|
|
|
|
LEADER |
03144nam a22005175i 4500 |
001 |
978-1-4614-5571-4 |
003 |
DE-He213 |
005 |
20151030041104.0 |
007 |
cr nn 008mamaa |
008 |
121116s2013 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781461455714
|9 978-1-4614-5571-4
|
024 |
7 |
|
|a 10.1007/978-1-4614-5571-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QH323.5
|
072 |
|
7 |
|a UYQP
|2 bicssc
|
072 |
|
7 |
|a UYQV
|2 bicssc
|
072 |
|
7 |
|a COM016000
|2 bisacsh
|
082 |
0 |
4 |
|a 570.15195
|2 23
|
100 |
1 |
|
|a Rathgeb, Christian.
|e author.
|
245 |
1 |
0 |
|a Iris Biometrics
|h [electronic resource] :
|b From Segmentation to Template Security /
|c by Christian Rathgeb, Andreas Uhl, Peter Wild.
|
264 |
|
1 |
|a New York, NY :
|b Springer New York :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XXII, 358 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 59
|
505 |
0 |
|
|a The Human Iris as a Biometric Identifier -- Iris Biometric Processing -- State-of-the-Art in Iris Biometrics -- Eye Detection -- Iris Segmentation Methodologies -- Multi-Stage Real-Time Iris Preprocessing -- Experiments on Iris Image Processing -- Image Compression Impact on Iris Recognition.-Advanced Comparison Techniques for Challenging Iris Images -- Experiments on Biometric Comparators -- Iris Biometric Cryptosystems -- Cancelable Iris Biometrics -- Potential Attacks -- Experiments on Iris Biometric Template Protection -- Advances, Applications and Challenges -- Watermarking.
|
520 |
|
|
|a Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more. Open source software is also provided on a dedicated website which includes feature extraction, segmentation and matching schemes applied in this book to foster scientific exchange. Current state-of-the-art approaches accompanied by comprehensive experimental evaluations are presented as well. This book has been designed as a secondary text book or reference for researchers and advanced-level students in computer science and electrical engineering. Professionals working in this related field will also find this book useful as a reference.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Pattern recognition.
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Biometrics.
|
650 |
2 |
4 |
|a Pattern Recognition.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
700 |
1 |
|
|a Uhl, Andreas.
|e author.
|
700 |
1 |
|
|a Wild, Peter.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781461455707
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 59
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4614-5571-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|