Muutke küpsiste eelistusi

E-raamat: Science of Biometrics: Security Technology for Identity Verification

(President, HTG Solutions, IL, USA)
  • Formaat: 314 pages
  • Ilmumisaeg: 04-Jul-2018
  • Kirjastus: Routledge
  • Keel: eng
  • ISBN-13: 9780429946363
  • Formaat - EPUB+DRM
  • Hind: 70,19 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 314 pages
  • Ilmumisaeg: 04-Jul-2018
  • Kirjastus: Routledge
  • Keel: eng
  • ISBN-13: 9780429946363

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The Science of Biometrics: Security Technology for Identity Verification The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities.

Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Each chapter concludes with case studies to provide further application review.

This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics.

Chapter 1 Introduction
1(40)
Overview of Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture
1(11)
Overview of Adopting Biometric Technologies: Challenges and Solutions
12(29)
Chapter 2 Review of Biometrics
41(49)
Two Components of Biometric Technology - A Review of the Technical and Social Impacts
41(2)
The Social Implications
43(9)
The Technical Implications
52(18)
A Formal Definition of Biometrics
52(3)
The Difference Between Physiological and Behavioral-Based Biometrics
55(3)
What is Recognition?
58(2)
Physical Biometrics
60(1)
Behavioral Biometrics
61(2)
Understanding the Biometric Template
63(1)
The Mathematical Files of the Biometric Templates
64(2)
The Important Biometric Metrics and Key Performance Indicators
66(4)
The Major Market Applications of the Biometric Technologies
70(8)
Physical Access Control
71(1)
Time and Attendance
72(1)
Logical Access Control
73(1)
Mobile and Wireless
74(1)
Mobile and E-Commerce
75(1)
Surveillance
76(2)
A Technical Review of the Major Biometric Modalities
78(12)
Physical Biometrics -- Hand Geometry Recognition
79(2)
Physical Biometrics -- Vein Pattern Recognition
81(1)
Physical Biometrics -- Facial Recognition
82(1)
Physical Biometrics -- Voice Recognition
83(1)
Physical Biometrics -- Iris Recognition
84(1)
Physical Biometrics -- Fingerprint Recognition
85(2)
Behavioral Biometrics -- Signature Recognition
87(1)
Behavioral Biometrics -- Keystroke Recognition
88(2)
Chapter 3 Iris Recognition
90(89)
Physical and Behavioral Biometrics
90(1)
The Differences Between Physical Biometrics and Behavioral Biometrics
90(2)
The Eye: The Iris and the Retina
92(1)
The Retina
92(8)
The Physiology of the Retina
94(1)
The Process of Retinal Recognition
95(2)
The Advantages and Disadvantages of Retinal Recognition
97(3)
The Iris
100(4)
The Physiological Structure of the Iris
101(3)
How Iris Recognition Works: The Mathematical Algorithms
104(24)
The "Father" of Iris Recognition -- Dr. John Daugman
104(2)
The Theoretical Framework of Iris Recognition -- Tarawneh and Thunibat
106(9)
Reducing the Effects of Pupil Dilation and Constriction -- Proenca and Neves
115(5)
Reducing the Effects of Eyelids and Eyelashes -- Lin et al. and Zhou and Sun
120(4)
Reducing the Signal Noise in the Eye Image -- Shivani and Sharma
124(4)
The Applications of Iris Recognition
128(25)
Overview of the Major Applications
129(2)
Spoofing -- Print Attacks -- Gupta et al.
131(8)
Wireless Networks -- Ibrahim et al.
139(8)
Fuzzy Neural Networks -- Karthikeyan
147(6)
Biocryptography
153(21)
Introduction to Cryptography
155(1)
Message Scrambling and Descrambling
156(1)
Encryption and Decryption
156(1)
Ciphertexts
157(1)
Symmetric Key Systems and Asymmetric Key Systems
158(1)
The Mathematical Algorithms with Symmetric Cryptography
158(1)
Asymmetric Key Cryptography
159(1)
Keys and Public Private Keys
160(1)
The Differences Between Asymmetric and Symmetric Cryptography
161(1)
The Mathematical Algorithms of Asymmetric Cryptography
162(2)
An Introduction to Biocryptography
164(1)
The Cipher Biometric Template
165(1)
Biocryptography Keys
166(1)
A Review of How Biocryptography Can Be Used to Further Protect Iris Templates
167(7)
Case Study: "The Afghan Girl -- Sharbat Gula"
174(5)
Chapter 4 Facial Recognition
179(90)
Which One to Use? Iris Recognition or Facial Recognition?
179(2)
An Introduction to Facial Recognition
181(5)
Facial Recognition: How it Works
182(2)
Defining the Effectiveness of a Facial Recognition System
184(2)
The Techniques of Facial Recognition
186(2)
Facial Recognition: The Advantages and the Disadvantages
188(2)
An Overview of the Facial Recognition Methodologies
190(1)
The Various Approaches to Facial Recognition
191(4)
The Geometry-Based Approach
191(1)
The Template-Based Approach
192(1)
The Bit by Bit Approach
193(1)
The Appearance/Model-Based Approach
193(1)
The Neural Network Approach
194(1)
The Statistical Algorithms of Facial Recognition
195(11)
An Overview of Facial Recognition Template Matching
195(2)
Principal Component Analysis
197(5)
Discrete Cosine Transform
202(1)
Linear Discriminant Analysis
203(1)
Locality-Preserving Projections
203(1)
Gabor Wavelets
204(1)
Independent Component Analysis
205(1)
The Kernel PCA
206(1)
The Mathematical Algorithms
206(11)
Eigen faces
207(6)
Fisherfaces
213(2)
Local Binary Pattern Histograms (LBPH)
215(2)
Neural Networks
217(16)
Neural Networks with Gabor Filters
221(2)
Neural Networks with Hidden Markov Models
223(1)
Fuzzy Neural Networks
224(1)
Convolutional Neural Networks
225(8)
The Applications of Facial Recognition
233(25)
The Use of a Facial Makeup-Detection System in Facial Recognition -- Chen et al.
234(11)
Thermal Face Recognition for Human-Robot Interactions -- Hermosilla et al.
245(6)
The Use of Facial Recognition in Forensics -- Ali et al.
251(7)
The Limitations of Facial Recognition
258(6)
Illumination
259(1)
Pose
260(2)
Occlusion
262(1)
Optical Technology
262(1)
Expression
263(1)
Mathematical/Statistical Algorithmic Evaluations
263(1)
The Applications of Facial Recognition
264(5)
Case Study: Razko Security Adds Face Recognition Technology to Video Surveillance Systems
265(4)
Chapter 5 Final Conclusions
269(24)
Index 293
Ravindra Das is a technical writer for BN.Net, Inc., a leading technical communications company based in Chicago, IL. He has written two books, as well as the online course content for numerous certification exams. He has been published extensively worldwide, and holds an MBA in Management Information Systems from Bowling Green State University.