Foreword |
|
xi | |
Preface |
|
xiii | |
|
Biometrics Applications in an E-World |
|
|
1 | (22) |
|
|
|
1 | (4) |
|
|
5 | (2) |
|
|
7 | (5) |
|
|
12 | (11) |
|
Achievements and Challenges in Fingerprint Recognition |
|
|
23 | (36) |
|
|
|
|
23 | (1) |
|
Fingerprint Recognition Issues |
|
|
24 | (3) |
|
|
27 | (5) |
|
Fingerprint Recognition Methods and Algorithms |
|
|
32 | (21) |
|
|
53 | (1) |
|
|
54 | (5) |
|
Biometrics Electronic Purse |
|
|
59 | (24) |
|
|
|
|
|
59 | (3) |
|
|
62 | (4) |
|
|
66 | (2) |
|
Design of Biometrics Electronic Purse |
|
|
68 | (13) |
|
|
81 | (2) |
|
Face Recognition and Its Application |
|
|
83 | (16) |
|
|
|
|
83 | (1) |
|
|
84 | (3) |
|
The Technology of Face Recognition |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
90 | (3) |
|
The IBM Face Recognition System |
|
|
93 | (2) |
|
|
95 | (4) |
|
Personalize Mobile Access by Speaker Authentication |
|
|
99 | (32) |
|
|
|
100 | (3) |
|
Bilateral User Authentication Framework |
|
|
103 | (3) |
|
Enabling Speaker Authentication Technologies |
|
|
106 | (9) |
|
|
115 | (11) |
|
|
126 | (5) |
|
Biometrics on the Internet: Security Application and Services |
|
|
131 | (38) |
|
|
|
|
131 | (1) |
|
Communications Networks and Internet |
|
|
132 | (7) |
|
|
139 | (7) |
|
The Personal Identification Network: Biometrics Services via the Internet |
|
|
146 | (16) |
|
Other Biometric Topics in Internet Applications |
|
|
162 | (1) |
|
Conclusions and Future Trends |
|
|
163 | (6) |
|
Forensic Identification Reporting Using Automatic Biometric Systems |
|
|
169 | (18) |
|
Joaquin Gonzalez-Rodriguez |
|
|
|
|
|
169 | (2) |
|
Biometric Systems and Classical Forensic Reporting |
|
|
171 | (2) |
|
Bayesian Analysis of Forensic Evidence |
|
|
173 | (2) |
|
Assessment of Forensic Biometric Systems |
|
|
175 | (1) |
|
Case Study: Forensic Speaker Recognition |
|
|
175 | (8) |
|
|
183 | (4) |
|
Signature Security System for E-Commerce |
|
|
187 | (30) |
|
|
|
|
188 | (3) |
|
|
191 | (8) |
|
A Typical On-Line Signature Verification System |
|
|
199 | (10) |
|
Proposed On-Line Dynamic Signature Verification Applications |
|
|
209 | (5) |
|
|
214 | (3) |
|
Web Guard: A Biometrics Identification System for Network Security |
|
|
217 | (26) |
|
|
|
|
218 | (3) |
|
Biometrics Data Warehouse |
|
|
221 | (3) |
|
Dynamic Feature Selection |
|
|
224 | (3) |
|
|
227 | (1) |
|
Robust Classification via Fuzzy Neural Network |
|
|
227 | (3) |
|
|
230 | (5) |
|
|
235 | (4) |
|
|
239 | (4) |
|
Smart Card Application Based On Palmprint Identification |
|
|
243 | (20) |
|
|
|
|
243 | (3) |
|
On-line Palmprint Identification System |
|
|
246 | (7) |
|
|
253 | (4) |
|
System Analysis and Applications |
|
|
257 | (3) |
|
|
260 | (3) |
|
Secure Fingerprint Authentication |
|
|
263 | (26) |
|
|
|
|
|
263 | (4) |
|
Biometrics-Based Authentication Systems |
|
|
267 | (3) |
|
|
270 | (3) |
|
Techniques to Improve Security |
|
|
273 | (13) |
|
|
286 | (3) |
|
From Biometrics Technology to Applications Regarding Face, Voice, Signature and Fingerprint Recognition Systems |
|
|
289 | (50) |
|
|
Joaquin Gonzalez-Rodriguez |
|
|
|
|
|
289 | (1) |
|
Automatic Speaker Recognition |
|
|
290 | (6) |
|
Automatic Face Recognition |
|
|
296 | (8) |
|
Minutiae-Based Fingerprint Recognition Systems |
|
|
304 | (8) |
|
On-Line HMM-Based Signature Verification System |
|
|
312 | (10) |
|
Multimodality in Biometric Systems |
|
|
322 | (3) |
|
From Technology to Applications |
|
|
325 | (14) |
|
Face Verification for Access Control |
|
|
339 | (38) |
|
|
|
|
339 | (3) |
|
|
342 | (1) |
|
|
343 | (16) |
|
|
359 | (6) |
|
An Example Access Control System Based on Eigenface |
|
|
365 | (3) |
|
Commercial Systems and Performance Evaluation |
|
|
368 | (2) |
|
|
370 | (7) |
|
Voice Biometrics for Securing Your Web-Based Business |
|
|
377 | (16) |
|
|
|
|
|
377 | (2) |
|
|
379 | (4) |
|
Business Opportunities on the Web using Speaker Verification |
|
|
383 | (2) |
|
SpeakEZ Web Authentication Service |
|
|
385 | (4) |
|
Speaker Verification Performance |
|
|
389 | (3) |
|
|
392 | (1) |
|
Ability to Verify: A Metric for System Performance in Real-World Comparative Biometric Testing |
|
|
393 | (18) |
|
|
|
|
394 | (1) |
|
|
395 | (3) |
|
|
398 | (3) |
|
|
401 | (5) |
|
Vendor-generated Test Results |
|
|
406 | (2) |
|
|
408 | (3) |
|
Automated Authentication Using Hybrid Biometric System |
|
|
411 | (34) |
|
|
|
|
412 | (9) |
|
A Hybrid Biometric Person Authentication Prototype |
|
|
421 | (5) |
|
Database, Tests and Results |
|
|
426 | (6) |
|
Hybrid Biometric Applications |
|
|
432 | (7) |
|
|
439 | (6) |
Index |
|
445 | |