Foreword |
|
xi | |
Preface |
|
xiii | |
|
Chapter 1 Biometrics Applications In An E-World |
|
|
1 | (22) |
|
|
1.1 Biometrics Technologies |
|
|
1 | (4) |
|
|
5 | (2) |
|
1.3 Biometrics Applications |
|
|
7 | (5) |
|
1.4 Organization of the Book |
|
|
12 | (11) |
|
Chapter 2 Achievements And Challenges In Fingerprint Recognition |
|
|
23 | (36) |
|
|
|
|
23 | (1) |
|
2.2 Fingerprint Recognition Issues |
|
|
24 | (3) |
|
|
27 | (5) |
|
2.4 Fingerprint Recognition Methods and Algorithms |
|
|
32 | (21) |
|
|
53 | (1) |
|
|
54 | (5) |
|
Chapter 3 Biometrics Electronic Purse |
|
|
59 | (24) |
|
|
|
|
|
59 | (3) |
|
3.2 Smart-Card Technology |
|
|
62 | (4) |
|
3.3 Biometric Methodologies |
|
|
66 | (2) |
|
3.4 Design of Biometrics Electronic Purse |
|
|
68 | (13) |
|
|
81 | (2) |
|
Chapter 4 Face Recognition And Its Application |
|
|
83 | (16) |
|
|
|
|
83 | (1) |
|
|
84 | (3) |
|
4.3 The Technology of Face Recognition |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
90 | (3) |
|
4.6 The IBM Face Recognition System |
|
|
93 | (2) |
|
|
95 | (4) |
|
Chapter 5 Personalize Mobile Access By Speaker Authentication |
|
|
99 | (32) |
|
|
|
100 | (3) |
|
5.2 Bilateral User Authentication Framework |
|
|
103 | (3) |
|
5.3 Enabling Speaker Authentication Technologies |
|
|
106 | (9) |
|
|
115 | (11) |
|
|
126 | (5) |
|
Chapter 6 Biometrics On The Internet: Security Application And Services |
|
|
131 | (38) |
|
|
|
|
131 | (1) |
|
6.2 Communications Networks and Internet |
|
|
132 | (7) |
|
|
139 | (7) |
|
6.4 The Personal Identification Network: Biometrics Services via the Internet |
|
|
146 | (16) |
|
6.5 Other Biometric Topics in Internet Applications |
|
|
162 | (1) |
|
6.6 Conclusions and Future Trends |
|
|
163 | (6) |
|
Chapter 7 Forensic Identification Reporting Using Automatic Biometric Systems |
|
|
169 | (18) |
|
Joaquin Gonzalez-Rodriguez |
|
|
|
|
|
169 | (2) |
|
7.2 Biometric Systems and Classical Forensic Reporting |
|
|
171 | (2) |
|
7.3 Bayesian Analysis of Forensic Evidence |
|
|
173 | (2) |
|
7.4 Assessment of Forensic Biometric Systems |
|
|
175 | (1) |
|
7.5 Case Study: Forensic Speaker Recognition |
|
|
175 | (8) |
|
|
183 | (4) |
|
Chapter 8 Signature Security System For E-Commerce |
|
|
187 | (30) |
|
|
|
|
188 | (3) |
|
|
191 | (8) |
|
8.3 A Typical On-Line Signature Verification System |
|
|
199 | (10) |
|
8.4 Proposed On-Line Dynamic Signature Verification Applications |
|
|
209 | (5) |
|
|
214 | (3) |
|
Chapter 9 Web Guard: A Biometrics Identification System For Network Security |
|
|
217 | (26) |
|
|
|
|
218 | (3) |
|
9.2 Biometrics Data Warehouse |
|
|
221 | (3) |
|
9.3 Dynamic Feature Selection |
|
|
224 | (3) |
|
|
227 | (1) |
|
9.5 Robust Classification via Fuzzy Neural Network |
|
|
227 | (3) |
|
9.6 System Implementation |
|
|
230 | (5) |
|
|
235 | (4) |
|
|
239 | (4) |
|
Chapter 10 Smart Card Application Based On Palmprint Identification |
|
|
243 | (20) |
|
|
|
|
243 | (3) |
|
10.2 On-line Palmprint Identification System |
|
|
246 | (7) |
|
10.3 Smart Card Architecture |
|
|
253 | (4) |
|
10.4 System Analysis and Applications |
|
|
257 | (3) |
|
|
260 | (3) |
|
Chapter 11 Secure Fingerprint Authentication |
|
|
263 | (26) |
|
|
|
|
|
263 | (4) |
|
11.2 Biometrics-Based Authentication Systems |
|
|
267 | (3) |
|
11.3 Fingerprint Recognition |
|
|
270 | (3) |
|
11.4 Techniques to Improve Security |
|
|
273 | (13) |
|
|
286 | (3) |
|
Chapter 12 From Biometrics Technology To Applications Regarding Face, Voice, Signature And Fingerprint Recognition Systems |
|
|
289 | (50) |
|
|
Joaquin Gonzalez-Rodriguez |
|
|
|
|
|
289 | (1) |
|
12.2 Automatic Speaker Recognition |
|
|
290 | (6) |
|
12.3 Automatic Face Recognition |
|
|
296 | (8) |
|
12.4 Minutiae-Based Fingerprint Recognition Systems |
|
|
304 | (8) |
|
12.5 On-Line HMM-Based Signature Verification System |
|
|
312 | (10) |
|
12.6 Multimodality in Biometric Systems |
|
|
322 | (3) |
|
12.7 From Technology to Applications |
|
|
325 | (14) |
|
Chapter 13 Face Verification For Access Control |
|
|
339 | (38) |
|
|
|
|
339 | (3) |
|
|
342 | (1) |
|
|
343 | (16) |
|
|
359 | (6) |
|
13.5 An Example Access Control System Based on Eigenface |
|
|
365 | (3) |
|
13.6 Commercial Systems and Performance Evalutation |
|
|
368 | (2) |
|
13.7 Summary and Conclusions |
|
|
370 | (7) |
|
Chapter 14 Voice Biometrics For Securing Your Web-Based Business |
|
|
377 | (16) |
|
|
|
|
|
377 | (2) |
|
14.2 Speaker Verification |
|
|
379 | (4) |
|
14.3 Business Opportunities on the Web using Speaker Verification |
|
|
383 | (2) |
|
14.4 SpeakEZ Web Authentication Service |
|
|
385 | (4) |
|
14.5 Speaker Verification Performance |
|
|
389 | (3) |
|
|
392 | (1) |
|
Chapter 15 Ability To Verify: A Metric For System Performance In Real-World Comparative Biometric Testing |
|
|
393 | (18) |
|
|
|
|
394 | (1) |
|
|
395 | (3) |
|
15.3 High-level Test Results |
|
|
398 | (3) |
|
15.4 Ability to Verify (ATV) |
|
|
401 | (5) |
|
15.5 Vendor-generated Test Results |
|
|
406 | (2) |
|
|
408 | (3) |
|
Chapter 16 Automated Authentication Using Hybrid Biometric System |
|
|
411 | (34) |
|
|
|
16.1 The State of the Art |
|
|
412 | (9) |
|
16.2 A Hybrid Biometric Person Authentication Prototype |
|
|
421 | (5) |
|
16.3 Database, Tests and Results |
|
|
426 | (6) |
|
16.4 Hybrid Biometric Applications |
|
|
432 | (7) |
|
|
439 | (6) |
Index |
|
445 | |