Automated Biometrics: Technologies and Systems
Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on 'something which you are or you do'...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2000
|
Ausgabe: | 1st ed. 2000 |
Schriftenreihe: | The International Series on Asian Studies in Computer and Information Science
7 |
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Zusammenfassung: | Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on 'something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate the identity of a person for secure transaction processing. Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, very few books are exclusively devoted to such issues of automated biometrics. Automated Biometrics: Technologies and Systems systematically introduces the technologies and systems, and explores how to design the corresponding systems with in-depth discussion. The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security |
Beschreibung: | 1 Online-Ressource (XII, 332 p) |
ISBN: | 9781461545194 |
DOI: | 10.1007/978-1-4615-4519-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047063956 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2000 |||| o||u| ||||||eng d | ||
020 | |a 9781461545194 |9 978-1-4615-4519-4 | ||
024 | 7 | |a 10.1007/978-1-4615-4519-4 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4615-4519-4 | ||
035 | |a (OCoLC)1227483816 | ||
035 | |a (DE-599)BVBBV047063956 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 006.37 |2 23 | |
082 | 0 | |a 006.6 |2 23 | |
084 | |a WC 7000 |0 (DE-625)148142: |2 rvk | ||
100 | 1 | |a Zhang, David D. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Automated Biometrics |b Technologies and Systems |c by David D. Zhang |
250 | |a 1st ed. 2000 | ||
264 | 1 | |a New York, NY |b Springer US |c 2000 | |
300 | |a 1 Online-Ressource (XII, 332 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a The International Series on Asian Studies in Computer and Information Science |v 7 | |
520 | |a Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on 'something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate the identity of a person for secure transaction processing. Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, very few books are exclusively devoted to such issues of automated biometrics. Automated Biometrics: Technologies and Systems systematically introduces the technologies and systems, and explores how to design the corresponding systems with in-depth discussion. The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security | ||
650 | 4 | |a Image Processing and Computer Vision | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Computer Imaging, Vision, Pattern Recognition and Graphics | |
650 | 4 | |a Multimedia Information Systems | |
650 | 4 | |a Optical data processing | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Multimedia information systems | |
650 | 0 | 7 | |a Mustererkennung |0 (DE-588)4040936-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Biostatistik |0 (DE-588)4729990-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitungssystem |0 (DE-588)4125229-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mustererkennung |0 (DE-588)4040936-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Datenverarbeitungssystem |0 (DE-588)4125229-9 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 4 | |5 DE-604 | |
689 | 5 | 0 | |a Biostatistik |0 (DE-588)4729990-3 |D s |
689 | 5 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461370383 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792378563 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461545200 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4615-4519-4 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471068 | ||
966 | e | |u https://doi.org/10.1007/978-1-4615-4519-4 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061368475648 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Zhang, David D. |
author_facet | Zhang, David D. |
author_role | aut |
author_sort | Zhang, David D. |
author_variant | d d z dd ddz |
building | Verbundindex |
bvnumber | BV047063956 |
classification_rvk | WC 7000 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4615-4519-4 (OCoLC)1227483816 (DE-599)BVBBV047063956 |
dewey-full | 006.37 006.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.37 006.6 |
dewey-search | 006.37 006.6 |
dewey-sort | 16.37 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Biologie Informatik |
discipline_str_mv | Biologie Informatik |
doi_str_mv | 10.1007/978-1-4615-4519-4 |
edition | 1st ed. 2000 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04742nmm a2200769zcb4500</leader><controlfield tag="001">BV047063956</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2000 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461545194</subfield><subfield code="9">978-1-4615-4519-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-4519-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4615-4519-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227483816</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047063956</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.37</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WC 7000</subfield><subfield code="0">(DE-625)148142:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zhang, David D.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Automated Biometrics</subfield><subfield code="b">Technologies and Systems</subfield><subfield code="c">by David D. Zhang</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2000</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 332 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The International Series on Asian Studies in Computer and Information Science</subfield><subfield code="v">7</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on 'something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate the identity of a person for secure transaction processing. Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, very few books are exclusively devoted to such issues of automated biometrics. Automated Biometrics: Technologies and Systems systematically introduces the technologies and systems, and explores how to design the corresponding systems with in-depth discussion. The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image Processing and Computer Vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Imaging, Vision, Pattern Recognition and Graphics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multimedia Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optical data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multimedia information systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mustererkennung</subfield><subfield code="0">(DE-588)4040936-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biostatistik</subfield><subfield code="0">(DE-588)4729990-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitungssystem</subfield><subfield code="0">(DE-588)4125229-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mustererkennung</subfield><subfield code="0">(DE-588)4040936-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Datenverarbeitungssystem</subfield><subfield code="0">(DE-588)4125229-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Biostatistik</subfield><subfield code="0">(DE-588)4729990-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461370383</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792378563</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461545200</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-4519-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471068</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-4519-4</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047063956 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:21Z |
indexdate | 2024-07-10T09:01:33Z |
institution | BVB |
isbn | 9781461545194 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471068 |
oclc_num | 1227483816 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XII, 332 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Springer US |
record_format | marc |
series2 | The International Series on Asian Studies in Computer and Information Science |
spelling | Zhang, David D. Verfasser aut Automated Biometrics Technologies and Systems by David D. Zhang 1st ed. 2000 New York, NY Springer US 2000 1 Online-Ressource (XII, 332 p) txt rdacontent c rdamedia cr rdacarrier The International Series on Asian Studies in Computer and Information Science 7 Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on 'something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate the identity of a person for secure transaction processing. Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, very few books are exclusively devoted to such issues of automated biometrics. Automated Biometrics: Technologies and Systems systematically introduces the technologies and systems, and explores how to design the corresponding systems with in-depth discussion. The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security Image Processing and Computer Vision Management of Computing and Information Systems Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics Multimedia Information Systems Optical data processing Management information systems Computer science Data structures (Computer science) Multimedia information systems Mustererkennung (DE-588)4040936-3 gnd rswk-swf Biostatistik (DE-588)4729990-3 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Biometrie (DE-588)4124925-2 gnd rswk-swf Datenverarbeitungssystem (DE-588)4125229-9 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Mustererkennung (DE-588)4040936-3 s DE-604 Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s Datenverarbeitungssystem (DE-588)4125229-9 s Biometrie (DE-588)4124925-2 s Biostatistik (DE-588)4729990-3 s Erscheint auch als Druck-Ausgabe 9781461370383 Erscheint auch als Druck-Ausgabe 9780792378563 Erscheint auch als Druck-Ausgabe 9781461545200 https://doi.org/10.1007/978-1-4615-4519-4 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Zhang, David D. Automated Biometrics Technologies and Systems Image Processing and Computer Vision Management of Computing and Information Systems Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics Multimedia Information Systems Optical data processing Management information systems Computer science Data structures (Computer science) Multimedia information systems Mustererkennung (DE-588)4040936-3 gnd Biostatistik (DE-588)4729990-3 gnd Authentifikation (DE-588)4330656-1 gnd Biometrie (DE-588)4124925-2 gnd Datenverarbeitungssystem (DE-588)4125229-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)4040936-3 (DE-588)4729990-3 (DE-588)4330656-1 (DE-588)4124925-2 (DE-588)4125229-9 (DE-588)4293034-0 |
title | Automated Biometrics Technologies and Systems |
title_auth | Automated Biometrics Technologies and Systems |
title_exact_search | Automated Biometrics Technologies and Systems |
title_exact_search_txtP | Automated Biometrics Technologies and Systems |
title_full | Automated Biometrics Technologies and Systems by David D. Zhang |
title_fullStr | Automated Biometrics Technologies and Systems by David D. Zhang |
title_full_unstemmed | Automated Biometrics Technologies and Systems by David D. Zhang |
title_short | Automated Biometrics |
title_sort | automated biometrics technologies and systems |
title_sub | Technologies and Systems |
topic | Image Processing and Computer Vision Management of Computing and Information Systems Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics Multimedia Information Systems Optical data processing Management information systems Computer science Data structures (Computer science) Multimedia information systems Mustererkennung (DE-588)4040936-3 gnd Biostatistik (DE-588)4729990-3 gnd Authentifikation (DE-588)4330656-1 gnd Biometrie (DE-588)4124925-2 gnd Datenverarbeitungssystem (DE-588)4125229-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Image Processing and Computer Vision Management of Computing and Information Systems Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics Multimedia Information Systems Optical data processing Management information systems Computer science Data structures (Computer science) Multimedia information systems Mustererkennung Biostatistik Authentifikation Biometrie Datenverarbeitungssystem Zugriffskontrolle |
url | https://doi.org/10.1007/978-1-4615-4519-4 |
work_keys_str_mv | AT zhangdavidd automatedbiometricstechnologiesandsystems |