libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro
ARGOMENTO:  BOOKS > INFORMATICA > TESTI GENERALI

zhang david d. (curatore) - biometric solutions

Biometric Solutions For Authentication in an E-World




Disponibilità: Normalmente disponibile in 15 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
162,98 €
NICEPRICE
154,83 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 10/2012
Edizione: Softcover reprint of the original 1st ed. 2002





Trama

Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner. This includes the basic concepts, theories, and characteristic features of integrating/formulating different facets of biometric solutions for authentication, with recent developments and significant applications in an E-world. This book provides the reader with a basic concept of biometrics, an in-depth discussion exploring biometric technologies in various applications in an E-world. It also includes a detailed description of typical biometric-based security systems and up-to-date coverage of how these issues are developed. Experts from all over the world demonstrate the various ways this integration can be made to efficiently design methodologies, algorithms, architectures, and implementations for biometric-based applications in an E-world.




Sommario

1 Biometrics Applications in An E-world.- 1.1 Biometrics Technologies.- 1.2 Biometrics Systems.- 1.3 Biometrics Applications.- 1.4 Organization of the Book.- 2 Achievements and Challenges in Fingerprint Recognition.- 2.1 Introduction.- 2.2 Fingerprint Recognition Issues.- 2.3 Applications.- 2.4 Fingerprint Recognition Methods and Algorithms.- 2.5 Discussion.- 2.6 Conclusions.- 3 Biometrics Electronic Purse.- 3.1 Introduction.- 3.2 Smart-Card Technology.- 3.3 Biometric Methodologies.- 3.4 Design of Biometrics Electronic Purse.- 3.5 Conclusions.- 4 Face Recognition and Its Application.- 4.1 Introduction.- 4.2 Face as a BiometriC.- 4.3 The Technology of Face Recognition.- 4.4 Privacy Issues.- 4.5 Application Domain.- 4.6 The IBM Face Recognition System.- 4.7 Conclusions.- 5 Personalize Mobile Access by Speaker Authentication.- 5.1 Introduction.- 5.2 Bilateral User Authentication Framework.- 5.3 Enabling Speaker Authentication Technologies.- 5.4 Simulations.- 5.5 Conclusions.- 6 Biometrics on the Internet: Security Application and Services.- 6.1 Introduction.- 6.2 Communications Networks and Internet.- 6.3 Biometrics.- 6.4 The Personal Identification Network: Biometrics Services via the Internet.- 6.5 Other Biometric Topics in Internet Applications.- 6.6 Conclusions and Future Trends.- 7 Forensic Identification Reporting Using Automatic Biometric Systems.- 7.1 Introduction.- 7.2 Biometric Systems and Classical Forensic Reporting.- 7.3 Bayesian Analysis of Forensic Evidence.- 7.4 Assessment of Forensic Biometric Systems.- 7.5 Case Study: Forensic Speaker Recognition.- 7.6 Conclusions.- 8 Signature Security System for E-commerce.- 8.1 Introduction.- 8.2 Literature Overview.- 8.3 A Typical On-Line Signature Verification System.- 8.4 Proposed On-Line Dynamic Signature Verification Applications.- 8.5 Conclusions.- 9 Web Guard: A Biometrics Identification System for Network Security.- 9.1 Introduction.- 9.2 Biometrics Data Warehouse.- 9.3 Dynamic Feature Selection.- 9.4 Hierarchical Search.- 9.5 Robust Classification via Fuzzy Neural Network.- 9.6 System Implementation.- 9.7 Experimental Results.- 9.8 Conclusions.- 10 Smart Card Application Based on Palmprint Identification.- 10.1 Introduction.- 10.2 On-line Palmprint Identification System.- 10.3 Smart Card Architecture.- 10.4 System Analysis and Applications.- 10.5 Conclusions.- 11 Secure Fingerprint Authentication.- 11.1 Introduction.- 11.2 Biometrics-Based Authentication Systems.- 11.3 Fingerprint Recognition.- 11.4 Techniques to Improve Security.- 11.5 Conclusions.- 12 From Biometrics Technology to Applications Regarding Face, Voice, Signature and Fingerprint Recognition Systems.- 12.1 Introduction.- 12.2 Automatic Speaker Recognition.- 12.3 Automatic Face Recognition.- 12.4 Minutiae-Based Fingerprint Recognition Systems.- 12.5 On-Line HMM-Based Signature Verification System.- 12.6 Multimodality in Biometric Systems.- 12.7 From Technology to Applications.- 13 Face Verification for Access Control.- 13.1 Introduction.- 13.2 Face Detection.- 13.3 Face Verification.- 13.4 Major Challenges.- 13.5 An Example Access Control System Based on Eigenface.- 13.6 Commercial Systems and Performance Evalutation.- 13.7 Summary and Conclusions.- 14 Voice Biometrics for Securing Your Web-Based Business.- 14.1 Introduction.- 14.2 Speaker Verification.- 14.3 Business Opportunities on the Web using Speaker Verification.- 14.4 SpeakEZ Web Authentication Service.- 14.5 Speaker Verification Performance.- 14.6 Summary.- 15 Ability to Verify: A Metric for System Performance in Real-World Comparative Biometric Testing.- 15.1 Introduction.- 15.2 Test Methodology.- 15.3 High-level Test Results.- 15.4 Ability to Verify (ATV).- 15.5 Vendor-generated Test Results.- 15.6 Conclusions.- 16 Automated Authentication Using Hybrid Biometric System.- 16.1 The State of the Art.- 16.2 A Hybrid Biometric Person Authentication Prototype.- 16.3 Database, Tests and Results.- 16.4 Hybrid Biometric Applications.- 16.5 Conclusions.










Altre Informazioni

ISBN:

9781461353713

Condizione: Nuovo
Collana: The Springer International Series in Engineering and Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XIV, 451 p.
Pagine Arabe: 451
Pagine Romane: xiv


Dicono di noi