Biometrics in Identity Management : Concepts to Applications.
In today's digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progr...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Norwood :
Artech House,
2011.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Biometrics in Identity Management: Concepts to Applications; Contents; CHAPTER 1 Introduction; 1.1 Basics of Biometrics; 1.2 Types of Biometric Technologies; 1.3 Biometric System; 1.4 Biometric System Processes; 1.5 Biometric System Architecture; 1.6 Applications of Biometric Technologies; 1.7 Classification of Biometric Applications; 1.8 Summary; CHAPTER 2 Fundamentals of Technical Evaluations; 2.1 System Process Transactions; 2.2 Types of Errors; 2.2.1 Acquisition Errors; 2.2.2 Matching Errors; 2.3 Performance Metrics; 2.3.1 Failure to Enroll Rate (FTE); 2.3.2 Failure to Acquire Rate (FTA).
- 2.3.3 False Nonmatch Rate (FNMR)2.3.4 False Match Rate (FMR); 2.3.5 Verification Performance Metrics; 2.3.6 Identification Performance Metrics; 2.4 Type I and Type II Errors; 2.5 Performance Curves; 2.6 User-Specific Performance: Zoo Analysis; 2.7 Evaluation Testing Methodologies; 2.7.1 Technology Evaluation; 2.7.2 Scenario Evaluation; 2.7.3 Operational Evaluation; 2.8 Design of Evaluation; 2.8.1 Sample Quality; 2.9 Reporting Biometric Evaluations; 2.10 Summary; CHAPTER 3 Fingerprint Recognition; 3.1 Fingerprint Anatomy; 3.2 History; 3.3.1 Henry Classification.
- 3.2.2 Automated Fingerprint Recognition3.3 Fingerprint Presentation and Acquisition; 3.3.1 Inked Capture; 3.3.2 Latent Fingerprints; 3.3.3 Optical Sensors; 3.3.4 Solid State Capacitive Sensors; 3.3.5 RF Sensor; 3.3.6 Thermal Fingerprint Sensor; 3.3.7 Electro-Optical Sensor; 3.3.8 Multispectral Imaging Sensor; 3.3.9 Other Technologies; 3.3.10 Limitations of Acquisition Technologies; 3.3.11 Fingerprint Impressions; 3.4 Fingerprint Feature Extraction; 3.4.1 Quality Assessment; 3.5 Fingerprint Compression; 3.6 Fingerprint Feature Matching; 3.7 Classification and Indexing.
- 3.8 Synthetic Fingerprint Generation3.9 Automated Fingerprint Identification System (AFIS); 3.10 Standards; 3.11 Evaluations; 3.11.1 Fingerprint Vendor Technology Evaluation (FpVTE); 3.11.2 Minutiae Interoperability Exchange (MINEX); 3.11.3 Minutiae Template Interoperability Test (MTIT); 3.11.4 Fingerprint Verification Competition (FVC); 3.11.5 Slap Fingerprint Segmentation Evaluations; 3.12 Applications and Trends; 3.12.1 Integrated Automated Fingerprint Identification System (IAFIS); 3.12.2 Personal Identity Verification (PIV); 3.12.3 US-VISIT; 3.13 Design and Deployment Considerations.
- 3.13.1 User Interaction3.13.2 Environment Issues; 3.13.3 User Demographics; 3.13.4 Interoperability; 3.13.5 Spoofing Attacks; 3.13.6 Large-Scale Systems; 3.14 Summary; CHAPTER 4 Face Recognition; 4.1 History; 4.2 2-D Face Recognition; 4.2.1 2-D Face Image Acquisition, Detection, and Segmentation; 4.2.2 Quality Assessment; 4.2.3 2-D Face Feature Extraction and Matching; 4.2.4 Video Surveillance; 4.2.5 Beyond the Visible Spectrum; 4.3 3-D Face Recognition; 4.3.1 Face Acquisition; 4.3.2 3-D Face Modeling and Matching; 4.4 Standards; 4.5 Evaluations.