CPSC 4600: Biometrics and Cryptography

Course Description

This course covers the basic concepts of pattern recognition and biometrics, current major biometric technologies, and analyzes specific case studies from technical, privacy, and social impact viewpoints along with a critical study of the cryptographic protocols used in many security applications. Prerequisites: CPSC 160, 312, 375 and Mathematics 303 with grades of C or better.


   Required:  Cryptography and Network Security, Behrouz A. Forouzan, McGraw Hill, ISBN: 9-780073-327532.


Biometrics for Network Security, Edition: 1, Paul Reid, Prentice Hall, ISBN: 0-13-101549.  More on Chapters Information.

Implementing Biometric Security, Edition: 1, John Chirillo and Scott Blaul, Wiley, ISBN: 0-7645-2502-6.  More on Chapters Information.

David Hook. Beginning Cryptography with Java, Wiley, 2005, ISBN: 0-7645-9633-0

Bill Ball. Linux in 24 hours, Sams.  Free version of this book is available online.

Paul Reid. Biometrics for Network Security. Prentice Hall, 2004, ISBN: 0-13-101549-4

John Chirillo, Scott Blaul. Implementing Biometric Security, Wiley, ISBN 0-7645-2502-6

Bruce Schneier, Applied Cryptography, Wiley, second edition, ISBN: 0-471-11709-9

Lecture Notes

Lecture 1: Introduction to Biometrics;
Lecture 2. Fingerprint BiometricsNBIS.pptNBIS-non-export-control; Perforce instruction (PCASYS, MINDTCT, NFIQ, BOZORTH3)
Lecture 3. Face Biometrics; Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA)
Lecture 4. Graphology;  Handwriting samples;  Guidelines to Handwriting Analysis;  NIST-Form-based Handprint Recognition System;
Lecture 5. Voice; Voice Biometrics (paper)
Lecture 6. IRIS-Retina; Deoxyribonucleic acid (DNA);
Lecture 7.The Future of Biometrics; Challenges; Evaluation
Lecture 8. Classical Cryptography
Lecture 9. Conventional Cryptography
Lecture 10. Key Distribution Center
Lecture 11. Public Key Cryptography
Lecture 12. Public Key Management
Lecture 13. Authentication
Lecture 14. Hash

Lecture 15. Entity Authentication

Lecture 16. Quantum Cryptography

Evaluation of Presentation: 

Hands-on Projects:


More IA Study Materials

[1] Craig I. Watson,  Michael D. Garris,  Elham Tabassi,  Charles L. Wilson,  R. Michael McCabe,  Stanley Janet and Kenneth Ko,  User's Guide to NIST Biometric Image Software (NBIS), National Institute of Standards and Technology, 2006.

[2] Craig I. Watson, Michael D. Garris,  Elham Tabassi, Charles L. Wilson, R. Michael McCabe and Stanley Janet, User's Guide to NIST Fingerprint Image Software 2 (NFIS2), National Institute of Standards and Technology, 2006.  

[3] Ross Beveridge, David Bolme, Marcio Teixeira and Bruce Draper, The CSU Face Identification Evaluation System User's Guide: Version 5.0, Computer Science Department Colorado State University, 2003,  

[4] The National Biometrics Challenge, National Science and Technology Council, Subcommittee on Biometrics, August 2006,  

[5] Lodge Juliet, Trends in Biometrics, December 2006,  

[6] P. Jonathon Phillips, Alvin Martin, C.l. Wilson, Mark Przybocki, "An Introduction to Evaluating Biometric Systems,"Computer, vol.33, no.2, pp. 56-63, February 2000. 

[7] Michael D. Garris,  James L. Blue,  Gerald T. Candela,  Patrick J. Grother, Stanley A. Janet and Charles L. Wilson, NIST Form-Based Handprint Recognition System (Release 2.0), NISTIR 5959, National Institute of Standards and Technology, April 2003.  

[8] Markowitz, J. A. Voice biometrics. Commun. ACM 43, 9 (Sep. 2000), 66-73. DOI=    

[9] CMU

[10] Li Yang, Kathy Winters, Joseph M. Kizza, Biometrics Education with Hands-on Labs, Proceedings of the 46th annual southeast regional conference, ACM Digital Library, March, 2008.

IA Academic Links

IA Journals

Historical Documents