Samir Nanavati/Michael Thieme/Raj Nanavati, 2002,
%A Samir Nanavati
%A Michael Thieme
%A Raj Nanavati
%C 5353 Dundas Street West, 4th Floor, Etobicoke, ON M9B 6H8
%I John Wiley & Sons, Inc.
%O U$34.99/C$54.50 416-236-4433 fax: 416-236-4448
%P 300 p.
one deals with the fundamentals of biometrics. Chapter
presents a brief rationale for the use of the technology.
concepts are given in chapter two, but only the most
chapter three's look at accuracy there are standard metrics
as well as
a few unusual ones (and some non-standard jargon).
two reviews the various biometric technologies. Chapters
through nine cover fingerprint scanning, face recognition
fails to cover the selection of skin areas, or the characteristics
eigenfaces), iris scanning, voiceprint, other physical
geometry, retina scanning, and an odd inclusion of the
fingerprint identification system), and behavioral characteristics
(signature and keystroke).
three outlines biometric applications and markets.
tries to categorize biometric uses and ends up being
confusing. "Citizen-Facing Applications," in
chapter eleven, turns
out to involve law enforcement and government surveillance.
in chapters twelve and thirteen, "Employee-Facing
to employee monitoring and "Customer-Facing Applications" drifts
around some issues related to identity verification for
Chapter fourteen presents law enforcement, government,
industry, healthcare, and travel as being vertical markets
four touches on privacy and standards, with privacy
chapter fifteen, designing biometrics for privacy in
sixteen, and some
proposed standards in seventeen.
text provides broad but superficial coverage of the
non-standard terminology (verification instead of authentication,
false match rate rather than false acceptance rate) may
but the totally meaningless phrases (citizen-, employee-,
customer-facing applications) are probably even more
so. While other
book-length treatments of the subject are rare, it is
difficult to see
that this work adds much value to the discussion, especially
with superior articles (such as "Biometric Identification" by
R. Richards, printed in the "Information Security
Management Handbook" [cf. BKINSCMH.RVW]) which do.
copyright Robert M. Slade, 2003 BKBIOMTR.RVW 20031018