000 03512nam a22005655i 4500
001 978-0-387-28094-3
003 DE-He213
005 20161121230517.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 _a9780387280943
_9978-0-387-28094-3
024 7 _a10.1007/0-387-28094-4
_2doi
050 4 _aQ337.5
050 4 _aTK7882.P3
072 7 _aUYQP
_2bicssc
072 7 _aCOM016000
_2bisacsh
082 0 4 _a006.4
_223
100 1 _aVielhauer, Claus.
_eauthor.
245 1 0 _aBiometric User Authentication for it Security
_h[electronic resource] :
_bFrom Fundamentals to Handwriting /
_cby Claus Vielhauer.
264 1 _aBoston, MA :
_bSpringer US,
_c2006.
300 _aXII, 284 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v18
505 0 _aFundamentals - Overview -- Fundamentals in Biometrics -- Biometric Modalities -- Fundamentals in User Authentication -- Handwriting Biometrics - Overview -- Evaluating Handwriting Biometrics -- Biometric Hash -- User Verification.
520 _aBiometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security.
650 0 _aComputer science.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aMultimedia information systems.
650 0 _aUser interfaces (Computer systems).
650 0 _aImage processing.
650 0 _aPattern recognition.
650 1 4 _aComputer Science.
650 2 4 _aPattern Recognition.
650 2 4 _aImage Processing and Computer Vision.
650 2 4 _aData Encryption.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aUser Interfaces and Human Computer Interaction.
650 2 4 _aMultimedia Information Systems.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387261942
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v18
856 4 0 _uhttp://dx.doi.org/10.1007/0-387-28094-4
912 _aZDB-2-SCS
950 _aComputer Science (Springer-11645)
999 _c499848
_d499848