Biometric User Authentication for IT Security
From Fundamentals to Handwriting
Seiten
2010
|
Softcover reprint of hardcover 1st ed. 2006
Springer-Verlag New York Inc.
978-1-4419-3873-2 (ISBN)
Springer-Verlag New York Inc.
978-1-4419-3873-2 (ISBN)
Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.
Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.
Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.
Fundamentals - Overview.- Fundamentals in Biometrics.- Biometric Modalities.- Fundamentals in User Authentication.- Handwriting Biometrics - Overview.- Evaluating Handwriting Biometrics.- Biometric Hash.- User Verification.
Erscheint lt. Verlag | 25.11.2010 |
---|---|
Reihe/Serie | Advances in Information Security ; 18 |
Zusatzinfo | XII, 284 p. |
Verlagsort | New York, NY |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Grafik / Design ► Digitale Bildverarbeitung |
Informatik ► Software Entwicklung ► User Interfaces (HCI) | |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
ISBN-10 | 1-4419-3873-7 / 1441938737 |
ISBN-13 | 978-1-4419-3873-2 / 9781441938732 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
alles zum Drucken, Scannen, Modellieren
Buch | Softcover (2024)
Markt + Technik Verlag
24,95 €
Modelle für 3D-Druck und CNC entwerfen
Buch | Softcover (2022)
dpunkt (Verlag)
34,90 €