Advances in Biometrics for Secure Human Authentication and Recognition

Book description

Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human authentication and recognition.

Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional techniques as well as novel systems that have been developed over the past few years. It presents new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems.

Filled with comprehensive graphical and modular illustrations, the text covers applications of affective computing in biometrics, matching sketch to photograph, cryptography approaches in biometrics, biometrics alteration, heterogeneous biometrics, and age invariant biometrics. It also presents biometrics algorithms with novel feature extraction techniques, computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems.

Containing the work of some of the world’s most respected biometrics researchers, the book includes model question papers, mathematical notations, and exercises to reinforce understanding. Providing an up-to-date review of intelligence techniques and theories used in biometric technologies for secure human authentication and identification, this is an essential reference for researchers, scholars, graduate students, engineers, practitioners, and developers in the field of biometrics and its related fields.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents
  4. List of Figures (1/2)
  5. List of Figures (2/2)
  6. List of Tables
  7. Preface
  8. Contributors
  9. Chapter 1: Security and Reliability Assessment for Biometric Systems (1/6)
  10. Chapter 1: Security and Reliability Assessment for Biometric Systems (2/6)
  11. Chapter 1: Security and Reliability Assessment for Biometric Systems (3/6)
  12. Chapter 1: Security and Reliability Assessment for Biometric Systems (4/6)
  13. Chapter 1: Security and Reliability Assessment for Biometric Systems (5/6)
  14. Chapter 1: Security and Reliability Assessment for Biometric Systems (6/6)
  15. Chapter 2: Review of Human Recognition Based on Retinal Images (1/8)
  16. Chapter 2: Review of Human Recognition Based on Retinal Images (2/8)
  17. Chapter 2: Review of Human Recognition Based on Retinal Images (3/8)
  18. Chapter 2: Review of Human Recognition Based on Retinal Images (4/8)
  19. Chapter 2: Review of Human Recognition Based on Retinal Images (5/8)
  20. Chapter 2: Review of Human Recognition Based on Retinal Images (6/8)
  21. Chapter 2: Review of Human Recognition Based on Retinal Images (7/8)
  22. Chapter 2: Review of Human Recognition Based on Retinal Images (8/8)
  23. Chapter 3: Visual Speech as Behavioral Biometric (1/5)
  24. Chapter 3: Visual Speech as Behavioral Biometric (2/5)
  25. Chapter 3: Visual Speech as Behavioral Biometric (3/5)
  26. Chapter 3: Visual Speech as Behavioral Biometric (4/5)
  27. Chapter 3: Visual Speech as Behavioral Biometric (5/5)
  28. Chapter 4: Human Gait Signature for Biometric Authentication (1/6)
  29. Chapter 4: Human Gait Signature for Biometric Authentication (2/6)
  30. Chapter 4: Human Gait Signature for Biometric Authentication (3/6)
  31. Chapter 4: Human Gait Signature for Biometric Authentication (4/6)
  32. Chapter 4: Human Gait Signature for Biometric Authentication (5/6)
  33. Chapter 4: Human Gait Signature for Biometric Authentication (6/6)
  34. Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (1/7)
  35. Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (2/7)
  36. Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (3/7)
  37. Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (4/7)
  38. Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (5/7)
  39. Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (6/7)
  40. Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (7/7)
  41. Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (1/5)
  42. Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (2/5)
  43. Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (3/5)
  44. Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (4/5)
  45. Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (5/5)
  46. Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (1/8)
  47. Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (2/8)
  48. Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (3/8)
  49. Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (4/8)
  50. Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (5/8)
  51. Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (6/8)
  52. Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (7/8)
  53. Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (8/8)
  54. Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (1/8)
  55. Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (2/8)
  56. Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (3/8)
  57. Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (4/8)
  58. Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (5/8)
  59. Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (6/8)
  60. Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (7/8)
  61. Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (8/8)
  62. Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (1/6)
  63. Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (2/6)
  64. Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (3/6)
  65. Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (4/6)
  66. Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (5/6)
  67. Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (6/6)
  68. Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (1/8)
  69. Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (2/8)
  70. Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (3/8)
  71. Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (4/8)
  72. Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (5/8)
  73. Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (6/8)
  74. Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (7/8)
  75. Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (8/8)
  76. Back Cover

Product information

  • Title: Advances in Biometrics for Secure Human Authentication and Recognition
  • Author(s): Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
  • Release date: December 2013
  • Publisher(s): CRC Press
  • ISBN: 9781466582439