Listing 1 - 10 of 80 | << page >> |
Sort by
|
Choose an application
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or
Choose an application
Choose an application
Biometrics is the study of methods for uniquely recognizing humans based on one or more intrinsic physical or behavioral traits. After decades of research activities, biometrics, as a recognized scientific discipline, has advanced considerably both in practical technology and theoretical discovery to meet the increasing need of biometric deployments. In this book, the editors provide both a concise and accessible introduction to the field as well as a detailed coverage on the unique research problems with their solutions in a wide spectrum of biometrics research ranging from voice, face, finge
Choose an application
As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recog
Choose an application
In today's digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progressively complex. This has brought the spotlight on the importance of effective and efficient means of ascertaining an individual's identity. Biometric technologies like fingerprint recognition, face recognition, iris recognition etc. have a long history of use in law enforcement applications and are now
Biometric identification. --- Biometric identification --- Identification --- Technological innovations. --- Data processing.
Choose an application
Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key Features Explore the next iteration of identity protection and overcome real-world challenges Understand different biometric use cases to deploy a large-scale biometric system Curated by renowned security ambassador and experienced author Lisa Bock Book Description Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies. What you will learn Review the advantages and disadvantages of biometric technology Understand the characteristics of an optimal biometric system Discover the uses of biometrics and where they are used Compare different types of errors and see how to tune your system Understand the benefits of multi-factor authentication Work with commonly used biometrics such as face, fingerprint, and iris Analyze a biometric system for usability and accuracy Address privacy concerns and get a glimpse of the future of biometrics Who this book is for Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone invo...
Biometric identification. --- Identification --- Data processing.
Choose an application
Biometric identification --- Privacy, Right of. --- Government policy
Choose an application
Human Recognition in Unconstrained Environments provides a unique picture of the complete ‘in-the-wild’ biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents. Coverage includes: Data hardware architecture fundamentals Background subtraction of humans in outdoor scenes Camera synchronization Biometric traits: Real-time detection and data segmentation Biometric traits: Feature encoding / matching Fusion at different levels Reaction against security incidents Ethical issues in non-cooperative biometric recognition in public spaces With this book readers will learn how to: Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security Choose the most suited biometric traits and recognition methods for uncontrolled settings Evaluate the performance of a biometric system on real world data Presents a complete picture of the biometric recognition processing chain, ranging from data acquisition to the reaction procedures against security incidents Provides specific requirements and issues behind each typical phase of the development of a robust biometric recognition system Includes a contextualization of the ethical/privacy issues behind the development of a covert recognition system which can be used for forensics and security activities
Biometric identification. --- Computer vision. --- Pattern recognition systems.
Choose an application
Biometric identification. --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification
Choose an application
Biometric identification. --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification
Listing 1 - 10 of 80 | << page >> |
Sort by
|