Muutke küpsiste eelistusi

Biometric Solutions: For Authentication in an E-World Softcover reprint of the original 1st ed. 2002 [Pehme köide]

Edited by
  • Pehme köide
  • Hind: 141,35 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 166,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner. This includes the basic concepts, theories, and characteristic features of integrating/formulating different facets of biometric solutions for authentication, with recent developments and significant applications in an E-world. This book provides the reader with a basic concept of biometrics, an in-depth discussion exploring biometric technologies in various applications in an E-world. It also includes a detailed description of typical biometric-based security systems and up-to-date coverage of how these issues are developed. Experts from all over the world demonstrate the various ways this integration can be made to efficiently design methodologies, algorithms, architectures, and implementations for biometric-based applications in an E-world.

Muu info

Springer Book Archives
Foreword xi
Preface xiii
Chapter 1 Biometrics Applications In An E-World
1(22)
David Zhang
1.1 Biometrics Technologies
1(4)
1.2 Biometrics Systems
5(2)
1.3 Biometrics Applications
7(5)
1.4 Organization of the Book
12(11)
Chapter 2 Achievements And Challenges In Fingerprint Recognition
23(36)
Asker M. Bazen
Sabih H. Gerez
2.1 Introduction
23(1)
2.2 Fingerprint Recognition Issues
24(3)
2.3 Applications
27(5)
2.4 Fingerprint Recognition Methods and Algorithms
32(21)
2.5 Discussion
53(1)
2.6 Conclusions
54(5)
Chapter 3 Biometrics Electronic Purse
59(24)
Eng Chong Tan
Abdul Wahab
Su Miang Heng
3.1 Introduction
59(3)
3.2 Smart-Card Technology
62(4)
3.3 Biometric Methodologies
66(2)
3.4 Design of Biometrics Electronic Purse
68(13)
3.5 Conclusions
81(2)
Chapter 4 Face Recognition And Its Application
83(16)
Andrew W. Senior
Ruud M. Bolle
4.1 Introduction
83(1)
4.2 Face as a Biometric
84(3)
4.3 The Technology of Face Recognition
87(2)
4.4 Privacy Issues
89(1)
4.5 Application Domain
90(3)
4.6 The IBM Face Recognition System
93(2)
4.7 Conclusions
95(4)
Chapter 5 Personalize Mobile Access By Speaker Authentication
99(32)
Ke Chen
5.1 Introduction
100(3)
5.2 Bilateral User Authentication Framework
103(3)
5.3 Enabling Speaker Authentication Technologies
106(9)
5.4 Simulations
115(11)
5.5 Conclusions
126(5)
Chapter 6 Biometrics On The Internet: Security Application And Services
131(38)
Lee Luan Ling
Miguel Gustavo Lizarraga
6.1 Introduction
131(1)
6.2 Communications Networks and Internet
132(7)
6.3 Biometrics
139(7)
6.4 The Personal Identification Network: Biometrics Services via the Internet
146(16)
6.5 Other Biometric Topics in Internet Applications
162(1)
6.6 Conclusions and Future Trends
163(6)
Chapter 7 Forensic Identification Reporting Using Automatic Biometric Systems
169(18)
Joaquin Gonzalez-Rodriguez
Javier Ortega-Garcia
Jose-Luis Sanchez-Bote
7.1 Introduction
169(2)
7.2 Biometric Systems and Classical Forensic Reporting
171(2)
7.3 Bayesian Analysis of Forensic Evidence
173(2)
7.4 Assessment of Forensic Biometric Systems
175(1)
7.5 Case Study: Forensic Speaker Recognition
175(8)
7.6 Conclusions
183(4)
Chapter 8 Signature Security System For E-Commerce
187(30)
Bin Li
David Zhang
8.1 Introduction
188(3)
8.2 Literature Overview
191(8)
8.3 A Typical On-Line Signature Verification System
199(10)
8.4 Proposed On-Line Dynamic Signature Verification Applications
209(5)
8.5 Conclusions
214(3)
Chapter 9 Web Guard: A Biometrics Identification System For Network Security
217(26)
Jane You
David Zhang
9.1 Introduction
218(3)
9.2 Biometrics Data Warehouse
221(3)
9.3 Dynamic Feature Selection
224(3)
9.4 Hierarchical Search
227(1)
9.5 Robust Classification via Fuzzy Neural Network
227(3)
9.6 System Implementation
230(5)
9.7 Experimental Results
235(4)
9.8 Conclusions
239(4)
Chapter 10 Smart Card Application Based On Palmprint Identification
243(20)
Guangming Lu
David Zhang
10.1 Introduction
243(3)
10.2 On-line Palmprint Identification System
246(7)
10.3 Smart Card Architecture
253(4)
10.4 System Analysis and Applications
257(3)
10.5 Conclusions
260(3)
Chapter 11 Secure Fingerprint Authentication
263(26)
Nalini K. Ratha
Jonathan H. Connell
Ruud M. Bolle
11.1 Introduction
263(4)
11.2 Biometrics-Based Authentication Systems
267(3)
11.3 Fingerprint Recognition
270(3)
11.4 Techniques to Improve Security
273(13)
11.5 Conclusions
286(3)
Chapter 12 From Biometrics Technology To Applications Regarding Face, Voice, Signature And Fingerprint Recognition Systems
289(50)
Javier Ortega-Garcia
Joaquin Gonzalez-Rodriguez
Danilo Simon-Zorita
Santiago Cruz-Llanas
12.1 Introduction
289(1)
12.2 Automatic Speaker Recognition
290(6)
12.3 Automatic Face Recognition
296(8)
12.4 Minutiae-Based Fingerprint Recognition Systems
304(8)
12.5 On-Line HMM-Based Signature Verification System
312(10)
12.6 Multimodality in Biometric Systems
322(3)
12.7 From Technology to Applications
325(14)
Chapter 13 Face Verification For Access Control
339(38)
Wen Gao
Shiguang Shan
13.1 Introduction
339(3)
13.2 Face Detection
342(1)
13.3 Face Verification
343(16)
13.4 Major Challenges
359(6)
13.5 An Example Access Control System Based on Eigenface
365(3)
13.6 Commercial Systems and Performance Evalutation
368(2)
13.7 Summary and Conclusions
370(7)
Chapter 14 Voice Biometrics For Securing Your Web-Based Business
377(16)
Kevin Farrell
Scott Sharp
Ron Beyner
14.1 Introduction
377(2)
14.2 Speaker Verification
379(4)
14.3 Business Opportunities on the Web using Speaker Verification
383(2)
14.4 SpeakEZ Web Authentication Service
385(4)
14.5 Speaker Verification Performance
389(3)
14.6 Summary
392(1)
Chapter 15 Ability To Verify: A Metric For System Performance In Real-World Comparative Biometric Testing
393(18)
Samir Nanavati
Michael Thieme
15.1 Introduction
394(1)
15.2 Test Methodology
395(3)
15.3 High-level Test Results
398(3)
15.4 Ability to Verify (ATV)
401(5)
15.5 Vendor-generated Test Results
406(2)
15.6 Conclusions
408(3)
Chapter 16 Automated Authentication Using Hybrid Biometric System
411(34)
Norman Poh
Jerzy Korczak
16.1 The State of the Art
412(9)
16.2 A Hybrid Biometric Person Authentication Prototype
421(5)
16.3 Database, Tests and Results
426(6)
16.4 Hybrid Biometric Applications
432(7)
16.5 Conclusions
439(6)
Index 445