Biometric Solutions
Springer-Verlag New York Inc.
978-1-4020-7142-3 (ISBN)
1 Biometrics Applications in An E-world.- 1.1 Biometrics Technologies.- 1.2 Biometrics Systems.- 1.3 Biometrics Applications.- 1.4 Organization of the Book.- 2 Achievements and Challenges in Fingerprint Recognition.- 2.1 Introduction.- 2.2 Fingerprint Recognition Issues.- 2.3 Applications.- 2.4 Fingerprint Recognition Methods and Algorithms.- 2.5 Discussion.- 2.6 Conclusions.- 3 Biometrics Electronic Purse.- 3.1 Introduction.- 3.2 Smart-Card Technology.- 3.3 Biometric Methodologies.- 3.4 Design of Biometrics Electronic Purse.- 3.5 Conclusions.- 4 Face Recognition and Its Application.- 4.1 Introduction.- 4.2 Face as a BiometriC.- 4.3 The Technology of Face Recognition.- 4.4 Privacy Issues.- 4.5 Application Domain.- 4.6 The IBM Face Recognition System.- 4.7 Conclusions.- 5 Personalize Mobile Access by Speaker Authentication.- 5.1 Introduction.- 5.2 Bilateral User Authentication Framework.- 5.3 Enabling Speaker Authentication Technologies.- 5.4 Simulations.- 5.5 Conclusions.- 6 Biometrics on the Internet: Security Application and Services.- 6.1 Introduction.- 6.2 Communications Networks and Internet.- 6.3 Biometrics.- 6.4 The Personal Identification Network: Biometrics Services via the Internet.- 6.5 Other Biometric Topics in Internet Applications.- 6.6 Conclusions and Future Trends.- 7 Forensic Identification Reporting Using Automatic Biometric Systems.- 7.1 Introduction.- 7.2 Biometric Systems and Classical Forensic Reporting.- 7.3 Bayesian Analysis of Forensic Evidence.- 7.4 Assessment of Forensic Biometric Systems.- 7.5 Case Study: Forensic Speaker Recognition.- 7.6 Conclusions.- 8 Signature Security System for E-commerce.- 8.1 Introduction.- 8.2 Literature Overview.- 8.3 A Typical On-Line Signature Verification System.- 8.4 Proposed On-Line Dynamic Signature Verification Applications.- 8.5 Conclusions.- 9 Web Guard: A Biometrics Identification System for Network Security.- 9.1 Introduction.- 9.2 Biometrics Data Warehouse.- 9.3 Dynamic Feature Selection.- 9.4 Hierarchical Search.- 9.5 Robust Classification via Fuzzy Neural Network.- 9.6 System Implementation.- 9.7 Experimental Results.- 9.8 Conclusions.- 10 Smart Card Application Based on Palmprint Identification.- 10.1 Introduction.- 10.2 On-line Palmprint Identification System.- 10.3 Smart Card Architecture.- 10.4 System Analysis and Applications.- 10.5 Conclusions.- 11 Secure Fingerprint Authentication.- 11.1 Introduction.- 11.2 Biometrics-Based Authentication Systems.- 11.3 Fingerprint Recognition.- 11.4 Techniques to Improve Security.- 11.5 Conclusions.- 12 From Biometrics Technology to Applications Regarding Face, Voice, Signature and Fingerprint Recognition Systems.- 12.1 Introduction.- 12.2 Automatic Speaker Recognition.- 12.3 Automatic Face Recognition.- 12.4 Minutiae-Based Fingerprint Recognition Systems.- 12.5 On-Line HMM-Based Signature Verification System.- 12.6 Multimodality in Biometric Systems.- 12.7 From Technology to Applications.- 13 Face Verification for Access Control.- 13.1 Introduction.- 13.2 Face Detection.- 13.3 Face Verification.- 13.4 Major Challenges.- 13.5 An Example Access Control System Based on Eigenface.- 13.6 Commercial Systems and Performance Evalutation.- 13.7 Summary and Conclusions.- 14 Voice Biometrics for Securing Your Web-Based Business.- 14.1 Introduction.- 14.2 Speaker Verification.- 14.3 Business Opportunities on the Web using Speaker Verification.- 14.4 SpeakEZ Web Authentication Service.- 14.5 Speaker Verification Performance.- 14.6 Summary.- 15 Ability to Verify: A Metric for System Performance in Real-World Comparative Biometric Testing.- 15.1 Introduction.- 15.2 Test Methodology.- 15.3 High-level Test Results.- 15.4 Ability to Verify (ATV).- 15.5 Vendor-generated Test Results.- 15.6 Conclusions.- 16 Automated Authentication Using Hybrid Biometric System.- 16.1 The State of the Art.- 16.2 A Hybrid Biometric Person Authentication Prototype.- 16.3 Database, Tests and Results.- 16.4 Hybrid Biometric Applications.- 16.5 Conclusions.
Reihe/Serie | The Springer International Series in Engineering and Computer Science ; 697 |
---|---|
Zusatzinfo | XIV, 451 p. |
Verlagsort | New York, NY |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 1-4020-7142-6 / 1402071426 |
ISBN-13 | 978-1-4020-7142-3 / 9781402071423 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich