Handbook of Fingerprint Recognition:
Overview Biometric recognition refers to the use of distinctive physiological and behavioral character- tics (e. g. , fingerprints, face, hang geometry, iris, gait, signature), called biometric identifiers or simply biometrics, for automatically recognizing a person. Questions such as "Is this...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer New York
2003
|
Ausgabe: | 1st ed. 2003 |
Schriftenreihe: | Springer Professional Computing
|
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Overview Biometric recognition refers to the use of distinctive physiological and behavioral character- tics (e. g. , fingerprints, face, hang geometry, iris, gait, signature), called biometric identifiers or simply biometrics, for automatically recognizing a person. Questions such as "Is this person authorized to enter the facility?", "Is this individual entitled to access the privileged infor- tion?", and "Did this person previously apply for a job?" are routinely asked in a variety of organizations in both public and private sectors. Because biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for person recognition than traditional token- (e. g. , keys) or knowledge- (e. g. , password) based methods. Biometric recognition can provide better security, higher efficiency, and increased user convenience. It is for these reasons that biometric systems are being either increasingly deployed or evaluated in a large number of government (e. g. , welfare disbursement, national ID card, issuing of driver’s license) and civilian (e. g. , computer network logon, automatic teller machine, cellular phone, Web access, smartcard) applications. A number of biometric technologies have been developed and several of them are being used in a variety of applications. Among these, fingerprints, face, iris, speech, and hand - ometry are the ones that are most commonly used. Each biometric has its strengths and we- nesses and the choice of a particular biometric typically depends on the requirements of an application |
Beschreibung: | 1 Online-Ressource (XII, 351 p. 484 illus) |
ISBN: | 9780387215877 |
DOI: | 10.1007/b97303 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064492 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2003 |||| o||u| ||||||eng d | ||
020 | |a 9780387215877 |9 978-0-387-21587-7 | ||
024 | 7 | |a 10.1007/b97303 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-21587-7 | ||
035 | |a (OCoLC)1227481299 | ||
035 | |a (DE-599)BVBBV047064492 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 330 |0 (DE-625)143663: |2 rvk | ||
100 | 1 | |a Maltoni, Davide |e Verfasser |4 aut | |
245 | 1 | 0 | |a Handbook of Fingerprint Recognition |c by Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar |
250 | |a 1st ed. 2003 | ||
264 | 1 | |a New York, NY |b Springer New York |c 2003 | |
300 | |a 1 Online-Ressource (XII, 351 p. 484 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Springer Professional Computing | |
520 | |a Overview Biometric recognition refers to the use of distinctive physiological and behavioral character- tics (e. g. , fingerprints, face, hang geometry, iris, gait, signature), called biometric identifiers or simply biometrics, for automatically recognizing a person. Questions such as "Is this person authorized to enter the facility?", "Is this individual entitled to access the privileged infor- tion?", and "Did this person previously apply for a job?" are routinely asked in a variety of organizations in both public and private sectors. Because biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for person recognition than traditional token- (e. g. , keys) or knowledge- (e. g. , password) based methods. Biometric recognition can provide better security, higher efficiency, and increased user convenience. It is for these reasons that biometric systems are being either increasingly deployed or evaluated in a large number of government (e. g. , welfare disbursement, national ID card, issuing of driver’s license) and civilian (e. g. , computer network logon, automatic teller machine, cellular phone, Web access, smartcard) applications. A number of biometric technologies have been developed and several of them are being used in a variety of applications. Among these, fingerprints, face, iris, speech, and hand - ometry are the ones that are most commonly used. Each biometric has its strengths and we- nesses and the choice of a particular biometric typically depends on the requirements of an application | ||
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Pattern Recognition | |
650 | 4 | |a Biotechnology | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Computer Graphics | |
650 | 4 | |a Image Processing and Computer Vision | |
650 | 4 | |a Computer security | |
650 | 4 | |a Pattern recognition | |
650 | 4 | |a Biotechnology | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer graphics | |
650 | 4 | |a Optical data processing | |
650 | 0 | 7 | |a Mustervergleich |0 (DE-588)4307192-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Genetischer Fingerabdruck |0 (DE-588)4245149-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronischer Fingerabdruck |0 (DE-588)4582425-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Benutzeroberfläche |0 (DE-588)4131424-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Merkmalsextraktion |0 (DE-588)4314440-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Benutzeroberfläche |0 (DE-588)4131424-4 |D s |
689 | 0 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 2 | |a Genetischer Fingerabdruck |0 (DE-588)4245149-8 |D s |
689 | 0 | 3 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 0 | 4 | |a Merkmalsextraktion |0 (DE-588)4314440-8 |D s |
689 | 0 | 5 | |a Mustervergleich |0 (DE-588)4307192-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Benutzeroberfläche |0 (DE-588)4131424-4 |D s |
689 | 1 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 2 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 1 | 3 | |a Mustervergleich |0 (DE-588)4307192-2 |D s |
689 | 1 | 4 | |a Elektronischer Fingerabdruck |0 (DE-588)4582425-3 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Maio, Dario |4 aut | |
700 | 1 | |a Jain, Anil K. |4 aut | |
700 | 1 | |a Prabhakar, Salil |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475778427 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387954318 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475778410 |
856 | 4 | 0 | |u https://doi.org/10.1007/b97303 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471604 | ||
966 | e | |u https://doi.org/10.1007/b97303 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062592163840 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Maltoni, Davide Maio, Dario Jain, Anil K. Prabhakar, Salil |
author_facet | Maltoni, Davide Maio, Dario Jain, Anil K. Prabhakar, Salil |
author_role | aut aut aut aut |
author_sort | Maltoni, Davide |
author_variant | d m dm d m dm a k j ak akj s p sp |
building | Verbundindex |
bvnumber | BV047064492 |
classification_rvk | ST 277 ST 330 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-387-21587-7 (OCoLC)1227481299 (DE-599)BVBBV047064492 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/b97303 |
edition | 1st ed. 2003 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04973nmm a2200889zc 4500</leader><controlfield tag="001">BV047064492</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387215877</subfield><subfield code="9">978-0-387-21587-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b97303</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-21587-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227481299</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064492</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 330</subfield><subfield code="0">(DE-625)143663:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maltoni, Davide</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of Fingerprint Recognition</subfield><subfield code="c">by Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2003</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer New York</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 351 p. 484 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Springer Professional Computing</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Overview Biometric recognition refers to the use of distinctive physiological and behavioral character- tics (e. g. , fingerprints, face, hang geometry, iris, gait, signature), called biometric identifiers or simply biometrics, for automatically recognizing a person. Questions such as "Is this person authorized to enter the facility?", "Is this individual entitled to access the privileged infor- tion?", and "Did this person previously apply for a job?" are routinely asked in a variety of organizations in both public and private sectors. Because biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for person recognition than traditional token- (e. g. , keys) or knowledge- (e. g. , password) based methods. Biometric recognition can provide better security, higher efficiency, and increased user convenience. It is for these reasons that biometric systems are being either increasingly deployed or evaluated in a large number of government (e. g. , welfare disbursement, national ID card, issuing of driver’s license) and civilian (e. g. , computer network logon, automatic teller machine, cellular phone, Web access, smartcard) applications. A number of biometric technologies have been developed and several of them are being used in a variety of applications. Among these, fingerprints, face, iris, speech, and hand - ometry are the ones that are most commonly used. Each biometric has its strengths and we- nesses and the choice of a particular biometric typically depends on the requirements of an application</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern Recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biotechnology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Graphics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image Processing and Computer Vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biotechnology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer graphics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optical data processing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mustervergleich</subfield><subfield code="0">(DE-588)4307192-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Genetischer Fingerabdruck</subfield><subfield code="0">(DE-588)4245149-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronischer Fingerabdruck</subfield><subfield code="0">(DE-588)4582425-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Benutzeroberfläche</subfield><subfield code="0">(DE-588)4131424-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Merkmalsextraktion</subfield><subfield code="0">(DE-588)4314440-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Benutzeroberfläche</subfield><subfield code="0">(DE-588)4131424-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Genetischer Fingerabdruck</subfield><subfield code="0">(DE-588)4245149-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Merkmalsextraktion</subfield><subfield code="0">(DE-588)4314440-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Mustervergleich</subfield><subfield code="0">(DE-588)4307192-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Benutzeroberfläche</subfield><subfield code="0">(DE-588)4131424-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Mustervergleich</subfield><subfield code="0">(DE-588)4307192-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Elektronischer Fingerabdruck</subfield><subfield code="0">(DE-588)4582425-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maio, Dario</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jain, Anil K.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prabhakar, Salil</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475778427</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387954318</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475778410</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b97303</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471604</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b97303</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064492 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9780387215877 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471604 |
oclc_num | 1227481299 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XII, 351 p. 484 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer New York |
record_format | marc |
series2 | Springer Professional Computing |
spelling | Maltoni, Davide Verfasser aut Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar 1st ed. 2003 New York, NY Springer New York 2003 1 Online-Ressource (XII, 351 p. 484 illus) txt rdacontent c rdamedia cr rdacarrier Springer Professional Computing Overview Biometric recognition refers to the use of distinctive physiological and behavioral character- tics (e. g. , fingerprints, face, hang geometry, iris, gait, signature), called biometric identifiers or simply biometrics, for automatically recognizing a person. Questions such as "Is this person authorized to enter the facility?", "Is this individual entitled to access the privileged infor- tion?", and "Did this person previously apply for a job?" are routinely asked in a variety of organizations in both public and private sectors. Because biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for person recognition than traditional token- (e. g. , keys) or knowledge- (e. g. , password) based methods. Biometric recognition can provide better security, higher efficiency, and increased user convenience. It is for these reasons that biometric systems are being either increasingly deployed or evaluated in a large number of government (e. g. , welfare disbursement, national ID card, issuing of driver’s license) and civilian (e. g. , computer network logon, automatic teller machine, cellular phone, Web access, smartcard) applications. A number of biometric technologies have been developed and several of them are being used in a variety of applications. Among these, fingerprints, face, iris, speech, and hand - ometry are the ones that are most commonly used. Each biometric has its strengths and we- nesses and the choice of a particular biometric typically depends on the requirements of an application Systems and Data Security Pattern Recognition Biotechnology Artificial Intelligence Computer Graphics Image Processing and Computer Vision Computer security Pattern recognition Artificial intelligence Computer graphics Optical data processing Mustervergleich (DE-588)4307192-2 gnd rswk-swf Biometrie (DE-588)4124925-2 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Genetischer Fingerabdruck (DE-588)4245149-8 gnd rswk-swf Elektronischer Fingerabdruck (DE-588)4582425-3 gnd rswk-swf Benutzeroberfläche (DE-588)4131424-4 gnd rswk-swf Maschinelles Sehen (DE-588)4129594-8 gnd rswk-swf Merkmalsextraktion (DE-588)4314440-8 gnd rswk-swf Benutzeroberfläche (DE-588)4131424-4 s Authentifikation (DE-588)4330656-1 s Genetischer Fingerabdruck (DE-588)4245149-8 s Biometrie (DE-588)4124925-2 s Merkmalsextraktion (DE-588)4314440-8 s Mustervergleich (DE-588)4307192-2 s DE-604 Elektronischer Fingerabdruck (DE-588)4582425-3 s Maschinelles Sehen (DE-588)4129594-8 s Maio, Dario aut Jain, Anil K. aut Prabhakar, Salil aut Erscheint auch als Druck-Ausgabe 9781475778427 Erscheint auch als Druck-Ausgabe 9780387954318 Erscheint auch als Druck-Ausgabe 9781475778410 https://doi.org/10.1007/b97303 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Maltoni, Davide Maio, Dario Jain, Anil K. Prabhakar, Salil Handbook of Fingerprint Recognition Systems and Data Security Pattern Recognition Biotechnology Artificial Intelligence Computer Graphics Image Processing and Computer Vision Computer security Pattern recognition Artificial intelligence Computer graphics Optical data processing Mustervergleich (DE-588)4307192-2 gnd Biometrie (DE-588)4124925-2 gnd Authentifikation (DE-588)4330656-1 gnd Genetischer Fingerabdruck (DE-588)4245149-8 gnd Elektronischer Fingerabdruck (DE-588)4582425-3 gnd Benutzeroberfläche (DE-588)4131424-4 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Merkmalsextraktion (DE-588)4314440-8 gnd |
subject_GND | (DE-588)4307192-2 (DE-588)4124925-2 (DE-588)4330656-1 (DE-588)4245149-8 (DE-588)4582425-3 (DE-588)4131424-4 (DE-588)4129594-8 (DE-588)4314440-8 |
title | Handbook of Fingerprint Recognition |
title_auth | Handbook of Fingerprint Recognition |
title_exact_search | Handbook of Fingerprint Recognition |
title_exact_search_txtP | Handbook of Fingerprint Recognition |
title_full | Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar |
title_fullStr | Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar |
title_full_unstemmed | Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar |
title_short | Handbook of Fingerprint Recognition |
title_sort | handbook of fingerprint recognition |
topic | Systems and Data Security Pattern Recognition Biotechnology Artificial Intelligence Computer Graphics Image Processing and Computer Vision Computer security Pattern recognition Artificial intelligence Computer graphics Optical data processing Mustervergleich (DE-588)4307192-2 gnd Biometrie (DE-588)4124925-2 gnd Authentifikation (DE-588)4330656-1 gnd Genetischer Fingerabdruck (DE-588)4245149-8 gnd Elektronischer Fingerabdruck (DE-588)4582425-3 gnd Benutzeroberfläche (DE-588)4131424-4 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Merkmalsextraktion (DE-588)4314440-8 gnd |
topic_facet | Systems and Data Security Pattern Recognition Biotechnology Artificial Intelligence Computer Graphics Image Processing and Computer Vision Computer security Pattern recognition Artificial intelligence Computer graphics Optical data processing Mustervergleich Biometrie Authentifikation Genetischer Fingerabdruck Elektronischer Fingerabdruck Benutzeroberfläche Maschinelles Sehen Merkmalsextraktion |
url | https://doi.org/10.1007/b97303 |
work_keys_str_mv | AT maltonidavide handbookoffingerprintrecognition AT maiodario handbookoffingerprintrecognition AT jainanilk handbookoffingerprintrecognition AT prabhakarsalil handbookoffingerprintrecognition |