8 gives an overarching analysis of existing problems that affect forensic speaker recognition. Chapter 9

Finally, Section 4 groups a number of novel other biometric approaches or applications. In chapter 10, the author proposes a Likelihood Ratio model using morphometric and spatial analysis based on Support Vector Machine for matching both genuine and close imposter populations typically recovered from AFIS candidate lists. Chapter 11 describes the procedures of biometric solutions for securing body sensor network, including the entity identifiers generation scheme and relevant key distribution solution. Chapter 12 introduces a new, interesting and important research and development works in the skin diseased fingerprint recognition, especially the process of quality estimation of various diseased fingerprint images and the process of fingerprint enhancement. Chapter 13 proposes the algorithms for processing biometric data oriented to privacy protection and preservation of

The book was reviewed by editors Dr. Jucheng Yang and Dr. Shanjuan Xie. We deeply appreciate the efforts of our guest editors: Dr. Norman Poh, Dr. Loris Nanni, Dr. Dongsun Park and Dr. Sook Yoon, Dr. Qing Li, Ms. Congcong Xiong as well as a number of

**Dr. Jucheng Yang**

Special Professor of Haihe Scholar

Chonbuk National University

Tianjin University of Science and Technology

Division of Electronics & Information engineering

College of Computer Science and Information Engineering

Professor

Tianjin, China

Post-doc

**Dr. Shanjuan Xie**

Jeonju, Jeonbuk Republic of Korea

provides a solution for the template security protection by multi-biometric fusion.

significant parameters.

VIII Preface

anonymous reviewers.

**Chapter 1**

**Provisional chapter**

**Speaker Recognition: Advancements and Challenges**

**Speaker Recognition: Advancements and Challenges**

Speaker Recognition is a multi-disciplinary branch of biometrics that may be used for *identification*, *verification*, and *classification* of individual speakers, with the capability of *tracking*, *detection*, and *segmentation* by extension. Recently, a comprehensive book on all aspects of speaker recognition was published [1]. Therefore, here we are not concerned with details of the standard modeling which is and has been used for the recognition task. In contrast, we present a review of the most recent literature and briefly visit the latest techniques which are being deployed in the various branches of this technology. Most of the works being reviewed here have been published in the last two years. Some of the topics, such as alternative features and modeling techniques, are general and apply to all branches of speaker recognition. Some of these general techniques, such as whispered speech, are related to the advanced treatment of special forms of audio which have not received ample attention in the past. Finally, we will follow by a look at advancements which apply to specific branches of speaker recognition [1], such as

This chapter is meant to complement the summary of speaker recognition, presented in [2], which provided an overview of the subject. It is also intended as an update on the methods described in [1]. In the next section, for the sake of completeness, a brief history of speaker recognition is presented, followed by sections on specific progress as stated above, for globally applicable treatment and methods,

The topic of speaker recognition [1] has been under development since the mid-twentieth century. The earliest known papers on the subject, published in the 1950s [3, 4], were in search of finding personal traits of the speakers, by analyzing their speech, with some statistical underpinning. With the advent of early communication networks, *Pollack, et al.* [3] noted the need for speaker identification. Although, they employed human listeners to do the identification of individuals and studied the importance of the duration of speech and other facets that help in the recognition of a speaker. In most of the early

> ©2012 Beigi, licensee InTech. This is an open access chapter distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. © 2012 Beigi; licensee InTech. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use,

© 2012 Beigi; licensee InTech. This is a paper distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

distribution, and reproduction in any medium, provided the original work is properly cited.

as well as techniques which are related to specific branches of speaker recognition.

Homayoon Beigi

1. Introduction

2. A brief history

Homayoon Beigi

http://dx.doi.org/10.5772/52023

Additional information is available at the end of the chapter

verification, identification, classification, and diarization.

Additional information is available at the end of the chapter

**Provisional chapter**
