Cuprins
Part I: Authentication and Biometrics Overview
1: How Authentication Technologies Work
2: How Biometrics WorkPart II: Types of Biometrics
3: Fingerprint and Hand Geometry
4: Facial and Voice Recognition5: Eye Biometrics: Iris and Retina Scanning
6: Signature Recognition and Keystroke Dynamics7: Esoteric Biometrics
Part III: Issues Involving Biometrics
8: Biometric Liveness Testing
9: Biometrics in Large-Scale Systems10: Biometric Standards
11: Biometric Testing and EvaluationPart IV: Privacy, Policy, and Legal Concerns Raised by Biometrics
12: Biometrics and Privacy
13: Legal Considerations of Government Use of Biometrics14: Case Study: Super Bowl Surveillance
15: The Law and Private-Sector Use of BiometricsPart V: Review of Selected Biometrics Programs
16: Government and Military Programs
17: Searching the FBI’s Civil Files: Public Safety v. Civil Liberty18: Private-Sector Programs
19: Biometrics and the Feasibility of a National ID CardPart VI: Appendixes
A: Resources
B: Publicly Held Companies Offering Biometric Services