|
![]() |
|||
|
||||
OverviewIn a complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great challenge. Since the conventional technology of using a ""personal identification number"" (PIN) or password hardly meets the requirements of an authentication system, biometric-based authentication is emerging as the most reliable method. This text provides a collection of 16 chapters containing tutorial articles and other material in a unified manner. It covers the basic concepts, theories and characteristic features of integrating/formulating different facets of biometric solutions for authentication, with recent developments and significant applications in an e-world. It provides the reader with a basic concept of biometrics and an in-depth discussion exploring biometric technologies in various applications in an e-world. It also includes a detailed description of typical biometric-based security systems and coverage of how these issues are developed. Full Product DetailsAuthor: David D. ZhangPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2002 ed. Volume: 697 Dimensions: Width: 15.50cm , Height: 2.50cm , Length: 23.50cm Weight: 1.830kg ISBN: 9781402071423ISBN 10: 1402071426 Pages: 451 Publication Date: 31 August 2002 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1 Biometrics Applications in An E-world.- 1.1 Biometrics Technologies.- 1.2 Biometrics Systems.- 1.3 Biometrics Applications.- 1.4 Organization of the Book.- 2 Achievements and Challenges in Fingerprint Recognition.- 2.1 Introduction.- 2.2 Fingerprint Recognition Issues.- 2.3 Applications.- 2.4 Fingerprint Recognition Methods and Algorithms.- 2.5 Discussion.- 2.6 Conclusions.- 3 Biometrics Electronic Purse.- 3.1 Introduction.- 3.2 Smart-Card Technology.- 3.3 Biometric Methodologies.- 3.4 Design of Biometrics Electronic Purse.- 3.5 Conclusions.- 4 Face Recognition and Its Application.- 4.1 Introduction.- 4.2 Face as a BiometriC.- 4.3 The Technology of Face Recognition.- 4.4 Privacy Issues.- 4.5 Application Domain.- 4.6 The IBM Face Recognition System.- 4.7 Conclusions.- 5 Personalize Mobile Access by Speaker Authentication.- 5.1 Introduction.- 5.2 Bilateral User Authentication Framework.- 5.3 Enabling Speaker Authentication Technologies.- 5.4 Simulations.- 5.5 Conclusions.- 6 Biometrics on the Internet: Security Application and Services.- 6.1 Introduction.- 6.2 Communications Networks and Internet.- 6.3 Biometrics.- 6.4 The Personal Identification Network: Biometrics Services via the Internet.- 6.5 Other Biometric Topics in Internet Applications.- 6.6 Conclusions and Future Trends.- 7 Forensic Identification Reporting Using Automatic Biometric Systems.- 7.1 Introduction.- 7.2 Biometric Systems and Classical Forensic Reporting.- 7.3 Bayesian Analysis of Forensic Evidence.- 7.4 Assessment of Forensic Biometric Systems.- 7.5 Case Study: Forensic Speaker Recognition.- 7.6 Conclusions.- 8 Signature Security System for E-commerce.- 8.1 Introduction.- 8.2 Literature Overview.- 8.3 A Typical On-Line Signature Verification System.- 8.4 Proposed On-Line Dynamic Signature Verification Applications.- 8.5 Conclusions.- 9 Web Guard: A Biometrics Identification System for Network Security.- 9.1 Introduction.- 9.2 Biometrics Data Warehouse.- 9.3 Dynamic Feature Selection.- 9.4 Hierarchical Search.- 9.5 Robust Classification via Fuzzy Neural Network.- 9.6 System Implementation.- 9.7 Experimental Results.- 9.8 Conclusions.- 10 Smart Card Application Based on Palmprint Identification.- 10.1 Introduction.- 10.2 On-line Palmprint Identification System.- 10.3 Smart Card Architecture.- 10.4 System Analysis and Applications.- 10.5 Conclusions.- 11 Secure Fingerprint Authentication.- 11.1 Introduction.- 11.2 Biometrics-Based Authentication Systems.- 11.3 Fingerprint Recognition.- 11.4 Techniques to Improve Security.- 11.5 Conclusions.- 12 From Biometrics Technology to Applications Regarding Face, Voice, Signature and Fingerprint Recognition Systems.- 12.1 Introduction.- 12.2 Automatic Speaker Recognition.- 12.3 Automatic Face Recognition.- 12.4 Minutiae-Based Fingerprint Recognition Systems.- 12.5 On-Line HMM-Based Signature Verification System.- 12.6 Multimodality in Biometric Systems.- 12.7 From Technology to Applications.- 13 Face Verification for Access Control.- 13.1 Introduction.- 13.2 Face Detection.- 13.3 Face Verification.- 13.4 Major Challenges.- 13.5 An Example Access Control System Based on Eigenface.- 13.6 Commercial Systems and Performance Evalutation.- 13.7 Summary and Conclusions.- 14 Voice Biometrics for Securing Your Web-Based Business.- 14.1 Introduction.- 14.2 Speaker Verification.- 14.3 Business Opportunities on the Web using Speaker Verification.- 14.4 SpeakEZ Web Authentication Service.- 14.5 Speaker Verification Performance.- 14.6 Summary.- 15 Ability to Verify: A Metric for System Performance in Real-World Comparative Biometric Testing.- 15.1 Introduction.- 15.2 Test Methodology.- 15.3 High-level Test Results.- 15.4 Ability to Verify (ATV).- 15.5 Vendor-generated Test Results.- 15.6 Conclusions.- 16 Automated Authentication Using Hybrid Biometric System.- 16.1 The State of the Art.- 16.2 A Hybrid Biometric Person Authentication Prototype.- 16.3 Database, Tests and Results.- 16.4 Hybrid Biometric Applications.- 16.5 Conclusions.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |