|
|
|
|
LEADER |
03529nam a22005655i 4500 |
001 |
978-0-387-28094-3 |
003 |
DE-He213 |
005 |
20151030041523.0 |
007 |
cr nn 008mamaa |
008 |
100301s2006 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387280943
|9 978-0-387-28094-3
|
024 |
7 |
|
|a 10.1007/0-387-28094-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q337.5
|
050 |
|
4 |
|a TK7882.P3
|
072 |
|
7 |
|a UYQP
|2 bicssc
|
072 |
|
7 |
|a COM016000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.4
|2 23
|
100 |
1 |
|
|a Vielhauer, Claus.
|e author.
|
245 |
1 |
0 |
|a Biometric User Authentication for it Security
|h [electronic resource] :
|b From Fundamentals to Handwriting /
|c by Claus Vielhauer.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2006.
|
300 |
|
|
|a XII, 284 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 18
|
505 |
0 |
|
|a Fundamentals - Overview -- Fundamentals in Biometrics -- Biometric Modalities -- Fundamentals in User Authentication -- Handwriting Biometrics - Overview -- Evaluating Handwriting Biometrics -- Biometric Hash -- User Verification.
|
520 |
|
|
|a Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Multimedia information systems.
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
|
0 |
|a Image processing.
|
650 |
|
0 |
|a Pattern recognition.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Pattern Recognition.
|
650 |
2 |
4 |
|a Image Processing and Computer Vision.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a User Interfaces and Human Computer Interaction.
|
650 |
2 |
4 |
|a Multimedia Information Systems.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387261942
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 18
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/0-387-28094-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|