• Out-of-Stock
Biometrics
search
  • Biometrics
ID: 47255
Bolle RM, Connell JH, Pankanti S., Ratha NK, Senior
Delivery date unknown
 

Free shipping

free shipping in Poland for all orders over 500 PLN

 

Same day shipping

If your payment will be credited to our account by 11:00

 

14 days for return

Each consumer can return the purchased goods within 14 days

This book is devoted to the study of measurable biological features. It consists of four parts. In the first, the authors introduce the reader to issues related to biometric identification and verification as well as to authentication methods. They discuss well-known biometric methods, such as fingerprint recognition, face recognition, voice, hand, iris or signature, but also lesser known ones, such as DNA, retina, walking, ear, skin, lip movement, body odor or keystrokes. In the second part, they deal with the selection of an appropriate biometric method, in the third part - creation and maintenance of a biometric database (biometric), and in the fourth - a mathematical analysis of these data.
The handbook includes the latest achievements in biometrics - a field that is very evolving and very important today in the era of globalization. There is no position on the Polish market devoted to it. The Scientific and Technical Publishers fill this gap. We hope that students of mathematics and computer science, as well as professional IT specialists and creators of biometric systems, will benefit from this book, and that we will contribute in some measure to the security of not only companies, but also the state, that is all of us.

Table of Contents


List of drawings
List of Tables
Preface
Preface

I. Basics of biometrics


1. Introduction

1.1. Authenticating people, generally
1.2. A brief overview of biometrics
1.3. Biometric identification
1.4. Biometric verification
1.5. Biometric registration
1.6. Security of the biometric system

2. Authentication and biometry

2.1. Secure authentication protocols
2.2. Access control protection services
2.3. Authentication methods
2.4. Authentication protocols
2.5. Comparing biometric samples
2.6. Verification by people
2.7. Passwords and biometrics
2.8. Hybrid methods

3. Popular biometrics

3.1. Fingerprint recognition
3.2. Face recognition
3.3. Speaker recognition
3.4. Iris recognition
3.5. Hand geometry
3.6. Signature verification

4. Other biometrics

4.1. GOUT
4.2. Recognition of the retina
4.3. Infrared imager
4.4. Walk
4.5. Pace of writing
4.6. Ear recognition
4.7. Gloss of the skin
4.8. Movement of the paragraph
4.9. The smell of the body

II. Performance and choice


5. Basic system errors

5.1. comparing
5.2. ROC curves
5.3. Error conditions "correct" for biometry
5.4. Negative authentication
5.5. compromises

6. Errors of identification systems

6.1. Outline of the problem
6.2. Standard assessment criteria
6.3. Identity based on the threshold
6.4. Rank-based identification

7. Performance testing

7.1. Performance measurements
7.2. The consequences of error rates
7.3. Face, finger, voice
7.4. Iris and hand
7.5. Signature
7.6. Summary of verification accuracy
7.7. Testing the identification system
7.8. claim

8. Choosing biometrics

8.1. Biometric attributes
8.2. Properties of applications
8.3. Rating options
8.4. Budget and cost
8.5. Advantages and disadvantages of biometrics
8.6. Myths and misconceptions about biometry

III. Issues regarding biometric systems


9. Creating and maintaining databases

9.1. Registration strategies
9.2. Zoo
9.3. Quality control of biometric samples
9.4. Training
9.5. Registration is system training

10. Large scale systems

10.1. Exemplary systems
10.2. Required accuracy
10.3. Adjusting the size of the comparator
10.4. Handling exceptions
10.5. Registration of voters
10.6. A national system of identity cards
10.7. How big is the scale?

11. Connecting information

11.1. Connection methods
11.2. Integration at the decision level
11.3. Integration at the scoring level
11.4. Other possibilities

12. Thwarting attacks

12.1. Pattern recognition model
12.2. Attacks on biometric identifiers
12.3. Attacks on input interfaces
12.4. Trick
12.5. Attacks on output interfaces
12.6. Other attacks
12.7. Combining smart cards with biometrics
12.8. Challenge and answer
12.9. Biometrics that can be invalidated

13. Interfaces, standards and databases

13.1. Interface standards
13.2. Database
13.3. Certifications
13.4. Legislation

IV. Mathematical analysis


14. The uniqueness of biometrics

14.1. Understanding uniqueness
14.2. Empirical research on uniqueness
14.3. Partial model of the iris
14.4. Uniqueness of fingerprints
14.5. Judicial evidence standards
14.6. Statements of fingerprint experts
14.7. Comments

15. System errors once again

15.1. Estimating the average value of the compliance score
15.2. The data is not independent
15.3. compartments
15.4. How good are the confidence intervals?

16. Advanced issues

16.1. What do you need to compare two comparators?
16.2. Data needed to compare comparators
16.3. Cost functions - details
16.4. Statistical tests with a fixed FRR or FAR
16.5. Biometric search and sorting - CMC curve
16.6. Biometric search and rank assignment
16.7. ROC or CMC curves

17. What next?

17.1. recommendations
17.2. Current issues
17.3. Future
17.4. Last word

Bibliography

Index
47255

Other products in the same category (16)