Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
Recognising persons by their iris patterns
SINOBIOMETRICS'04 Proceedings of the 5th Chinese conference on Advances in Biometric Person Authentication
The effectiveness of generative attacks on an online handwriting biometric
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Hi-index | 0.00 |
This paper presents a conceptual framework for testing the implementation of biometric algorithms within Unix and Windows NT/2000 operating systems' login authentication. To support the analysis and evaluation of biometric algorithms, a data logging module will be used, enabling the collection of quantitative data, e.g. timestamps, biometric raw data, (pre)processed data, and return codes from each run of a biometric authentication. It is shown how biometric algorithms and a data logging module can be integrated into Unix and Windows NT/2000. In addition to the explained system components a human observer is necessary to collect extended data like user behavior and environmental conditions, which cannot be automatically recorded by the data logging module. From the combination of these two types of data, conclusions on the biometric algorithm in the context of its implementation in operating systems' authentication can be drawn. The resulting benefits for the development of appropriate biometric algorithms concerning aspects of robustness (security, safety), performance measures and usability will be discussed for iris-biometrics.