Book description
Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human authentication and recognition.
Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional techniques as well as novel systems that have been developed over the past few years. It presents new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems.
Filled with comprehensive graphical and modular illustrations, the text covers applications of affective computing in biometrics, matching sketch to photograph, cryptography approaches in biometrics, biometrics alteration, heterogeneous biometrics, and age invariant biometrics. It also presents biometrics algorithms with novel feature extraction techniques, computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems.
Containing the work of some of the world’s most respected biometrics researchers, the book includes model question papers, mathematical notations, and exercises to reinforce understanding. Providing an up-to-date review of intelligence techniques and theories used in biometric technologies for secure human authentication and identification, this is an essential reference for researchers, scholars, graduate students, engineers, practitioners, and developers in the field of biometrics and its related fields.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- List of Figures (1/2)
- List of Figures (2/2)
- List of Tables
- Preface
- Contributors
- Chapter 1: Security and Reliability Assessment for Biometric Systems (1/6)
- Chapter 1: Security and Reliability Assessment for Biometric Systems (2/6)
- Chapter 1: Security and Reliability Assessment for Biometric Systems (3/6)
- Chapter 1: Security and Reliability Assessment for Biometric Systems (4/6)
- Chapter 1: Security and Reliability Assessment for Biometric Systems (5/6)
- Chapter 1: Security and Reliability Assessment for Biometric Systems (6/6)
- Chapter 2: Review of Human Recognition Based on Retinal Images (1/8)
- Chapter 2: Review of Human Recognition Based on Retinal Images (2/8)
- Chapter 2: Review of Human Recognition Based on Retinal Images (3/8)
- Chapter 2: Review of Human Recognition Based on Retinal Images (4/8)
- Chapter 2: Review of Human Recognition Based on Retinal Images (5/8)
- Chapter 2: Review of Human Recognition Based on Retinal Images (6/8)
- Chapter 2: Review of Human Recognition Based on Retinal Images (7/8)
- Chapter 2: Review of Human Recognition Based on Retinal Images (8/8)
- Chapter 3: Visual Speech as Behavioral Biometric (1/5)
- Chapter 3: Visual Speech as Behavioral Biometric (2/5)
- Chapter 3: Visual Speech as Behavioral Biometric (3/5)
- Chapter 3: Visual Speech as Behavioral Biometric (4/5)
- Chapter 3: Visual Speech as Behavioral Biometric (5/5)
- Chapter 4: Human Gait Signature for Biometric Authentication (1/6)
- Chapter 4: Human Gait Signature for Biometric Authentication (2/6)
- Chapter 4: Human Gait Signature for Biometric Authentication (3/6)
- Chapter 4: Human Gait Signature for Biometric Authentication (4/6)
- Chapter 4: Human Gait Signature for Biometric Authentication (5/6)
- Chapter 4: Human Gait Signature for Biometric Authentication (6/6)
- Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (1/7)
- Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (2/7)
- Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (3/7)
- Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (4/7)
- Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (5/7)
- Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (6/7)
- Chapter 5: Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier (7/7)
- Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (1/5)
- Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (2/5)
- Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (3/5)
- Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (4/5)
- Chapter 6: On Deciding the Dynamic Periocular Boundary for Human Recognition (5/5)
- Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (1/8)
- Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (2/8)
- Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (3/8)
- Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (4/8)
- Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (5/8)
- Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (6/8)
- Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (7/8)
- Chapter 7: Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System (8/8)
- Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (1/8)
- Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (2/8)
- Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (3/8)
- Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (4/8)
- Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (5/8)
- Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (6/8)
- Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (7/8)
- Chapter 8: Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis (8/8)
- Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (1/6)
- Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (2/6)
- Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (3/6)
- Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (4/6)
- Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (5/6)
- Chapter 9: Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway (6/6)
- Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (1/8)
- Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (2/8)
- Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (3/8)
- Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (4/8)
- Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (5/8)
- Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (6/8)
- Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (7/8)
- Chapter 10: Biometric Identification: Device Specification and Actual Performance Considered for Operations of the Unique Identity Authority of India (8/8)
- Back Cover
Product information
- Title: Advances in Biometrics for Secure Human Authentication and Recognition
- Author(s):
- Release date: December 2013
- Publisher(s): CRC Press
- ISBN: 9781466582439
You might also like
book
Biometrics for Network Security
The complete guide to implementing biometric security solutions for your network Network security has become the …
book
Biometric Authentication: A Machine Learning Approach
A breakthrough approach to improving biometrics performance Constructing robust information processing systems for face and voice …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Assessing Network Security
Help beat the hackers at their own game! Discover how to take charge of system assets …