|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-69933-2 |
003 |
DE-He213 |
005 |
20220120152712.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387699332
|9 978-0-387-69933-2
|
024 |
7 |
|
|a 10.1007/978-0-387-69933-2
|2 doi
|
050 |
|
4 |
|a Q337.5
|
050 |
|
4 |
|a TK7882.P3
|
072 |
|
7 |
|a UYQP
|2 bicssc
|
072 |
|
7 |
|a COM016000
|2 bisacsh
|
072 |
|
7 |
|a UYQP
|2 thema
|
082 |
0 |
4 |
|a 006.4
|2 23
|
100 |
1 |
|
|a Shoniregun, Charles A.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Securing Biometrics Applications
|h [electronic resource] /
|c by Charles A. Shoniregun, Stephen Crosier.
|
250 |
|
|
|a 1st ed. 2008.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2008.
|
300 |
|
|
|a XVIII, 190 p. 40 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Research Overview And Biometric Technologies -- Biometrics Measurements -- Applications of Biometrics -- Securing Biometrics Applications -- Critical Evaluation And Discussion -- Conclusion.
|
520 |
|
|
|a Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identity theft and other security issues, society will have to compromise between security and personal freedoms. Securing Biometrics Applications investigates and identifies key impacts of biometric security applications, while discovering opportunities and challenges presented by the biometric technologies available. This volume also includes new biometric measures for national ID card, passport and centralized database system. Securing Biometrics Applications is designed for a professional audience, researchers, and practitioners. This book is suitable for advanced-level students as a secondary text or reference book in computer science. .
|
650 |
|
0 |
|a Pattern recognition systems.
|
650 |
|
0 |
|a Biometric identification.
|
650 |
|
0 |
|a Computer vision.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
|
0 |
|a Human-computer interaction.
|
650 |
1 |
4 |
|a Automated Pattern Recognition.
|
650 |
2 |
4 |
|a Biometrics.
|
650 |
2 |
4 |
|a Computer Vision.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a User Interfaces and Human Computer Interaction.
|
700 |
1 |
|
|a Crosier, Stephen.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441943507
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387517834
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387699325
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-0-387-69933-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|