Muutke küpsiste eelistusi

E-raamat: Introduction to Biometrics

  • Formaat: PDF+DRM
  • Ilmumisaeg: 18-Nov-2011
  • Kirjastus: Springer-Verlag New York Inc.
  • Keel: eng
  • ISBN-13: 9780387773261
  • Formaat - PDF+DRM
  • Hind: 67,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 18-Nov-2011
  • Kirjastus: Springer-Verlag New York Inc.
  • Keel: eng
  • ISBN-13: 9780387773261

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It is a rapidly evolving field with applications ranging from securely accessing one’s computer to gaining entry into a country. While the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology, "Introduction to Biometrics" is the first textbook to introduce the fundamentals of Biometrics to undergraduate/graduate students. The three commonly used modalities in the biometrics field, namely, fingerprint, face, and iris are covered in detail in this book. Few other modalities like hand geometry, ear, and gait are also discussed briefly along with advanced topics such as multibiometric systems and security of biometric systems. Exercises for each chapter will be available on the book website to help students gain a better understanding of the topics and obtain practical experience in designing computer programs for biometric applications. These can be found at: http://www.csee.wvu.edu/~ross/BiometricsTextBook/.

Designed for undergraduate and graduate students in computer science and electrical engineering, "Introduction to Biometrics" is also suitable for researchers and biometric and computer security professionals.



This first book to introduce the fundamentals of biometrics; it covers common modalities including fingerprint, face, iris, hand geometry, signature and voice. Exercises help readers gain experience in designing computer programs for biometric applications.

1 Introduction
1(50)
1.1 Person Recognition
2(1)
1.2 Biometric Systems
3(7)
1.2.1 Enrollment and recognition phases
4(1)
1.2.2 Sensor module
4(2)
1.2.3 Feature extraction module
6(3)
1.2.4 Database module
9(1)
1.2.5 Matching module
9(1)
1.3 Biometric Functionalities
10(3)
1.3.1 Verification
10(1)
1.3.2 Identification
11(2)
1.4 Biometric System Errors
13(14)
1.4.1 Performance measures
17(10)
1.5 The Design Cycle of Biometric Systems
27(12)
1.5.1 Nature of the application
28(1)
1.5.2 Choice of biometric trait
29(7)
1.5.3 Data collection
36(1)
1.5.4 Choice of features and matching algorithm
36(1)
1.5.5 Evaluation
37(2)
1.6 Applications of Biometric Systems
39(2)
1.7 Security and Privacy Issues
41(3)
1.8 Summary
44(7)
Bibliographical and Historical Remarks
45(2)
References
47(4)
2 Fingerprint Recognition
51(46)
2.1 Introduction
51(3)
2.2 Friction Ridge Pattern
54(6)
2.2.1 Features
54(5)
2.2.2 Formation
59(1)
2.3 Fingerprint Acquisition
60(4)
2.3.1 Sensing techniques
60(2)
2.3.2 Image quality
62(2)
2.4 Feature Extraction
64(8)
2.4.1 Ridge orientation and frequency estimation
64(3)
2.4.2 Singularity extraction
67(3)
2.4.3 Ridge extraction
70(1)
2.4.4 Minutiae extraction
71(1)
2.5 Matching
72(9)
2.5.1 Alignment
74(2)
2.5.2 Pairing minutiae
76(1)
2.5.3 Match score generation
77(1)
2.5.4 Latent fingerprint matching
78(2)
2.5.5 Fingerprint individuality
80(1)
2.5.6 Performance evaluation
80(1)
2.6 Fingerprint Indexing
81(3)
2.7 Fingerprint Synthesis
84(1)
2.7.1 Level 1 feature synthesis
84(1)
2.7.2 Level 2 feature synthesis
85(1)
2.8 Palmprint
85(6)
2.8.1 Palmprint features
87(1)
2.8.2 Palmprint recognition in forensics
88(2)
2.8.3 Palmprint recognition for access control
90(1)
2.9 Summary
91(6)
Bibliographical and Historical Remarks
92(2)
References
94(3)
3 Face Recognition
97(44)
3.1 Introduction
97(7)
3.1.1 Psychology of face recognition
98(2)
3.1.2 Facial features
100(3)
3.1.3 Design of a face recognition system
103(1)
3.2 Image Acquisition
104(5)
3.2.1 2D Sensors
105(1)
3.2.2 3D Sensors
106(1)
3.2.3 Video sequences
107(2)
3.3 Face Detection
109(7)
3.3.1 Viola-Jones face detector
111(5)
3.4 Feature Extraction and Matching
116(13)
3.4.1 Appearance-based face recognition
118(4)
3.4.2 Model-based face recognition
122(2)
3.4.3 Texture-based face recognition
124(3)
3.4.4 Performance evaluation
127(2)
3.5 Advanced Topics
129(8)
3.5.1 Handling pose, illumination, and expression variations
129(1)
3.5.2 Heterogeneous face recognition
130(2)
3.5.3 Face modeling
132(5)
3.6 Summary
137(4)
Bibliographical and Historical Remarks
137(1)
References
138(3)
4 Iris Recognition
141(34)
4.1 Introduction
141(3)
4.2 Design of an Iris Recognition System
144(2)
4.3 Image Acquisition
146(5)
4.4 Iris Segmentation
151(8)
4.4.1 Segmentation using the integro-differential operator
152(1)
4.4.2 Segmentation using Geodesic Active Contours (GAC)
153(6)
4.4.3 Generating iris masks
159(1)
4.5 Iris Normalization
159(2)
4.6 Iris Encoding and Matching
161(3)
4.7 Iris Quality
164(5)
4.7.1 Quality assessment techniques
164(5)
4.8 Performance Evaluation
169(1)
4.9 Summary
170(5)
Bibliographical and Historical Remarks
171(1)
References
172(3)
5 Additional Biometric Traits
175(34)
5.1 Introduction
175(1)
5.2 Ear
176(6)
5.2.1 Ear detection
177(1)
5.2.2 Ear recognition
178(2)
5.2.3 Challenges in ear recognition
180(2)
5.3 Gait
182(4)
5.3.1 Feature extraction and matching
183(2)
5.3.2 Challenges in gait recognition
185(1)
5.4 Hand Geometry
186(4)
5.4.1 Image capture
186(2)
5.4.2 Hand segmentation
188(1)
5.4.3 Feature Extraction
189(1)
5.4.4 Feature matching
189(1)
5.4.5 Challenges in hand geometry recognition
190(1)
5.5 Soft Biometrics
190(16)
5.5.1 Periocular
191(3)
5.5.2 Face marks
194(7)
5.5.3 Tattoo
201(5)
5.6 Summary
206(3)
References
207(2)
6 Multibiometrics
209(50)
6.1 Introduction
209(3)
6.2 Sources of Multiple Evidence
212(9)
6.2.1 Multi-sensor systems
213(2)
6.2.2 Multi-algorithm systems
215(2)
6.2.3 Multi-instance systems
217(1)
6.2.4 Multi-sample systems
218(1)
6.2.5 Multimodal systems
219(2)
6.3 Acquisition and Processing Architecture
221(3)
6.3.1 Acquisition sequence
221(1)
6.3.2 Processing sequence
222(2)
6.4 Fusion Levels
224(29)
6.4.1 Sensor-level fusion
226(1)
6.4.2 Feature-level fusion
227(5)
6.4.3 Score-level fusion
232(14)
6.4.4 Rank-level fusion
246(4)
6.4.5 Decision-level fusion
250(3)
6.5 Summary
253(6)
Bibliographical and Historical Remarks
254(2)
References
256(3)
7 Security Of Biometric Systems
259(48)
7.1 Introduction
259(5)
7.2 Adversary Attacks
264(4)
7.2.1 Insider attacks
264(2)
7.2.2 Infrastructure attacks
266(2)
7.3 Attacks at the User Interface
268(10)
7.3.1 Impersonation
268(1)
7.3.2 Obfuscation
269(1)
7.3.3 Spoofing
269(3)
7.3.4 Countermeasure: spoof detection
272(6)
7.4 Attacks on Biometric Processing
278(5)
7.4.1 Attacks on the system modules
278(2)
7.4.2 Attacks at the interconnections
280(3)
7.5 Attacks on the Template Database
283(19)
7.5.1 Countermeasure: biometric template security
284(18)
7.6 Summary
302(5)
Bibliographical and Historical Remarks
302(2)
References
304(3)
Index 307