|
|
|
|
LEADER |
04182nam a22005295i 4500 |
001 |
978-1-4471-5230-9 |
003 |
DE-He213 |
005 |
20151218161414.0 |
007 |
cr nn 008mamaa |
008 |
130704s2013 xxk| s |||| 0|eng d |
020 |
|
|
|a 9781447152309
|9 978-1-4471-5230-9
|
024 |
7 |
|
|a 10.1007/978-1-4471-5230-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QH323.5
|
072 |
|
7 |
|a UYQP
|2 bicssc
|
072 |
|
7 |
|a UYQV
|2 bicssc
|
072 |
|
7 |
|a COM016000
|2 bisacsh
|
082 |
0 |
4 |
|a 570.15195
|2 23
|
245 |
1 |
0 |
|a Security and Privacy in Biometrics
|h [electronic resource] /
|c edited by Patrizio Campisi.
|
264 |
|
1 |
|a London :
|b Springer London :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a X, 438 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction -- Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain -- Beyond PKI -- Fuzzy Sketches for Protecting Biometric Templates -- Privacy Leakage in Binary Biometric Systems -- Obtaining Cryptographic Keys Using Multi-Biometrics -- Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation -- Fingerprint Template Protection -- Biometric Encryption -- Smart Cards to Enhance Security and Privacy in Biometrics -- Two Efficient Architectures for Handling Biometric Data While Taking Care Of Their Privacy -- Standards for Biometric Data Protection -- Nameless and Faceless -- Best Practices for Privacy and Data Protection for the Processing of Biometric Data -- Biometrics and the Challenge to Human Rights in Europe -- Recommendations on the Use of Biometric Technology.
|
520 |
|
|
|a Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to personal data protection. This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: Presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection Examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization Describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards Reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity Provides guidance on best practices for the processing of biometric data within a legal framework This timely and authoritative volume is essential reading for all practitioners and researchers involved in biometrics-based automatic human recognition. Graduate students of computer science and electrical engineering will also find the text to be an invaluable practical reference. Dr. Patrizio Campisi is a Full Professor in the Department of Engineering, Section of Applied Electronics at the University of Roma Tre, Rome, Italy.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Biometrics.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a User Interfaces and Human Computer Interaction.
|
650 |
2 |
4 |
|a Computer Appl. in Social and Behavioral Sciences.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
700 |
1 |
|
|a Campisi, Patrizio.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781447152293
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4471-5230-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|