Muutke küpsiste eelistusi

E-raamat: Biometrics: From Fiction to Practice [Taylor & Francis e-raamat]

Edited by (Indiana University-Purdue University, Indianapolis, USA)
  • Formaat: 326 pages, 9 Illustrations, color; 92 Illustrations, black and white
  • Ilmumisaeg: 07-Jan-2013
  • Kirjastus: Pan Stanford Publishing Pte Ltd
  • ISBN-13: 9780429189494
Teised raamatud teemal:
  • Taylor & Francis e-raamat
  • Hind: 170,80 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 244,00 €
  • Säästad 30%
  • Formaat: 326 pages, 9 Illustrations, color; 92 Illustrations, black and white
  • Ilmumisaeg: 07-Jan-2013
  • Kirjastus: Pan Stanford Publishing Pte Ltd
  • ISBN-13: 9780429189494
Teised raamatud teemal:
This book introduces readers to the basic concepts, classical approaches, and the newest design, development, and applications of biometrics. It also provides a glimpse of future designs and research directions in biometrics. In addition, it discusses some latest concerns and issues in this area. Suitable for a wide range of readers, the book explains professional terms in plain English and is ahead of time. Some concepts and designs discussed are so new that commercial systems based on them may not arrive in the market in the next 10 to 20 years.
Preface xiii
1 An Introduction to Biometrics
1(10)
Eliza Yingzi Du
1.1 What is Biometrics?
1(2)
1.2 Basic Functions of Biometrics
3(1)
1.3 Typical Biometric Systems
4(2)
1.4 How to Evaluate a Biometric System
6(2)
1.5 Summary
8(3)
2 Fingerprint Recognition
11(18)
Wei-Yun Yau
Zujun Hou
Vutipong Areekul
Suksan Jirachaweng
2.1 Introduction
11(1)
2.2 Fingerprint Acquisition
12(3)
2.3 Fingerprint Processing
15(4)
2.3.1 Ridge Orientation Estimation
15(2)
2.3.2 Ridge Orientation Modeling
17(1)
2.3.3 Fingerprint Image Enhancement
18(1)
2.4 Feature Extraction
19(3)
2.4.1 Singular Point Detection
20(2)
2.5 Fingerprint Matching
22(2)
2.5.1 Level-1 Matching Approach
22(1)
2.5.2 Level-2 Matching Approach: Minutiae Matching
23(1)
2.5.3 Level-3 Matching Approach
24(1)
2.6 Conclusions
24(5)
3 Face Detection and Recognition
29(36)
Huiyu Zhou
3.1 Introduction
29(2)
3.2 Literature Review
31(7)
3.2.1 Face Detection
31(1)
3.2.1.1 Knowledge-based methods
32(1)
3.2.1.2 Feature-based methods
32(2)
3.2.1.3 Template-matching methods
34(2)
3.2.1.4 Appearance-based methods
36(1)
3.2.2 Face Recognition
37(1)
3.3 Classical Face Detection Algorithms
38(17)
3.3.1 AdaBoost Face Detection
38(3)
3.3.1.1 Attentional cascade
41(1)
3.3.2 SNoW Face Detection
41(3)
3.3.3 Rank-Deficient Face Detection
44(3)
3.3.4 Gabor-Based Neural Networks
47(2)
3.3.5 Neural Network-Based Face Detection
49(2)
3.3.6 Evaluation Work
51(4)
3.4 Classical Face Recognition Algorithms
55(6)
3.4.1 Eigenface
55(2)
3.4.2 Fisherface
57(2)
3.4.3 Tensorface
59(2)
3.5 Conclusions and Outlook
61(4)
4 Iris Recognition
65(22)
Robert W. Ives
Randy P. Broussard
Ryan N. Rakvic
Steven B. Link
4.1 Introduction
66(1)
4.2 Iris Recognition Algorithms
67(10)
4.2.1 Image Acquisition
68(1)
4.2.2 Preprocessing
69(2)
4.2.3 Feature Extraction
71(1)
4.2.4 Template Generation
71(2)
4.2.5 Template Matching
73(1)
4.2.6 Performance
74(3)
4.3 Some Applications of Iris Recognition
77(4)
4.3.1 PC-Tethered Systems
77(1)
4.3.2 Wall-Mount Systems
77(1)
4.3.3 Walk-Through Portal Systems
78(1)
4.3.4 Portable Systems
79(2)
4.4 Current Research Areas
81(6)
4.4.1 Off-Axis Iris Recognition
82(1)
4.4.2 Iris Recognition at a Distance
82(2)
4.4.3 Multispectral Iris Recognition
84(3)
5 Speaker Recognition for Biometric Systems
87(30)
Ravi Sankar
Tanmoy Islam
5.1 Introduction
87(1)
5.2 Modes of Operation
88(1)
5.3 Voice-Based Recognition Systems
89(2)
5.4 Preprocessing Algorithms
91(3)
5.4.1 A/D Conversion and Pre-emphasis
91(1)
5.4.2 Framing and Windowing
91(3)
5.5 Feature Extraction
94(7)
5.5.1 Short-term Analysis
95(1)
5.5.2 Cepstral Analysis
96(1)
5.5.3 Linear Prediction
97(2)
5.5.4 Mel Frequency Cepstrum
99(2)
5.5.5 Intersession Variability
101(1)
5.6 Speaker Modeling
101(8)
5.6.1 Dynamic Time Warping
102(1)
5.6.2 Vector Quantization
103(1)
5.6.3 Hidden Markov Model
104(2)
5.6.4 Gaussian Mixture Modeling
106(1)
5.6.4.1 Expectation maximization
107(1)
5.6.5 GMM Likelihood Ratio
108(1)
5.7 State of the Art in Speaker Recognition Systems
109(2)
5.8 Summary
111(6)
6 Palm Recognition
117(16)
Mike Beale
6.1 Introduction
117(1)
6.1.1 History
118(1)
6.2 Methods
118(3)
6.2.1 Minutiae
119(1)
6.2.2 Principal Lines
120(1)
6.2.3 Texture of Palm
121(1)
6.3 System
121(2)
6.3.1 Palm Acquisition
121(1)
6.3.2 Palmprint Recognition
122(1)
6.4 The Future of Palm Recognition
123(5)
6.4.1 Multimodal
123(1)
6.4.1.1 Vein and palm
124(1)
6.4.1.2 Hand geometry and palm
125(1)
6.4.2 3D Palm Recognition
125(2)
6.4.3 Touchless Palm Recognition
127(1)
6.5 Conclusion
128(5)
7 Multimodal Biometrics
133(16)
Zhi Zhou
Eliza Yingzi Du
7.1 Introduction
134(2)
7.2 Integration
136(4)
7.2.1 Multiple Traits
136(1)
7.2.2 Multiple Snapshots of the Same Trait
137(1)
7.2.3 Multiple Representations and Matching Algorithms of the Same Trait
138(1)
7.2.4 Score Fusion Methods
139(1)
7.3 Applications
140(2)
7.3.1 Human Identification
141(1)
7.3.2 Board Security
141(1)
7.3.3 Identification Cards
142(1)
7.4 Summary
142(7)
8 Biometrics on Smart Card
149(16)
Tai-Pang Chen
Wei-Yun Yau
Xudong Jiang
8.1 Introduction
149(2)
8.2 Fingerprint Matching Algorithm
151(2)
8.3 An Overview of Local and Global Structure
153(2)
8.4 Work Sharing Mechanism for On-Card Comparison
155(3)
8.5 Off-Card Alignment
158(1)
8.6 On-Card Comparison
159(2)
8.7 Performance Comparison
161(1)
8.8 Conclusion
161(4)
9 Smart Clothes for Biometrics and Beyond
165(22)
Kee-Sam Jeong
Sun K. Yoo
Joohyeon Lee
Gilsoo Cho
9.1 Introduction
165(3)
9.2 Smart Textile Sensors
168(7)
9.2.1 Biosignals
170(1)
9.2.2 Textile Electrode
171(2)
9.2.3 Textile-Based Piezo Sensor
173(2)
9.3 Smart Clothing as a Biomonitoring Platform
175(3)
9.4 Biometrics and Intelligent Services
178(3)
9.5 Conclusions and Future Work
181(6)
10 Spoof and Vulnerability of Biometric Systems
187(26)
Alexander D. Meadows
10.1 Introduction
187(3)
10.2 Background: Doddington's Taxonomy
190(1)
10.3 Classification of Vulnerability
191(1)
10.3.1 Internal and External Vulnerabilities
191(1)
10.4 Biometric System Architecture Vulnerabilities
192(7)
10.4.1 Sensor Level
193(1)
10.4.2 Signal Processing
193(2)
10.4.3 Administration
195(1)
10.4.4 Database
195(1)
10.4.5 Matching
196(1)
10.4.6 Decision
197(1)
10.4.7 Action
197(1)
10.4.8 Transmission
198(1)
10.5 Analysis of Vulnerabilities: Attack Trees
199(1)
10.6 Spoof vs. Common Biometric Technologies
200(3)
10.6.1 Fingerprint
201(1)
10.6.2 Voice
202(1)
10.6.3 Facial
202(1)
10.6.4 Iris
203(1)
10.7 Reasons for Exploitation and Attacks
203(2)
10.7.1 Gain False Access
204(1)
10.7.2 Avoid Identification
204(1)
10.7.3 Denial of Service
204(1)
10.7.4 Identity Theft
205(1)
10.8 Approaches to Safeguard Against Vulnerability
205(6)
10.8.1 Spoof Detection
206(1)
10.8.2 Watermarking
207(2)
10.8.3 Human Verification
209(1)
10.8.4 Multimodal Biometrics
209(1)
10.8.5 Passive and Active Biometrics
209(1)
10.8.6 Mitigation of Weak Users
210(1)
10.8.7 Biometric Encryption
211(1)
10.8.8 Revocable Biometrics
211(1)
10.9 Conclusions
211(2)
11 Challenges in Biometrics: Accessibility, Usability, and the Legal Framework
213(20)
Ing. Mario Savastano
11.1 Introduction
213(1)
11.2 A Real Challenge for Biometrics
214(1)
11.3 "Early" Biometrics
215(2)
11.4 Privacy
217(5)
11.4.1 The Fragmentation of the Privacy Issues
218(2)
11.4.2 Some Considerations on the Proportionality Principle Applied in the Context of the Biometric Technologies
220(2)
11.5 Accessibility and Usability in Biometrics
222(3)
11.5.1 The Elderly Dilemma
223(1)
11.5.2 Biometric Disabilities
224(1)
11.5.3 Voluntary Permanent Modifications
225(1)
11.6 Medical Aspects of Biometrics
225(2)
11.6.1 Direct Medical Implications
226(1)
11.6.2 Indirect Medical Implications
227(1)
11.7 Some Ethical Factors of Biometrics
227(2)
11.7.1 The Human Body as Password: Biometric Characteristics in "Good Shape"
227(1)
11.7.2 Biometrics in Preventing Human Trafficking
228(1)
11.8 The Standardization Activity
229(1)
11.8.1 The ISO/IEC JTC1 SC 37 "Biometrics" WG 6 on Cross-Jurisdictional and Societal Issues
230(1)
11.9 Conclusions
230(3)
12 Cancellable Biometrics
233(20)
Yan Sui
Xukai Zou
Yingzi Du
12.1 Introduction
234(3)
12.2 Approaches
237(4)
12.2.1 Noninvertible Feature Transformation Approach
238(2)
12.2.2 Biometric Salting
240(1)
12.3 Applications
241(3)
12.3.1 Electronic Passport
242(1)
12.3.2 Fingerprint Recognition ATMs
243(1)
12.3.3 Face Recognition Vending Machines
243(1)
12.4 Research Areas for Biometrics Security
244(9)
13 Continuous Biometric Verification
253(32)
Qinghan Xiao
Xue Dong Yang
13.1 Introduction
253(3)
13.2 User Authentication
256(3)
13.2.1 Authentication Systems
256(1)
13.2.2 Biometrics and Multifactor Authentication
257(2)
13.3 Overview and Analysis of Existing Continuous Verification Approaches
259(6)
13.3.1 Passwords
259(1)
13.3.2 Keystrokes
260(1)
13.3.3 Fingerprints
261(2)
13.3.4 EEG/ECG
263(1)
13.3.5 Facial Recognition
264(1)
13.4 Video-Based Facial Recognition
265(3)
13.5 System Implementation
268(7)
13.5.1 System Architecture
269(1)
13.5.1.1 Input module
269(1)
13.5.1.2 Face detection module
270(1)
13.5.1.3 Face segmentation module
270(1)
13.5.1.4 Lighting normalization module
270(2)
13.5.1.5 Facial feature matching module
272(1)
13.5.1.6 Graphical user interface
272(1)
13.5.2 Continuous Verification Workflow
273(2)
13.6 Experiments
275(3)
13.7 Conclusion
278(7)
14 Trends in Biometrics
285(16)
Kai Yang
Eliza Yingzi Du
14.1 Introduction: Current Situation of Biometric Technology
285(1)
14.2 Trends in Biometric Technology
286(9)
14.2.1 Less Vulnerable
286(1)
14.2.1.1 Spoofs
286(1)
14.2.1.2 Hacking and privacy attacking
286(2)
14.2.2 Legal
288(1)
14.2.3 Standard
289(1)
14.2.4 Lower Cost
290(1)
14.2.5 More Intelligent
290(1)
14.2.5.1 Combinational consent biometric scheme
291(1)
14.2.5.2 Incorporating consent biometric scheme
291(1)
14.2.6 Remote Biometrics
292(1)
14.2.7 Biometrics Surveillance
292(1)
14.2.8 Smaller
293(1)
14.2.9 More Accurate and Robust
294(1)
14.2.10 More Efficient
294(1)
14.2.11 More User-Friendly
294(1)
14.2.12 More Choices
295(1)
14.3 Trends in the Biometric Market
295(2)
14.4 Conclusions
297(4)
Index 301
Yingzi (Eliza) Du