Biometric Solutions: For Authentication in an E-World: The Springer International Series in Engineering and Computer Science, cartea 697
Editat de David D. Zhangen Limba Engleză Paperback – 23 oct 2012
Din seria The Springer International Series in Engineering and Computer Science
- 20%
Preț: 594.49 lei - 20%
Preț: 1847.13 lei - 20%
Preț: 1228.27 lei - 24%
Preț: 866.26 lei - 18%
Preț: 609.91 lei - 20%
Preț: 618.64 lei - 18%
Preț: 744.67 lei - 20%
Preț: 569.56 lei - 18%
Preț: 1177.92 lei - 18%
Preț: 921.36 lei - 20%
Preț: 621.14 lei - 18%
Preț: 906.17 lei - 20%
Preț: 621.64 lei - 15%
Preț: 612.85 lei - 20%
Preț: 618.96 lei - 18%
Preț: 912.40 lei - 20%
Preț: 619.58 lei - 20%
Preț: 950.07 lei - 20%
Preț: 621.01 lei - 18%
Preț: 910.11 lei - 20%
Preț: 950.72 lei - 18%
Preț: 919.85 lei - 20%
Preț: 620.07 lei - 15%
Preț: 617.89 lei - 18%
Preț: 913.32 lei - 18%
Preț: 1173.85 lei - 18%
Preț: 920.45 lei - 15%
Preț: 619.12 lei - 18%
Preț: 911.64 lei - 18%
Preț: 910.58 lei - 20%
Preț: 1234.64 lei - 20%
Preț: 1715.99 lei - 20%
Preț: 1235.72 lei - 20%
Preț: 957.20 lei
Preț: 915.58 lei
Preț vechi: 1116.57 lei
-18% Nou
Puncte Express: 1373
Preț estimativ în valută:
162.02€ • 189.98$ • 142.28£
162.02€ • 189.98$ • 142.28£
Carte tipărită la comandă
Livrare economică 06-20 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781461353713
ISBN-10: 1461353718
Pagini: 468
Ilustrații: XIV, 451 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.65 kg
Ediția:Softcover reprint of the original 1st ed. 2002
Editura: Springer Us
Colecția Springer
Seria The Springer International Series in Engineering and Computer Science
Locul publicării:New York, NY, United States
ISBN-10: 1461353718
Pagini: 468
Ilustrații: XIV, 451 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.65 kg
Ediția:Softcover reprint of the original 1st ed. 2002
Editura: Springer Us
Colecția Springer
Seria The Springer International Series in Engineering and Computer Science
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1 Biometrics Applications in An E-world.- 1.1 Biometrics Technologies.- 1.2 Biometrics Systems.- 1.3 Biometrics Applications.- 1.4 Organization of the Book.- 2 Achievements and Challenges in Fingerprint Recognition.- 2.1 Introduction.- 2.2 Fingerprint Recognition Issues.- 2.3 Applications.- 2.4 Fingerprint Recognition Methods and Algorithms.- 2.5 Discussion.- 2.6 Conclusions.- 3 Biometrics Electronic Purse.- 3.1 Introduction.- 3.2 Smart-Card Technology.- 3.3 Biometric Methodologies.- 3.4 Design of Biometrics Electronic Purse.- 3.5 Conclusions.- 4 Face Recognition and Its Application.- 4.1 Introduction.- 4.2 Face as a BiometriC.- 4.3 The Technology of Face Recognition.- 4.4 Privacy Issues.- 4.5 Application Domain.- 4.6 The IBM Face Recognition System.- 4.7 Conclusions.- 5 Personalize Mobile Access by Speaker Authentication.- 5.1 Introduction.- 5.2 Bilateral User Authentication Framework.- 5.3 Enabling Speaker Authentication Technologies.- 5.4 Simulations.- 5.5 Conclusions.- 6 Biometrics on the Internet: Security Application and Services.- 6.1 Introduction.- 6.2 Communications Networks and Internet.- 6.3 Biometrics.- 6.4 The Personal Identification Network: Biometrics Services via the Internet.- 6.5 Other Biometric Topics in Internet Applications.- 6.6 Conclusions and Future Trends.- 7 Forensic Identification Reporting Using Automatic Biometric Systems.- 7.1 Introduction.- 7.2 Biometric Systems and Classical Forensic Reporting.- 7.3 Bayesian Analysis of Forensic Evidence.- 7.4 Assessment of Forensic Biometric Systems.- 7.5 Case Study: Forensic Speaker Recognition.- 7.6 Conclusions.- 8 Signature Security System for E-commerce.- 8.1 Introduction.- 8.2 Literature Overview.- 8.3 A Typical On-Line Signature Verification System.- 8.4 Proposed On-Line Dynamic Signature Verification Applications.- 8.5 Conclusions.- 9 Web Guard: A Biometrics Identification System for Network Security.- 9.1 Introduction.- 9.2 Biometrics Data Warehouse.- 9.3 Dynamic Feature Selection.- 9.4 Hierarchical Search.- 9.5 Robust Classification via Fuzzy Neural Network.- 9.6 System Implementation.- 9.7 Experimental Results.- 9.8 Conclusions.- 10 Smart Card Application Based on Palmprint Identification.- 10.1 Introduction.- 10.2 On-line Palmprint Identification System.- 10.3 Smart Card Architecture.- 10.4 System Analysis and Applications.- 10.5 Conclusions.- 11 Secure Fingerprint Authentication.- 11.1 Introduction.- 11.2 Biometrics-Based Authentication Systems.- 11.3 Fingerprint Recognition.- 11.4 Techniques to Improve Security.- 11.5 Conclusions.- 12 From Biometrics Technology to Applications Regarding Face, Voice, Signature and Fingerprint Recognition Systems.- 12.1 Introduction.- 12.2 Automatic Speaker Recognition.- 12.3 Automatic Face Recognition.- 12.4 Minutiae-Based Fingerprint Recognition Systems.- 12.5 On-Line HMM-Based Signature Verification System.- 12.6 Multimodality in Biometric Systems.- 12.7 From Technology to Applications.- 13 Face Verification for Access Control.- 13.1 Introduction.- 13.2 Face Detection.- 13.3 Face Verification.- 13.4 Major Challenges.- 13.5 An Example Access Control System Based on Eigenface.- 13.6 Commercial Systems and Performance Evalutation.- 13.7 Summary and Conclusions.- 14 Voice Biometrics for Securing Your Web-Based Business.- 14.1 Introduction.- 14.2 Speaker Verification.- 14.3 Business Opportunities on the Web using Speaker Verification.- 14.4 SpeakEZ Web Authentication Service.- 14.5 Speaker Verification Performance.- 14.6 Summary.- 15 Ability to Verify: A Metric for System Performance in Real-World Comparative Biometric Testing.- 15.1 Introduction.- 15.2 Test Methodology.- 15.3 High-level Test Results.- 15.4 Ability to Verify (ATV).- 15.5 Vendor-generated Test Results.- 15.6 Conclusions.- 16 Automated Authentication Using Hybrid Biometric System.- 16.1 The State of the Art.- 16.2 A Hybrid Biometric Person Authentication Prototype.- 16.3 Database, Tests and Results.- 16.4 Hybrid Biometric Applications.- 16.5 Conclusions.