ISBN: 9781461353713
In today's complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great challenge. Since the conventional techno… Mehr…
BarnesandNoble.com MPN: , SKU 9781461353713 Versandkosten:zzgl. Versandkosten Details... |
ISBN: 9781461353713
In today''s complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great challenge. Since the conventional techn… Mehr…
Indigo.ca new in stock. Versandkosten:zzgl. Versandkosten. Details... |
ISBN: 9781461353713
Computer Science; Data Encryption; Theory of Computation; Management of Computing and Information Systems; The Computing Profession; e-Commerce/e-business E-Commerce, Signatur, Web, algor… Mehr…
Springer.com Versandkosten:zzgl. Versandkosten. Details... |
2012, ISBN: 9781461353713
For Authentication in an E-World, Softcover reprint of the original 1st ed. 2002, Softcover, Buch, [PU: Springer-Verlag New York Inc.]
lehmanns.de Versandkosten:Versand in 7-9 Tagen, , Versandkostenfrei innerhalb der BRD. (EUR 13.95) Details... |
2012, ISBN: 9781461353713
Softcover reprint of the original 1st ed. 2002, Softcover, Buch, [PU: Springer-Verlag New York Inc.]
lehmanns.de Versandkosten:Versand in 7-9 Tagen, , Versandkostenfrei innerhalb der BRD (EUR 0.00) Details... |
ISBN: 9781461353713
In today's complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great challenge. Since the conventional techno… Mehr…
ISBN: 9781461353713
In today''s complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great challenge. Since the conventional techn… Mehr…
ISBN: 9781461353713
Computer Science; Data Encryption; Theory of Computation; Management of Computing and Information Systems; The Computing Profession; e-Commerce/e-business E-Commerce, Signatur, Web, algor… Mehr…
2012, ISBN: 9781461353713
For Authentication in an E-World, Softcover reprint of the original 1st ed. 2002, Softcover, Buch, [PU: Springer-Verlag New York Inc.]
2012, ISBN: 9781461353713
Softcover reprint of the original 1st ed. 2002, Softcover, Buch, [PU: Springer-Verlag New York Inc.]
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Biometric Solutions: For Authentication In An E-world
EAN (ISBN-13): 9781461353713
Taschenbuch
Erscheinungsjahr: 2012
Herausgeber: Springer US
Buch in der Datenbank seit 2014-10-09T22:46:48+02:00 (Berlin)
Detailseite zuletzt geändert am 2021-02-10T18:13:49+01:00 (Berlin)
ISBN/EAN: 9781461353713
ISBN - alternative Schreibweisen:
978-1-4613-5371-3
Daten vom Verlag:
Autor/in: David D. Zhang
Titel: The Springer International Series in Engineering and Computer Science; Biometric Solutions - For Authentication in an E-World
Verlag: Springer; Springer US
451 Seiten
Erscheinungsjahr: 2012-10-23
New York; NY; US
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
160,49 € (DE)
164,99 € (AT)
177,00 CHF (CH)
POD
XIV, 451 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; E-Commerce; Signatur; Web; algorithms; architecture; biometrics; computer science; internet; security; Cryptology; Theory of Computation; IT Operations; The Computing Profession; e-Commerce and e-Business; Kryptografie, Verschlüsselungstechnologie; Theoretische Informatik; Wirtschaftsmathematik und -informatik, IT-Management; Informationstechnik (IT), allgemeine Themen; Computer-Anwendungen in den Sozial- und Verhaltenswissenschaften; E-Commerce: geschäftliche Aspekte; BB; EA
1 Biometrics Applications in An E-world.- 1.1 Biometrics Technologies.- 1.2 Biometrics Systems.- 1.3 Biometrics Applications.- 1.4 Organization of the Book.- 2 Achievements and Challenges in Fingerprint Recognition.- 2.1 Introduction.- 2.2 Fingerprint Recognition Issues.- 2.3 Applications.- 2.4 Fingerprint Recognition Methods and Algorithms.- 2.5 Discussion.- 2.6 Conclusions.- 3 Biometrics Electronic Purse.- 3.1 Introduction.- 3.2 Smart-Card Technology.- 3.3 Biometric Methodologies.- 3.4 Design of Biometrics Electronic Purse.- 3.5 Conclusions.- 4 Face Recognition and Its Application.- 4.1 Introduction.- 4.2 Face as a BiometriC.- 4.3 The Technology of Face Recognition.- 4.4 Privacy Issues.- 4.5 Application Domain.- 4.6 The IBM Face Recognition System.- 4.7 Conclusions.- 5 Personalize Mobile Access by Speaker Authentication.- 5.1 Introduction.- 5.2 Bilateral User Authentication Framework.- 5.3 Enabling Speaker Authentication Technologies.- 5.4 Simulations.- 5.5 Conclusions.- 6 Biometrics on the Internet: Security Application and Services.- 6.1 Introduction.- 6.2 Communications Networks and Internet.- 6.3 Biometrics.- 6.4 The Personal Identification Network: Biometrics Services via the Internet.- 6.5 Other Biometric Topics in Internet Applications.- 6.6 Conclusions and Future Trends.- 7 Forensic Identification Reporting Using Automatic Biometric Systems.- 7.1 Introduction.- 7.2 Biometric Systems and Classical Forensic Reporting.- 7.3 Bayesian Analysis of Forensic Evidence.- 7.4 Assessment of Forensic Biometric Systems.- 7.5 Case Study: Forensic Speaker Recognition.- 7.6 Conclusions.- 8 Signature Security System for E-commerce.- 8.1 Introduction.- 8.2 Literature Overview.- 8.3 A Typical On-Line Signature Verification System.- 8.4 Proposed On-Line Dynamic Signature Verification Applications.- 8.5 Conclusions.- 9 Web Guard: A Biometrics Identification System for Network Security.- 9.1 Introduction.- 9.2 Biometrics Data Warehouse.- 9.3 Dynamic Feature Selection.- 9.4 Hierarchical Search.- 9.5 Robust Classification via Fuzzy Neural Network.- 9.6 System Implementation.- 9.7 Experimental Results.- 9.8 Conclusions.- 10 Smart Card Application Based on Palmprint Identification.- 10.1 Introduction.- 10.2 On-line Palmprint Identification System.- 10.3 Smart Card Architecture.- 10.4 System Analysis and Applications.- 10.5 Conclusions.- 11 Secure Fingerprint Authentication.- 11.1 Introduction.- 11.2 Biometrics-Based Authentication Systems.- 11.3 Fingerprint Recognition.- 11.4 Techniques to Improve Security.- 11.5 Conclusions.- 12 From Biometrics Technology to Applications Regarding Face, Voice, Signature and Fingerprint Recognition Systems.- 12.1 Introduction.- 12.2 Automatic Speaker Recognition.- 12.3 Automatic Face Recognition.- 12.4 Minutiae-Based Fingerprint Recognition Systems.- 12.5 On-Line HMM-Based Signature Verification System.- 12.6 Multimodality in Biometric Systems.- 12.7 From Technology to Applications.- 13 Face Verification for Access Control.- 13.1 Introduction.- 13.2 Face Detection.- 13.3 Face Verification.- 13.4 Major Challenges.- 13.5 An Example Access Control System Based on Eigenface.- 13.6 Commercial Systems and Performance Evalutation.- 13.7 Summary and Conclusions.- 14 Voice Biometrics for Securing Your Web-Based Business.- 14.1 Introduction.- 14.2 Speaker Verification.- 14.3 Business Opportunities on the Web using Speaker Verification.- 14.4 SpeakEZ Web Authentication Service.- 14.5 Speaker Verification Performance.- 14.6 Summary.- 15 Ability to Verify: A Metric for System Performance in Real-World Comparative Biometric Testing.- 15.1 Introduction.- 15.2 Test Methodology.- 15.3 High-level Test Results.- 15.4 Ability to Verify (ATV).- 15.5 Vendor-generated Test Results.- 15.6 Conclusions.- 16 Automated Authentication Using Hybrid Biometric System.- 16.1 The State of the Art.- 16.2 A Hybrid Biometric Person Authentication Prototype.- 16.3 Database, Tests and Results.- 16.4 Hybrid Biometric Applications.- 16.5 Conclusions.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9781461510536 Biometric Solutions (>100)
< zum Archiv...