Normal view MARC view ISBD view

Biometric User Authentication for it Security [electronic resource] :From Fundamentals to Handwriting / by Claus Vielhauer.

by Vielhauer, Claus [author.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Advances in Information Security: 18Publisher: Boston, MA : Springer US, 2006.Description: XII, 284 p. online resource.ISBN: 9780387280943.Subject(s): Computer science | Data structures (Computer science) | Data encryption (Computer science) | Multimedia systems | Computer vision | Optical pattern recognition | Computer Science | Pattern Recognition | Image Processing and Computer Vision | Data Encryption | Data Structures, Cryptology and Information Theory | User Interfaces and Human Computer Interaction | Multimedia Information SystemsDDC classification: 006.4 Online resources: Click here to access online
Contents:
Fundamentals - Overview -- Fundamentals in Biometrics -- Biometric Modalities -- Fundamentals in User Authentication -- Handwriting Biometrics - Overview -- Evaluating Handwriting Biometrics -- Biometric Hash -- User Verification.
In: Springer eBooksSummary: Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)

Fundamentals - Overview -- Fundamentals in Biometrics -- Biometric Modalities -- Fundamentals in User Authentication -- Handwriting Biometrics - Overview -- Evaluating Handwriting Biometrics -- Biometric Hash -- User Verification.

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha