Abstract
Reliable authorization and authentication are becoming necessary for many everyday actions (or applications), be it boarding an aircraft, performing a financial transaction, or picking up a child from daycare. Authorization is almost always vested in a single individual or in a small group of individuals. Identity verification becomes a challenging task when it has to be automated with high accuracy and hence with low probability of break-ins and reliable non-repudiation. The user should not be able to deny having carried out the transaction and should be inconvenienced as little as possible, which only makes the task more difficult.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science+Business Media New York
About this chapter
Cite this chapter
Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K., Senior, A.W. (2004). Introduction. In: Guide to Biometrics. Springer Professional Computing. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-4036-3_1
Download citation
DOI: https://doi.org/10.1007/978-1-4757-4036-3_1
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-2305-9
Online ISBN: 978-1-4757-4036-3
eBook Packages: Springer Book Archive