Online Library TheLib.net » Guide to Biometrics

In today’s globally connected world there is increasing interest in using biometrics (personal physical attributes such as fingerprints, facial images, voice patterns, iris codes, and hand geometry) for human verification, identification, and "screening" applications. Biometrics are attractive because they cannot be "forgotten," are not easily stolen, and provide a direct, undeniable link between a user and a transaction.

This is a complete technical guide aimed at presenting the core ideas that underlie the area of biometrics. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance.

Features & Benefits:

*State-of-the-art coverage of biometric theory, research, and implementation

*Provides a broad orientation for a wide class of readers, yet has tightly integrated topical organization

*Debunks myths and candidly confronts problems associated with biometrics research

*Details relevant issues in choosing between biometrics, as well as defining and measuring performance

*Defines and explains how to measure the performance of both verification and identification systems

*Addresses challenges in managing tradeoffs between security and convenience

This up-to-date and detailed resource is an extensive survey of the principles, methods, and technologies used in biometric authentication systems. Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology.

Key Topics:

>> Authentication protocols

>> Probabilistic error analysis

>> Performance comparison methodology

>> Selecting a biometric

>> Maintaining database integrity

>> Logistics of large-scale systems

>> Thwarting attacks

>> Intrinsic individuality

>> Error bounds and confidence intervals

>> APIs, standards, & public databases

The authors are leading international experts at the IBM T. J. Watson Research Center (Hawthorne, NY). They have published extensively in scientific journals and have been invited speakers at major conferences covering biometrics, security, pattern recognition, and related technologies.

_________________________________________

-- Security / Pattern Recognition

-- Beginning-Intermediate Level




 

In today’s globally connected world there is increasing interest in using biometrics (personal physical attributes such as fingerprints, facial images, voice patterns, iris codes, and hand geometry) for human verification, identification, and "screening" applications. Biometrics are attractive because they cannot be "forgotten," are not easily stolen, and provide a direct, undeniable link between a user and a transaction.

This is a complete technical guide aimed at presenting the core ideas that underlie the area of biometrics. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance.

Features & Benefits:

*State-of-the-art coverage of biometric theory, research, and implementation

*Provides a broad orientation for a wide class of readers, yet has tightly integrated topical organization

*Debunks myths and candidly confronts problems associated with biometrics research

*Details relevant issues in choosing between biometrics, as well as defining and measuring performance

*Defines and explains how to measure the performance of both verification and identification systems

*Addresses challenges in managing tradeoffs between security and convenience

This up-to-date and detailed resource is an extensive survey of the principles, methods, and technologies used in biometric authentication systems. Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology.

 

 

Key Topics:

>> Authentication protocols

>> Probabilistic error analysis

>> Performance comparison methodology

>> Selecting a biometric

>> Maintaining database integrity

>> Logistics of large-scale systems

>> Thwarting attacks

>> Intrinsic individuality

>> Error bounds and confidence intervals

>> APIs, standards, & public databases

 

 

The authors are leading international experts at the IBM T. J. Watson Research Center (Hawthorne, NY). They have published extensively in scientific journals and have been invited speakers at major conferences covering biometrics, security, pattern recognition, and related technologies.

 

_________________________________________

 

 

-- Security / Pattern Recognition

-- Beginning-Intermediate Level




 

In today’s globally connected world there is increasing interest in using biometrics (personal physical attributes such as fingerprints, facial images, voice patterns, iris codes, and hand geometry) for human verification, identification, and "screening" applications. Biometrics are attractive because they cannot be "forgotten," are not easily stolen, and provide a direct, undeniable link between a user and a transaction.

This is a complete technical guide aimed at presenting the core ideas that underlie the area of biometrics. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance.

Features & Benefits:

*State-of-the-art coverage of biometric theory, research, and implementation

*Provides a broad orientation for a wide class of readers, yet has tightly integrated topical organization

*Debunks myths and candidly confronts problems associated with biometrics research

*Details relevant issues in choosing between biometrics, as well as defining and measuring performance

*Defines and explains how to measure the performance of both verification and identification systems

*Addresses challenges in managing tradeoffs between security and convenience

This up-to-date and detailed resource is an extensive survey of the principles, methods, and technologies used in biometric authentication systems. Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology.

 

 

Key Topics:

>> Authentication protocols

>> Probabilistic error analysis

>> Performance comparison methodology

>> Selecting a biometric

>> Maintaining database integrity

>> Logistics of large-scale systems

>> Thwarting attacks

>> Intrinsic individuality

>> Error bounds and confidence intervals

>> APIs, standards, & public databases

 

 

The authors are leading international experts at the IBM T. J. Watson Research Center (Hawthorne, NY). They have published extensively in scientific journals and have been invited speakers at major conferences covering biometrics, security, pattern recognition, and related technologies.

 

_________________________________________

 

 

-- Security / Pattern Recognition

-- Beginning-Intermediate Level


Content:
Front Matter....Pages i-xxix
Front Matter....Pages 1-1
Introduction....Pages 3-15
Authentication and Biometrics....Pages 17-30
The Common Biometrics....Pages 31-49
Additional Biometrics....Pages 51-59
Front Matter....Pages 61-61
Basic System Errors....Pages 63-85
Identification System Errors....Pages 87-104
Performance Testing....Pages 105-128
Selecting a Biometric....Pages 129-153
Front Matter....Pages 155-155
Creating and Maintaining Databases....Pages 157-176
Large-Scale Applications....Pages 177-192
Integrating Information....Pages 193-210
Thwarting Attacks....Pages 211-227
APIs, Standards, and Databases....Pages 229-242
Front Matter....Pages 243-243
A Biometric’s Individuality....Pages 245-267
System Errors Revisited....Pages 269-292
Advanced Topics....Pages 293-323
What’s next?....Pages 325-334
Back Matter....Pages 335-364


 

In today’s globally connected world there is increasing interest in using biometrics (personal physical attributes such as fingerprints, facial images, voice patterns, iris codes, and hand geometry) for human verification, identification, and "screening" applications. Biometrics are attractive because they cannot be "forgotten," are not easily stolen, and provide a direct, undeniable link between a user and a transaction.

This is a complete technical guide aimed at presenting the core ideas that underlie the area of biometrics. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance.

Features & Benefits:

*State-of-the-art coverage of biometric theory, research, and implementation

*Provides a broad orientation for a wide class of readers, yet has tightly integrated topical organization

*Debunks myths and candidly confronts problems associated with biometrics research

*Details relevant issues in choosing between biometrics, as well as defining and measuring performance

*Defines and explains how to measure the performance of both verification and identification systems

*Addresses challenges in managing tradeoffs between security and convenience

This up-to-date and detailed resource is an extensive survey of the principles, methods, and technologies used in biometric authentication systems. Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology.

 

 

Key Topics:

>> Authentication protocols

>> Probabilistic error analysis

>> Performance comparison methodology

>> Selecting a biometric

>> Maintaining database integrity

>> Logistics of large-scale systems

>> Thwarting attacks

>> Intrinsic individuality

>> Error bounds and confidence intervals

>> APIs, standards, & public databases

 

 

The authors are leading international experts at the IBM T. J. Watson Research Center (Hawthorne, NY). They have published extensively in scientific journals and have been invited speakers at major conferences covering biometrics, security, pattern recognition, and related technologies.

 

_________________________________________

 

 

-- Security / Pattern Recognition

-- Beginning-Intermediate Level


Content:
Front Matter....Pages i-xxix
Front Matter....Pages 1-1
Introduction....Pages 3-15
Authentication and Biometrics....Pages 17-30
The Common Biometrics....Pages 31-49
Additional Biometrics....Pages 51-59
Front Matter....Pages 61-61
Basic System Errors....Pages 63-85
Identification System Errors....Pages 87-104
Performance Testing....Pages 105-128
Selecting a Biometric....Pages 129-153
Front Matter....Pages 155-155
Creating and Maintaining Databases....Pages 157-176
Large-Scale Applications....Pages 177-192
Integrating Information....Pages 193-210
Thwarting Attacks....Pages 211-227
APIs, Standards, and Databases....Pages 229-242
Front Matter....Pages 243-243
A Biometric’s Individuality....Pages 245-267
System Errors Revisited....Pages 269-292
Advanced Topics....Pages 293-323
What’s next?....Pages 325-334
Back Matter....Pages 335-364
....
Download the book Guide to Biometrics for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen