Biometric Authentication International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002 Proceedings /

Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral characteristics. It associates an individual with a previously determined identity based on that individual s appearance or behavior. Because many physiological or behavior...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Tistarelli, Massimo (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Bigun, Josef (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Jain, Anil K. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2359
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05884nam a2200649 4500
001 978-3-540-47917-8
003 DE-He213
005 20191028072300.0
007 cr nn 008mamaa
008 100301s2002 gw | s |||| 0|eng d
020 |a 9783540479178  |9 978-3-540-47917-8 
024 7 |a 10.1007/3-540-47917-1  |2 doi 
040 |d GrThAP 
050 4 |a TA1630-1650 
072 7 |a UYT  |2 bicssc 
072 7 |a COM012000  |2 bisacsh 
072 7 |a UYT  |2 thema 
072 7 |a UYQV  |2 thema 
082 0 4 |a 006.6  |2 23 
082 0 4 |a 006.37  |2 23 
245 1 0 |a Biometric Authentication  |h [electronic resource] :  |b International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002 Proceedings /  |c edited by Massimo Tistarelli, Josef Bigun, Anil K. Jain. 
250 |a 1st ed. 2002. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2002. 
300 |a X, 202 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2359 
505 0 |a Face Recognition I -- An Incremental Learning Algorithm for Face Recognition -- Face Recognition Based on ICA Combined with FLD -- Understanding Iconic Image-Based Face Biometrics -- Fusion of LDA and PCA for Face Verification -- Fingerprint Recognition -- Complex Filters Applied to Fingerprint Images Detecting Prominent Symmetry Points Used for Alignment -- Fingerprint Matching Using Feature Space Correlation -- Fingerprint Minutiae: A Constructive Definition -- Psychology and Biometrics -- Pseudo-entropy Similarity for Human Biometrics -- Mental Characteristics of Person as Basic Biometrics -- Face Detection and Localization -- Detection of Frontal Faces in Video Streams -- Genetic Model Optimization for Hausdorff Distance-Based Face Localization -- Coarse to Fine Face Detection Based on Skin Color Adaption -- Face Recognition II -- Robust Face Recognition Using Dynamic Space Warping -- Subspace Classification for Face Recognition -- Gait and Signature Analysis -- Gait Appearance for Recognition -- View-invariant Estimation of Height and Stride for Gait Recognition -- Improvement of On-line Signature Verification System Robust to Intersession Variability -- Classifiers for Recognition -- Biometric Identification in Forensic Cases According to the Bayesian Approach -- A New Quadratic Classifier Applied to Biometric Recognition. 
520 |a Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral characteristics. It associates an individual with a previously determined identity based on that individual s appearance or behavior. Because many physiological or behavioral characteristics (biometric indicators) are distinctive to each person, biometric identifiers are inherently more reliable and more capable than knowledge-based (e.g., password) and token-based (e.g., a key) techniques in differentiating between an authorized person and a fraudulent impostor. For this reason, more and more organizations are looking to automated identity authentication systems to improve customer satisfaction, security, and operating efficiency as well as to save critical resources. Biometric authentication is a challenging pattern recognition problem; it involves more than just template matching. The intrinsic nature of biometric data must be carefully studied, analyzed, and its properties taken into account in developing suitable representation and matching algorithms. The intrinsic variability of data with time and environmental conditions, the social acceptability and invasiveness of acquisition devices, and the facility with which the data can be counterfeited must be considered in the choice of a biometric indicator for a given application. In order to deploy a biometric authentication system, one must consider its reliability, accuracy, applicability, and efficiency. Eventually, it may be necessary to combine several biometric indicators (multimodal-biometrics) to cope with the drawbacks of the individual biometric indicators. 
650 0 |a Optical data processing. 
650 0 |a Pattern recognition. 
650 0 |a Natural language processing (Computer science). 
650 0 |a Computers and civilization. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Bioinformatics. 
650 1 4 |a Image Processing and Computer Vision.  |0 http://scigraph.springernature.com/things/product-market-codes/I22021 
650 2 4 |a Pattern Recognition.  |0 http://scigraph.springernature.com/things/product-market-codes/I2203X 
650 2 4 |a Natural Language Processing (NLP).  |0 http://scigraph.springernature.com/things/product-market-codes/I21040 
650 2 4 |a Computers and Society.  |0 http://scigraph.springernature.com/things/product-market-codes/I24040 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
650 2 4 |a Bioinformatics.  |0 http://scigraph.springernature.com/things/product-market-codes/L15001 
700 1 |a Tistarelli, Massimo.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Bigun, Josef.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Jain, Anil K.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540829850 
776 0 8 |i Printed edition:  |z 9783540437239 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2359 
856 4 0 |u https://doi.org/10.1007/3-540-47917-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)