CPSC 4600: Biometrics and Cryptography

Course Description

This course covers the basic concepts of pattern recognition and biometrics, current major biometric technologies, and analyzes specific case studies from technical, privacy, and social impact viewpoints along with a critical study of the cryptographic protocols used in many security applications. Prerequisites: CPSC 160, 312, 375 and Mathematics 303 with grades of C or better.


   Required:  Cryptography and Network Security, Behrouz A. Forouzan, McGraw Hill, ISBN: 9-780073-327532.


Lecture Notes

Lecture 1: Introduction to Biometrics;
Lecture 2: Fingerprint BiometricsMLP.pptNBIS-non-export-control; Perforce instruction (PCASYS, MINDTCT, NFIQ, BOZORTH3)

Lecture 3: Face Biometrics; Principal Component Analysis (PCA) and Linear Discrimant Allocation (LDA)

Lecture 4. HandwritingGuidelines to Handwriting Analysis;  NIST-Form-based Handprint Recognition System;
Lecture 5. Voice; Voice Biometrics (paper)
Lecture 6. IRIS-Retina; Deoxyribonucleic acid (DNA);
Lecture 7.The Future of Biometrics; Challenges; Evaluation
Lecture 8. Classical Cryptography
Lecture 9. Symmetric Cryptography

Lecture 10: DES and AES

Lecture 11: Cryptography Modes

Lecture 12: Public Key Cryptography

Lecture 13: MAC and Hash

Lecture 14: Digital Signature
Lecture 15. Entity Authentication
Lecture 16. Key Management

Lecture 17. Quantum Cryptography

Evaluation of Presentation: 

Hands-on Projects:

         Project 1: Hands-On Lab of Fingerprint Biometric

         Project 2: Speech Recognition Software

         Project 3: Classical Cryptography and Analysis

         Project 4: Testing Different Modes in Symmetric Ciphers

         Project 5: Short Message RSA Attacks and Padding

More IA Study Materials


[1] Craig I. Watson, Michael D. Garris, Elham Tabassi,  Charles L. Wilson,  R. Michael McCabe,  Stanley Janet and Kenneth Ko,  User's Guide to NIST Biometric Image Software (NBIS), National Institute of Standards and Technology, 2006.

[2] Craig I. Watson, Michael D. Garris,  Elham Tabassi, Charles L. Wilson, R. Michael McCabe and Stanley Janet, User's Guide to NIST Fingerprint Image Software 2 (NFIS2), National Institute of Standards and Technology, 2006.  

[3] Ross Beveridge, David Bolme, Marcio Teixeira and Bruce Draper, The CSU Face Identification Evaluation System User's Guide: Version 5.0, Computer Science Department Colorado State University, 2003,  

[4] The National Biometrics Challenge, National Science and Technology Council, Subcommittee on Biometrics, August 2006,  

[5] Lodge Juliet, Trends in Biometrics, December 2006,  

[6] P. Jonathon Phillips, Alvin Martin, C.l. Wilson, Mark Przybocki, "An Introduction to Evaluating Biometric Systems,"Computer, vol.33, no.2, pp. 56-63, February 2000. 

[7] Michael D. Garris,  James L. Blue,  Gerald T. Candela,  Patrick J. Grother, Stanley A. Janet and Charles L. Wilson, NIST Form-Based Handprint Recognition System (Release 2.0), NISTIR 5959, National Institute of Standards and Technology, April 2003.  

[8] Markowitz, J. A. Voice biometrics. Commun. ACM 43, 9 (Sep. 2000), 66-73. DOI=    

[9] CMU

[10] Li Yang, Kathy Winters, Joseph M. Kizza, Biometrics Education with Hands-on Labs, Proceedings of the 46th annual southeast regional conference, ACM Digital Library, March, 20

IA Academic Links

IA Journals

Historical Documents