Cargando…

Biometric User Authentication for IT Security From Fundamentals to Handwriting /

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans....

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Vielhauer, Claus (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Advances in Information Security, 18
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-0-387-28094-3
003 DE-He213
005 20220116203918.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 |a 9780387280943  |9 978-0-387-28094-3 
024 7 |a 10.1007/0-387-28094-4  |2 doi 
050 4 |a Q337.5 
050 4 |a TK7882.P3 
072 7 |a UYQP  |2 bicssc 
072 7 |a COM016000  |2 bisacsh 
072 7 |a UYQP  |2 thema 
082 0 4 |a 006.4  |2 23 
100 1 |a Vielhauer, Claus.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Biometric User Authentication for IT Security  |h [electronic resource] :  |b From Fundamentals to Handwriting /  |c by Claus Vielhauer. 
250 |a 1st ed. 2006. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2006. 
300 |a XII, 284 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 2512-2193 ;  |v 18 
505 0 |a Fundamentals - Overview -- Fundamentals in Biometrics -- Biometric Modalities -- Fundamentals in User Authentication -- Handwriting Biometrics - Overview -- Evaluating Handwriting Biometrics -- Biometric Hash -- User Verification. 
520 |a Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security. 
650 0 |a Pattern recognition systems. 
650 0 |a Computer vision. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a User interfaces (Computer systems). 
650 0 |a Human-computer interaction. 
650 0 |a Multimedia systems. 
650 1 4 |a Automated Pattern Recognition. 
650 2 4 |a Computer Vision. 
650 2 4 |a Cryptology. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a User Interfaces and Human Computer Interaction. 
650 2 4 |a Multimedia Information Systems. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781441938732 
776 0 8 |i Printed edition:  |z 9780387507842 
776 0 8 |i Printed edition:  |z 9780387261942 
830 0 |a Advances in Information Security,  |x 2512-2193 ;  |v 18 
856 4 0 |u https://doi.uam.elogim.com/10.1007/0-387-28094-4  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)