000 | 03512nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-0-387-28094-3 | ||
003 | DE-He213 | ||
005 | 20161121230517.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 xxu| s |||| 0|eng d | ||
020 |
_a9780387280943 _9978-0-387-28094-3 |
||
024 | 7 |
_a10.1007/0-387-28094-4 _2doi |
|
050 | 4 | _aQ337.5 | |
050 | 4 | _aTK7882.P3 | |
072 | 7 |
_aUYQP _2bicssc |
|
072 | 7 |
_aCOM016000 _2bisacsh |
|
082 | 0 | 4 |
_a006.4 _223 |
100 | 1 |
_aVielhauer, Claus. _eauthor. |
|
245 | 1 | 0 |
_aBiometric User Authentication for it Security _h[electronic resource] : _bFrom Fundamentals to Handwriting / _cby Claus Vielhauer. |
264 | 1 |
_aBoston, MA : _bSpringer US, _c2006. |
|
300 |
_aXII, 284 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v18 |
|
505 | 0 | _aFundamentals - Overview -- Fundamentals in Biometrics -- Biometric Modalities -- Fundamentals in User Authentication -- Handwriting Biometrics - Overview -- Evaluating Handwriting Biometrics -- Biometric Hash -- User Verification. | |
520 | _aBiometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aMultimedia information systems. | |
650 | 0 | _aUser interfaces (Computer systems). | |
650 | 0 | _aImage processing. | |
650 | 0 | _aPattern recognition. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aPattern Recognition. |
650 | 2 | 4 | _aImage Processing and Computer Vision. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aUser Interfaces and Human Computer Interaction. |
650 | 2 | 4 | _aMultimedia Information Systems. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9780387261942 |
830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v18 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/0-387-28094-4 |
912 | _aZDB-2-SCS | ||
950 | _aComputer Science (Springer-11645) | ||
999 |
_c499848 _d499848 |