Матметоды и моделирование в биологии
  • формат pdf
  • размер 5.35 МБ
  • добавлен 28 октября 2011 г.
Riaz R. (ed.) Biometric Systems, Design and Applications
Издательство InTech, 2011, -274 pp.

Biometric authentication has been widely used for access control and security systems over the past few years. It is the study of the physiological (biometric) and behavioral (soft-biometric) traits of humans which are required to classify them. A general biometric system consists of different modules including single or multi-sensor data acquisition, enrollment, feature extraction and classification. A person can be identified on the basis of different physiological traits like fingerprints, live scans, faces, iris, hand geometry, gait, ear patte and thermal signature etc. Behavioral or soft-biometric attributes could be helpful in classifying different persons however they have less discrimination power as compared to biometric attributes. For instance, facial expression recognition, height, gender etc. The choice of a biometric feature can be made on the basis of different factors like reliability, universality, uniqueness, nonintrusiveness and its discrimination power depending upon its application. Besides conventional applications of the biometrics in security systems, access and documentation control, different emerging applications of these systems have been discussed in this book. These applications include Human Robot Interaction (HRI), behavior in online leaing and medical applications like finding cholesterol level in iris patte. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics.
Over the past few years, a major part of the revenue collected from the biometric industry is obtained from fingerprint identification systems and Automatic Fingerprint Identification Systems (AFIS) due to their reliability, collectability and application in document classification (e.g. biometric passports and identity cards). Section I provides details about the development of fingerprint identification and verification system and a new approach called finger-vein recognition which studies the vein pattes in the fingers. Finger-vein identification system has immunity to counterfeit, active liveliness, user friendliness and permanence over the conventional fingerprints identification systems. Fingerprints are easy to spoof however current approaches like liveliness detection and finger-vein patte identification can easily cope with such challenges. Moreover, reliability measure of fingerprint systems using Weibull approach is described in detail.
Human faces are preferred over the other biometric systems due to their non-intrusive nature and applications at different public places for biometric and soft-biometric classification. Section II of the book describes detailed study on the segmentation, recognition and modeling of the human faces. A stand-alone system for 3D human face modeling from a single image has been developed in detail. This system is applied to HRI applications. The model parameters from a single face image contain identity, facial expressions, gender, age and ethnical information of the person and therefore can be applied to different public places for interactive applications.
Moreover face identification in images and videos is studied using transform domains which include subspace leaing methods like PCA, ICA and LDA and transforms like wavelet and cosine transforms. The features extracted from these methods are comparatively studied by using different standard classifiers. A novel approach towards face segmentation in cluttered backgrounds has also been described which provides an image descriptor based on self-similarities which captures the general structure of an image.
Current iris pattes recognition systems are reliable but collectability is the major challenge for them. A thorough study along with design and development of iris recognition systems has been provided in section III of this book. Image segmentation, normalization, feature extraction and classification stages are studied in detail. Besides conventional iris recognition systems, this section provides medical application to find presence of cholesterol level in iris patte.
Finally, the last section of the book provides different biometric and soft-biometric systems. This provides management policies of the biometric systems, signature verification, pressure based system which uses signature and keyboard typing, behavior analysis of simultaneous singing and piano playing application for students of different categories and design of a portable biometric system that can measure the amount of absorption of the visible collimated beam that passes by the sample to know the absorbance of the sample.
In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time provides state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications.

Part 1 Fingerprints Verification and Identification
Reliability of Fingerprint Biometry (Weibull Approach)
Finger-Vein Recognition Based on Gabor Features
Efficient Fingerprint Recognition Through Improvement of Feature Level Clustering, Indexing and Matching Using Discrete Cosine Transform
Part 2 Face Recognition
Facial Identification Based on Transform Domains for Images and Videos
Towards Unconstrained Face Recognition Using 3D Face Model
Digital Signature: A Novel Adaptative Image Segmentation Approach
Part 3 Iris Segmentation and Identification
Solutions for Iris Segmentation
Detecting Cholesterol Presence with Iris Recognition Algorithm
Robust Feature Extraction and Iris Recognition for Biometric Personal Identification
Iris Recognition System Using Support Vector Machines
Part 4 Other Biometrics
Verification of the Effectiveness of Blended Leaing in Teaching Performance Skills for Simultaneous Singing and Piano Playing
Portable Biometric System of High Sensitivity Absorption Detection
Texture Analysis for Off-Line Signature Verification
Design and Evaluation of a Pressure Based Typing Biometric Authentication System
Смотрите также

Amaro A., Reed D., Soares P. (editors) Modelling Forest Systems

  • формат pdf
  • размер 4.55 МБ
  • добавлен 18 апреля 2011 г.
CABI Publishing, 2002. - 432 pages. There are many theoretical approaches to modelling forest systems, but not all of them have valid practical applications. This book reviews current thinking on various models and explores a variety of areas and approaches. The papers in this book have been selected and developed from those presented at a workshop held in Portugal in June 2002. The topics covered include: forest reality and modelling strategies...

Li S.Z., Jain A.K. (eds.) Encyclopedia of Biometrics

Энциклопедия
  • формат pdf
  • размер 37.35 МБ
  • добавлен 07 октября 2011 г.
Издательство Springer, 2009, -1445 pp. The Encyclopedia of Biometrics provides a comprehensive reference to concepts, technologies, issues, and trends in the field of biometrics. The volume covers all important aspects – research, development, and applications, including biometric sensors and devices, methods and algorithms, sample quality, system design and implementation, databases, performance testing, information security, and standardizatio...

Maltoni D., Maio M., Jain A.K., Prabhakar S. Handbook of Fingerprint Recognition

  • формат pdf
  • размер 8.24 МБ
  • добавлен 06 декабря 2011 г.
Издательство Springer, 2009, -506 pp. Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and automatically recognizing a person. Questions such as Is this person authorized to enter the facility?, Is this individual entitled to access the privileged information?, and Did this person previously apply for a passport? are routinely asked in a variety of organizations in both person’s identity. Because biometric...

Tistarelli M., Li S.Z., Chellappa R. (eds.) Handbook of Remote Biometrics for Surveillance and Security

  • формат pdf
  • размер 26.62 МБ
  • добавлен 11 января 2012 г.
Издательство Springer, 2009, -379 pp. Biometric is a multidimensional problem which is aimed at understanding the uniqueness of human beings to facilitate recognition. In reality, the dimensionality not only comes from the data, as engineers and computer scientists would think of, but more from the intrinsic nature of the recognition process.We expect to be able to recognize people without errors (D1), at a distance of 1–20 meters (D2), in motio...

Vielhauer C. Biometric User Authentication for IT Security. From Fundamentals to Handwriting

  • формат pdf
  • размер 5.04 МБ
  • добавлен 31 января 2012 г.
Издательство Springer, 2006, -287 pp. Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric techniques have been implemented into authentication systems...

Yang J. (ed.) Biometrics

  • формат pdf
  • размер 13.15 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -278 pp. Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The key objective of the book is to provide comprehensive reference and text on human authenticatio...

Yang J., Nanni L. (eds.) State of the Art in Biometrics

  • формат pdf
  • размер 20.48 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -326 pp. Biometric recognition is one of the most widely studied problems in computer science. The use of biometrics techniques, such as face, fingerprints, iris, ears, is a solution for obtaining a secure personal identification. However, the old biometrics identification techniques are out of date. The goal of this book is to provide the reader with the most up to date research performed in biometric recognition and...

Yang J., Poh N. (ed.) Recent Application in Biometrics

  • формат pdf
  • размер 25.13 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -314 pp. In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a co...

Yanushkevich S.N., Wang P.S.P., Gavrilova M.L., Srihari S.N. (eds.) Image Pattern Recognition. Synthesis and Analysis in Biometrics

  • формат pdf
  • размер 6.51 МБ
  • добавлен 12 января 2012 г.
Издательство World Scientific, 2007, -453 pp. Computer Vision and Computer Graphics can be thought of as opposite sides of the same coin. In computer graphics we start, for example, with a three-dimensional model of a face, and we attempt to render or project this model onto a two-dimensional surface to create an image of the face. In computer vision we attempt to do the opposite — we start with a two-dimensional image of the face and we try to...

Zhang D., Jing X., Yang, J. Biometric Image Discrimination Technologies

  • формат pdf
  • размер 14.38 МБ
  • добавлен 04 октября 2011 г.
Издательство Idea Group, 2006, -291 pp. Personal identification and verification both play a critical role in our society. Today, more and more business activities and work practices are computerized. E-commerce applications, such as e-banking, or security applications, such as building access, demand fast, real-time and accurate personal identification. Traditional knowledge-based or token-based personal identification or verification systems a...