Biometric Solutions e-bog
1240,73 DKK
(inkl. moms 1550,91 DKK)
In today's complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great challenge. Since the conventional technology of using a Personal Identification Number (PIN) or password hardly meets the requirements of an authentication system, biometric-based authentication is emerging as the most reliable method. Biometric Solu...
E-bog
1240,73 DKK
Forlag
Springer
Udgivet
6 december 2012
Genrer
GPJ
Sprog
English
Format
pdf
Beskyttelse
LCP
ISBN
9781461510536
In today's complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great challenge. Since the conventional technology of using a Personal Identification Number (PIN) or password hardly meets the requirements of an authentication system, biometric-based authentication is emerging as the most reliable method. Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner. This includes the basic concepts, theories, and characteristic features of integrating/formulating different facets of biometric solutions for authentication, with recent developments and significant applications in an E-world. This book provides the reader with a basic concept of biometrics, an in-depth discussion exploring biometric technologies in various applications in an E-world. It also includes a detailed description of typical biometric-based security systems and up-to-date coverage of how these issues are developed. Experts from all over the world demonstrate the various ways this integration can be made to efficiently design methodologies, algorithms, architectures, and implementations for biometric-based applications in an E-world. Biometric Solutions for Authentication in an E-World meets the needs of a professional audience composed of researchers and practitioners in industry and graduate-level students in computer science and engineering. Researchers and practitioners in research and development laboratories working in fields of security systems design, biometrics, immigration, law enforcement, control, pattern recognition, and the Internet will benefit from this book.