Guide to Biometrics:
In today’s globally connected world there is increasing interest in using biometrics (personal physical attributes such as fingerprints, facial images, voice patterns, iris codes, and hand geometry) for human verification, identification, and "screening" applications. Biometrics are attr...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer New York
2004
|
Ausgabe: | 1st ed. 2004 |
Schriftenreihe: | Springer Professional Computing
|
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | In today’s globally connected world there is increasing interest in using biometrics (personal physical attributes such as fingerprints, facial images, voice patterns, iris codes, and hand geometry) for human verification, identification, and "screening" applications. Biometrics are attractive because they cannot be "forgotten," are not easily stolen, and provide a direct, undeniable link between a user and a transaction. This is a complete technical guide aimed at presenting the core ideas that underlie the area of biometrics. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance. Features & Benefits: *State-of-the-art coverage of biometric theory, research, and implementation *Provides a broad orientation for a wide class of readers, yet has tightly integrated topical organization *Debunks myths and candidly confronts problems associated with biometrics research *Details relevant issues in choosing between biometrics, as well as defining and measuring performance *Defines and explains how to measure the performance of both verification and identification systems *Addresses challenges in managing tradeoffs between security and convenience This up-to-date and detailed resource is an extensive survey of the principles, methods, and technologies used in biometric authentication systems. Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology. Key Topics: > Authentication protocols > Probabilistic error analysis > Performance comparison methodology > Selecting a biometric > Maintaining database integrity > Logistics of large-scale systems > Thwarting attacks > Intrinsic individuality > Error bounds and confidence intervals > APIs, standards, & public databases The authors are leading international experts at the IBM T. J. Watson Research Center (Hawthorne, NY). They have published extensively in scientific journals and have been invited speakers at major conferences covering biometrics, security, pattern recognition, and related technologies. _________________________________________ -- Security / Pattern Recognition -- Beginning-Intermediate Level |
Beschreibung: | 1 Online-Ressource (XXX, 364 p) |
ISBN: | 9781475740363 |
DOI: | 10.1007/978-1-4757-4036-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064711 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2004 |||| o||u| ||||||eng d | ||
020 | |a 9781475740363 |9 978-1-4757-4036-3 | ||
024 | 7 | |a 10.1007/978-1-4757-4036-3 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4757-4036-3 | ||
035 | |a (OCoLC)1227479219 | ||
035 | |a (DE-599)BVBBV047064711 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 006.4 |2 23 | |
084 | |a WC 7000 |0 (DE-625)148142: |2 rvk | ||
100 | 1 | |a Bolle, Ruud M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Guide to Biometrics |c by Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior |
250 | |a 1st ed. 2004 | ||
264 | 1 | |a New York, NY |b Springer New York |c 2004 | |
300 | |a 1 Online-Ressource (XXX, 364 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Springer Professional Computing | |
520 | |a In today’s globally connected world there is increasing interest in using biometrics (personal physical attributes such as fingerprints, facial images, voice patterns, iris codes, and hand geometry) for human verification, identification, and "screening" applications. Biometrics are attractive because they cannot be "forgotten," are not easily stolen, and provide a direct, undeniable link between a user and a transaction. This is a complete technical guide aimed at presenting the core ideas that underlie the area of biometrics. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance. | ||
520 | |a Features & Benefits: *State-of-the-art coverage of biometric theory, research, and implementation *Provides a broad orientation for a wide class of readers, yet has tightly integrated topical organization *Debunks myths and candidly confronts problems associated with biometrics research *Details relevant issues in choosing between biometrics, as well as defining and measuring performance *Defines and explains how to measure the performance of both verification and identification systems *Addresses challenges in managing tradeoffs between security and convenience This up-to-date and detailed resource is an extensive survey of the principles, methods, and technologies used in biometric authentication systems. Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology. | ||
520 | |a Key Topics: > Authentication protocols > Probabilistic error analysis > Performance comparison methodology > Selecting a biometric > Maintaining database integrity > Logistics of large-scale systems > Thwarting attacks > Intrinsic individuality > Error bounds and confidence intervals > APIs, standards, & public databases The authors are leading international experts at the IBM T. J. Watson Research Center (Hawthorne, NY). They have published extensively in scientific journals and have been invited speakers at major conferences covering biometrics, security, pattern recognition, and related technologies. _________________________________________ -- Security / Pattern Recognition -- Beginning-Intermediate Level | ||
650 | 4 | |a Pattern Recognition | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Image Processing and Computer Vision | |
650 | 4 | |a Pattern recognition | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Optical data processing | |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Connell, Jonathan H. |4 aut | |
700 | 1 | |a Pankanti, Sharath |4 aut | |
700 | 1 | |a Ratha, Nalini K. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781441923059 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387400891 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475740370 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4757-4036-3 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471823 | ||
966 | e | |u https://doi.org/10.1007/978-1-4757-4036-3 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182063104917504 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Bolle, Ruud M. Connell, Jonathan H. Pankanti, Sharath Ratha, Nalini K. |
author_facet | Bolle, Ruud M. Connell, Jonathan H. Pankanti, Sharath Ratha, Nalini K. |
author_role | aut aut aut aut |
author_sort | Bolle, Ruud M. |
author_variant | r m b rm rmb j h c jh jhc s p sp n k r nk nkr |
building | Verbundindex |
bvnumber | BV047064711 |
classification_rvk | WC 7000 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4757-4036-3 (OCoLC)1227479219 (DE-599)BVBBV047064711 |
dewey-full | 006.4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.4 |
dewey-search | 006.4 |
dewey-sort | 16.4 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Biologie Informatik |
discipline_str_mv | Biologie Informatik |
doi_str_mv | 10.1007/978-1-4757-4036-3 |
edition | 1st ed. 2004 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04672nmm a2200589zc 4500</leader><controlfield tag="001">BV047064711</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781475740363</subfield><subfield code="9">978-1-4757-4036-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4757-4036-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4757-4036-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227479219</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064711</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WC 7000</subfield><subfield code="0">(DE-625)148142:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bolle, Ruud M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Guide to Biometrics</subfield><subfield code="c">by Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2004</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer New York</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXX, 364 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Springer Professional Computing</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a"> In today’s globally connected world there is increasing interest in using biometrics (personal physical attributes such as fingerprints, facial images, voice patterns, iris codes, and hand geometry) for human verification, identification, and "screening" applications. Biometrics are attractive because they cannot be "forgotten," are not easily stolen, and provide a direct, undeniable link between a user and a transaction. This is a complete technical guide aimed at presenting the core ideas that underlie the area of biometrics. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Features & Benefits: *State-of-the-art coverage of biometric theory, research, and implementation *Provides a broad orientation for a wide class of readers, yet has tightly integrated topical organization *Debunks myths and candidly confronts problems associated with biometrics research *Details relevant issues in choosing between biometrics, as well as defining and measuring performance *Defines and explains how to measure the performance of both verification and identification systems *Addresses challenges in managing tradeoffs between security and convenience This up-to-date and detailed resource is an extensive survey of the principles, methods, and technologies used in biometric authentication systems. Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a"> Key Topics: > Authentication protocols > Probabilistic error analysis > Performance comparison methodology > Selecting a biometric > Maintaining database integrity > Logistics of large-scale systems > Thwarting attacks > Intrinsic individuality > Error bounds and confidence intervals > APIs, standards, & public databases The authors are leading international experts at the IBM T. J. Watson Research Center (Hawthorne, NY). They have published extensively in scientific journals and have been invited speakers at major conferences covering biometrics, security, pattern recognition, and related technologies. _________________________________________ -- Security / Pattern Recognition -- Beginning-Intermediate Level</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern Recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image Processing and Computer Vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optical data processing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Connell, Jonathan H.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pankanti, Sharath</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ratha, Nalini K.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781441923059</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387400891</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475740370</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4757-4036-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471823</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4757-4036-3</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064711 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:23Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9781475740363 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471823 |
oclc_num | 1227479219 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XXX, 364 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer New York |
record_format | marc |
series2 | Springer Professional Computing |
spelling | Bolle, Ruud M. Verfasser aut Guide to Biometrics by Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior 1st ed. 2004 New York, NY Springer New York 2004 1 Online-Ressource (XXX, 364 p) txt rdacontent c rdamedia cr rdacarrier Springer Professional Computing In today’s globally connected world there is increasing interest in using biometrics (personal physical attributes such as fingerprints, facial images, voice patterns, iris codes, and hand geometry) for human verification, identification, and "screening" applications. Biometrics are attractive because they cannot be "forgotten," are not easily stolen, and provide a direct, undeniable link between a user and a transaction. This is a complete technical guide aimed at presenting the core ideas that underlie the area of biometrics. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance. Features & Benefits: *State-of-the-art coverage of biometric theory, research, and implementation *Provides a broad orientation for a wide class of readers, yet has tightly integrated topical organization *Debunks myths and candidly confronts problems associated with biometrics research *Details relevant issues in choosing between biometrics, as well as defining and measuring performance *Defines and explains how to measure the performance of both verification and identification systems *Addresses challenges in managing tradeoffs between security and convenience This up-to-date and detailed resource is an extensive survey of the principles, methods, and technologies used in biometric authentication systems. Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology. Key Topics: > Authentication protocols > Probabilistic error analysis > Performance comparison methodology > Selecting a biometric > Maintaining database integrity > Logistics of large-scale systems > Thwarting attacks > Intrinsic individuality > Error bounds and confidence intervals > APIs, standards, & public databases The authors are leading international experts at the IBM T. J. Watson Research Center (Hawthorne, NY). They have published extensively in scientific journals and have been invited speakers at major conferences covering biometrics, security, pattern recognition, and related technologies. _________________________________________ -- Security / Pattern Recognition -- Beginning-Intermediate Level Pattern Recognition Artificial Intelligence Image Processing and Computer Vision Pattern recognition Artificial intelligence Optical data processing Biometrie (DE-588)4124925-2 gnd rswk-swf Biometrie (DE-588)4124925-2 s DE-604 Connell, Jonathan H. aut Pankanti, Sharath aut Ratha, Nalini K. aut Erscheint auch als Druck-Ausgabe 9781441923059 Erscheint auch als Druck-Ausgabe 9780387400891 Erscheint auch als Druck-Ausgabe 9781475740370 https://doi.org/10.1007/978-1-4757-4036-3 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Bolle, Ruud M. Connell, Jonathan H. Pankanti, Sharath Ratha, Nalini K. Guide to Biometrics Pattern Recognition Artificial Intelligence Image Processing and Computer Vision Pattern recognition Artificial intelligence Optical data processing Biometrie (DE-588)4124925-2 gnd |
subject_GND | (DE-588)4124925-2 |
title | Guide to Biometrics |
title_auth | Guide to Biometrics |
title_exact_search | Guide to Biometrics |
title_exact_search_txtP | Guide to Biometrics |
title_full | Guide to Biometrics by Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior |
title_fullStr | Guide to Biometrics by Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior |
title_full_unstemmed | Guide to Biometrics by Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior |
title_short | Guide to Biometrics |
title_sort | guide to biometrics |
topic | Pattern Recognition Artificial Intelligence Image Processing and Computer Vision Pattern recognition Artificial intelligence Optical data processing Biometrie (DE-588)4124925-2 gnd |
topic_facet | Pattern Recognition Artificial Intelligence Image Processing and Computer Vision Pattern recognition Artificial intelligence Optical data processing Biometrie |
url | https://doi.org/10.1007/978-1-4757-4036-3 |
work_keys_str_mv | AT bolleruudm guidetobiometrics AT connelljonathanh guidetobiometrics AT pankantisharath guidetobiometrics AT rathanalinik guidetobiometrics |