0%

Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems

Key Features

  • Explore the next iteration of identity protection and overcome real-world challenges
  • Understand different biometric use cases to deploy a large-scale biometric system
  • Curated by renowned security ambassador and experienced author Lisa Bock
    • Book Description

      Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition.

      Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies.

      By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies.

      What you will learn

      • Review the advantages and disadvantages of biometric technology
      • Understand the characteristics of an optimal biometric system
      • Discover the uses of biometrics and where they are used
      • Compare different types of errors and see how to tune your system
      • Understand the benefits of multi-factor authentication
      • Work with commonly used biometrics such as face, fingerprint, and iris
      • Analyze a biometric system for usability and accuracy
      • Address privacy concerns and get a glimpse of the future of biometrics
        • Who this book is for

          Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone involved in selecting, purchasing, integrating, or securing a biometric system. This book will help you understand how to select the right biometric system for your organization and walk you through the steps for implementing identity management and authentication. A basic understanding of biometric authentication techniques, such as fingerprint and facial recognition, and the importance of providing a secure method of authenticating an individual will help you make the most of the book.

Table of Contents

  1. Identity Management with Biometrics
  2. Why subscribe?
  3. Contributors
  4. About the author
  5. About the reviewers
  6. Packt is searching for authors like you
  7. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
    4. Download the color images
    5. Conventions used
    6. Get in touch
    7. Reviews
  8. Section 1 –Understanding Biometric Authentication
  9. Chapter 1: Exploring Biometric Technology
    1. Describing biometric technology
    2. Defining biometrics
    3. Providing identification
    4. Verifying authentication
    5. Appreciating modern biometrics
    6. Traveling back in time
    7. Applying a unique attribute
    8. Comparing biometric categories
    9. Measuring physiological attributes
    10. Observing behavioral biometrics
    11. Summary
    12. Questions
    13. Further reading
  10. Chapter 2: Biometrics and Mobile Devices
    1. Securing fintech and other applications
    2. Ensuring access control
    3. Staying in compliance
    4. Tokenizing credit card information
    5. Designing optimal biometrics for mobile
    6. Simplifying the user experience
    7. Understanding haptics
    8. Incorporating essential biometric technology
    9. Capturing the image
    10. Handling the biometric
    11. Providing security and privacy
    12. Summary
    13. Questions
    14. Further reading
  11. Chapter 3: Recognizing Biometric Characteristics
    1. Assessing the desired qualities of a biometric
    2. Having uniqueness
    3. Being universal
    4. Staying permanent
    5. Performing accurately
    6. Ensuring collectability
    7. Providing an acceptable biometric
    8. Avoiding circumvention
    9. Summarizing the operation of a biometric system
    10. Initiating contact with the user interface
    11. Obtaining the biometric identifier
    12. Matching the pattern
    13. Making a decision
    14. Comparing application environments
    15. Classifying different methods
    16. Accepting various forms of input
    17. Summary
    18. Questions
    19. Further reading
  12. Chapter 4: Comparing Advantages and Modalities
    1. Reviewing system approaches
    2. Networking the biometric system
    3. Operating in standalone mode
    4. Integrating with other systems
    5. Reviewing common modalities
    6. Understanding system errors
    7. Making a correct decision
    8. Testing a biometric system
    9. Using multi-factor authentication
    10. Strengthening a standard login
    11. Adding a biometric identifier
    12. Recognizing the push for standards
    13. Taking a closer look at biometrics
    14. Developing biometric standards
    15. Summary
    16. Questions
    17. Further reading
  13. Section 2 – Applying Biometric Technologies
  14. Chapter 5: Implementing Fingerprint Technology
    1. Exploring the evolution of fingerprint technology
    2. Classifying fingers
    3. Managing US fingerprints
    4. Understanding fingerprint systems
    5. Scanning the fingers
    6. Digitizing the image
    7. Storing the templates
    8. Matching the patterns
    9. Extracting the features
    10. Finding fingerprints everywhere
    11. Comparing benefits with drawbacks
    12. Summary
    13. Questions
    14. Further reading
  15. Chapter 6: Using Facial Recognition
    1. Understanding facial features
    2. Seeing someone’s face
    3. Studying faces over time
    4. Moving through facial recognition
    5. Acquiring the facial image
    6. Capturing images using 2D or 3D
    7. Overcoming challenges
    8. Extracting the features
    9. Localizing the face
    10. Identifying the features
    11. Learning to learn
    12. Using facial recognition today
    13. Enhancing public safety
    14. Improving experiences
    15. Providing access control
    16. Recognizing the pros and cons
    17. Summary
    18. Questions
    19. Further reading
  16. Chapter 7: Learning Iris Recognition
    1. Understanding the unique nature of the iris
    2. Recognizing uniqueness
    3. Providing an optimal biometric
    4. Using the iris as an identifier
    5. Learning the structure of the eye
    6. Viewing the major elements of the eye
    7. Dealing with eye disorders
    8. Capturing and sensing iris images
    9. Obtaining the iris image
    10. Detecting and extracting the iris
    11. Normalizing and encoding
    12. Matching templates and preventing spoofing
    13. Calculating the Hamming distance
    14. Avoiding spoofing
    15. Reviewing iris recognition applications
    16. Ensuring public safety
    17. Streamlining experiences
    18. Comparing benefits and limitations
    19. Summary
    20. Questions
    21. Further reading
  17. Chapter 8: Using Voice Recognition
    1. Understanding voice recognition
    2. Defining voice recognition
    3. Stepping back in time
    4. Digitizing voice
    5. Creating a voiceprint
    6. Enrolling and matching
    7. Registering with a system
    8. Extracting features
    9. Matching the samples
    10. Improving the technology
    11. Employing voice recognition
    12. Preventing fraud
    13. Saving time
    14. Examining the pros and cons of VRT
    15. Summary
    16. Questions
    17. Further reading
  18. Chapter 9: Considering Alternate Biometrics
    1. Using our hands to authenticate
    2. Scanning the palm
    3. Measuring the hand
    4. Using the palm veins
    5. Measuring an individual’s gait
    6. Characterizing a gait
    7. Identifying threats
    8. Comparing DNA and retinal scans
    9. Using our DNA
    10. Scanning the retina
    11. Viewing keystroke and signature biometrics
    12. Using a keyboard
    13. Analyzing a signature
    14. Using tattoos, scars, and ear biometrics
    15. Visualizing tattoos
    16. Observing scars and birthmarks
    17. Assessing the ear
    18. Summary
    19. Questions
    20. Further reading
  19. Section 3 – Deploying a Large-Scale Biometric System
  20. Chapter 10: Selecting the Right Biometric
    1. Ensuring usability
    2. Developing the system
    3. Focusing on the end user
    4. Guaranteeing accuracy
    5. Ensuring precise results
    6. Providing speed and efficiency
    7. Expediting the process
    8. Selecting a cost-effective solution
    9. Considering the total cost
    10. Moving to the cloud
    11. Summary
    12. Questions
    13. Further reading
  21. Chapter 11: Integrating the Biometric System
    1. Sending biometric data over the network
    2. Understanding network topologies
    3. Modeling the data flow
    4. Baselining the network
    5. Securing biometric data
    6. Reducing the risk of exposure
    7. Integrating with the directory
    8. Understanding the directory
    9. Managing the integration
    10. Ensuring business continuity
    11. Responding to incidents
    12. Recovering from disaster
    13. Planning business continuity
    14. Summary
    15. Questions
    16. Further reading
  22. Chapter 12: Testing and System Deployment
    1. Testing the system
    2. Preparing for deployment
    3. Testing and deployment
    4. Providing education and awareness
    5. Choosing a training format
    6. Selecting a trainer
    7. Customizing the training process
    8. Enrolling users
    9. Stepping through the enrollment process
    10. Troubleshooting the process
    11. Fine-tuning the decision process
    12. Upgrading the template
    13. Providing a human touch
    14. Tuning the threshold
    15. Preventing spoofing
    16. Summary
    17. Questions
    18. Further reading
  23. Chapter 13: Discovering Practical Biometric Applications
    1. Understanding biometrics and law enforcement
    2. Enforcing the law
    3. Preventing fraud
    4. Protecting children
    5. Providing standards
    6. Identifying individuals during forensics
    7. Collecting evidence
    8. Finding a match
    9. Searching for prints
    10. Providing recognition for large venues
    11. Monitoring a prison population
    12. Securing countries
    13. Enhancing our experience
    14. Controlling access to assets, buildings, and systems
    15. Using biometrics in industry and government
    16. Recognizing novel uses for biometrics
    17. Obtaining contactless fingerprints
    18. Detecting face masks
    19. Paying your bill with biometrics
    20. Summary
    21. Questions
    22. Further reading
  24. Chapter 14: Addressing Privacy Concerns
    1. Comparing privacy laws in the US and Europe
    2. Collecting biographical and biological data
    3. Creating a privacy policy
    4. Understanding GDPR
    5. Protecting biometric data in the US
    6. Understanding biometrics and the Fifth Amendment
    7. Outlining the Fifth Amendment
    8. Unlocking your device
    9. Recognizing the push for standards
    10. Working to create standards
    11. Identifying biometric organizations
    12. Accepting biometrics and the future of biometrics
    13. Traveling with ease
    14. Identifying without consent
    15. Summary
    16. Questions
    17. Further reading
  25. Assessments
    1. Chapter 1– Exploring Biometric Technology
    2. Chapter 2 – Biometrics and Mobile Devices
    3. Chapter 3 – Recognizing Biometric Characteristics
    4. Chapter 4 – Comparing Advantages and Modalities
    5. Chapter 5 – Implementing Fingerprint Technology
    6. Chapter 6 – Using Facial Recognition
    7. Chapter 7 – Learning Iris Recognition
    8. Chapter 8 – Using Voice Recognition
    9. Chapter 9 – Considering Alternate Biometrics
    10. Chapter 10 – Selecting the Right Biometric
    11. Chapter 11 – Integrating the Biometric System
    12. Chapter 12 – Testing and System Deployment
    13. Chapter 13 – Discovering Practical Biometric Applications
    14. Chapter 14 – Addressing Privacy Concerns
  26. Other Books You May Enjoy
    1. Leave a review - let other readers know what you think
3.143.0.157