Biometric Security

Author:   Jiankun Hu ,  David Chek Ling Ngo ,  Andrew Beng Jin Teoh
Publisher:   Cambridge Scholars Publishing
Edition:   Unabridged edition
ISBN:  

9781443871839


Pages:   497
Publication Date:   03 February 2015
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $261.23 Quantity:  
Add to Cart

Share |

Biometric Security


Add your own review!

Overview

Modern biometrics delivers an enhanced level of security by means of a “proof of property”. The design and deployment of a biometric system, however, hide many pitfalls, which, when underestimated, can lead to major security weaknesses and privacy threats. Issues of concern include biometric identity theft and privacy invasion because of the strong connection between a user and his identity. This book showcases a collection of comprehensive references on the advances of biometric security technology. It compiles a total of fourteen articles, all contributed by thirty-two eminent researchers in the field, thus providing concise and accessible coverage of not only general issues, but also state-of-the-art solutions. The book is divided into five parts: (1) Biometric Template Protection, which covers cancellable biometrics and parameter management protocol;(2) Biometric Key and Encryption, focusing on biometric key generation and visual biometric cryptography;(3) Biometric Systems Analysis, dealing with biometric system security, and privacy evaluation and assessment;(4) Privacy-Enhanced Biometric Systems, covering privacy-enhanced biometric system protocol design and implementation; and(5) Other Biometric Security Technologies.The book will be of particular interest to researchers, scholars, graduate students, engineers, practitioners and developers interested in security and privacy-related issues in biometric systems. It will also be attractive to managers of various organizations with strong security needs.

Full Product Details

Author:   Jiankun Hu ,  David Chek Ling Ngo ,  Andrew Beng Jin Teoh
Publisher:   Cambridge Scholars Publishing
Imprint:   Cambridge Scholars Publishing
Edition:   Unabridged edition
Weight:   0.599kg
ISBN:  

9781443871839


ISBN 10:   1443871834
Pages:   497
Publication Date:   03 February 2015
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reviews

Author Information

David Chek Ling Ngo, MA (TCD), BAI (Hons) (TCD), PhD (TCD), FIET, FBCS, SMIEEE, is a Research Professor at Sunway University, Malaysia. As an active academic researcher with research interests in biometric encryption, aesthetic computation, and predictive intelligence, Dr Ngo has authored and co-authored over 120 refereed papers and currently has four patents pending. He is a member of the Editorial Board of the Journal of Universal Computer Science, and has served as the guest editor of a special issue on pattern recognition in biometrics and bioinformatics for the August 2005 issue of the Multimedia Cyberscape Journal. Dr Andrew Beng Jin Teoh is an Associate Professor in the Electrical and Electronic Department at the College of Engineering of Yonsei University, South Korea. His research interests are pattern recognition, machine learning and information security. He has published more than 200 international refereed journal and conference articles, and several book chapters. He is also a regular speaker at conferences, academic institutions, and corporations.Dr Jiankun Hu is Full Professor of Cyber Security at UNSW Canberra (also known as the Australian Defence Force Academy). His research interests include biometrics security, applied cryptography and intrusion detection. He has published numerous articles in these areas in several renowned journals, such as IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, and IEEE Transactions on Information Forensics and Security.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List