Матметоды и моделирование в биологии
  • формат pdf
  • размер 5.04 МБ
  • добавлен 31 января 2012 г.
Vielhauer C. Biometric User Authentication for IT Security. From Fundamentals to Handwriting
Издательство Springer, 2006, -287 pp.

Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric techniques have been implemented into authentication systems of apparently mature functionality. Although all biometric systems are subject to an intrinsic error-proneness, vendors argue for the accuracy of their systems by presenting statistical estimates or error probabilities, which suggest to be reasonably low for particular applications. With intentions like an expected integration of biometric features in travel documents in the near future, large-scale application of biometrics is becoming reality and consequently, an increasing number of people working in the IT domain will be confronted with biometric technology in the future. Thus, with the increasing diverseness of the different techniques, it is becoming more and more important for academic teachers, students and researchers as well as for practitioners, application designers and decision-makers in the IT security domain to understand the basic concepts, problems and limitations of authentication by biometrics. The goal and the uniqueness of this book are to impart knowledge to these people by expanding in two dimensions.
The horizontal dimension will educate the reader about the common principles in system design and evaluation of biometric systems in general, over the spectrum of the most relevant biometric techniques. Here, we will introduce to the state-of-the-art in biometric recognition across the variety of different modalities, including physiological traits such as fingerprint and iris recognition, as well as behavior such as voice or handwriting, and put them in context of the general theory of user authentication in IT security. For the system design part, we look at the systematic development of a generic process model, and provide an overview of implementation examples, along with references to selected signal and image processing methods, as well as classification techniques. The part on evaluation discusses the fundamental causes of inaccuracy of biometric systems and introduces mechanisms for experimental determination of quantitative figures in terms of error rates. Specifically for the most relevant biometrics, state-of-the-art recognition rates and references to technical details are presented for physiological methods based on face, fingerprint, iris, retina, ear and hand modalities, as well as for behavior-based approaches for voice, handwriting, gait, lip movement and keystroke dynamics. This comparative discussion will enable the reader to differentiate technical principles, potential applications and expected recognition accuracy across the zoo of different biometric schemes
Away from the scientific disciplines of signal processing and patte recognition, biometrics can also be viewed from the perspective of IT security. Here, biometrics represents just another possibility for user authentication, besides well-established possession and knowledge-based methods. For taking care of this aspect, the book will provide insights in a formal model for the user authentication problem, as well as security requirements within all types of authentication systems. As one of the view publications in this area, it will be demonstrated how biometrics fit into this IT security-based model and where security problems can be found here. In the vertical dimension, the book expands into very detailed algorithm designs and evaluation methodology for active biometric modalities on the specific example of handwriting dynamics. These parts of the book present a new approach to systematic testing of biometric algorithms, based on modeling of different types of sensor hardware and a forgery classification of attacks. Furthermore, algorithm examples for user verification and cryptographic key generation from handwriting dynamics are presented mathematically and explained in detail. It will be discussed in a very detailed manner, how experimental evaluations in various parameterizations can be performed. While in these excursions, we expand on one single modality, online handwriting, the underlying concepts are by no means limited to handwriting and these reflections are thus relevant to other biometric methods as well.
Both dimensions of the book convey true novelties both in educational and in scientific aspects. The perception of biometric user authentication from IT security unveils very descriptively the necessity for not considering biometrics as a black box tool to achieve security in IT, but also the requirement of securing biometric systems in themselves. The presentation of a new evaluation methodology shows the reader how experimental scenarios can be designed to simulate real-world scenarios of skilled forgeries and varying sensor types. Scientifically, as well as relevant for application designers, the main novelties of the book consist of new findings on the impact of forgery efforts and sensor characteristics to the recognition accuracy of biometric systems and the presentation of a new algorithm to secure biometric references.

Introduction
Part I: Fundamentals - Overview
Fundamentals in Biometrics
Biometric Modalities
Fundamentals in User Authentication
Part II: Handwriting Biometrics - Overview
Evaluating Handwriting Biometrics
Biometric Hash
User Verification
Смотрите также

Bergeron B. Bioinformatics Computing

  • формат pdf
  • размер 5.2 МБ
  • добавлен 20 июня 2011 г.
Издательство Prentice Hall, 2002, -395 pp. Bioinformatics Computing is a practical guide to computing in the burgeoning field of bioinformatics—the study of how information is represented and transmitted in biological systems, starting at the molecular level. This book, which is intended for molecular biologists at all levels of training and practice, assumes the reader is computer literate with modest computer skills, but has little or no forma...

Li S.Z., Jain A.K. (eds.) Encyclopedia of Biometrics

Энциклопедия
  • формат pdf
  • размер 37.35 МБ
  • добавлен 07 октября 2011 г.
Издательство Springer, 2009, -1445 pp. The Encyclopedia of Biometrics provides a comprehensive reference to concepts, technologies, issues, and trends in the field of biometrics. The volume covers all important aspects – research, development, and applications, including biometric sensors and devices, methods and algorithms, sample quality, system design and implementation, databases, performance testing, information security, and standardizatio...

Maltoni D., Maio M., Jain A.K., Prabhakar S. Handbook of Fingerprint Recognition

  • формат pdf
  • размер 8.24 МБ
  • добавлен 06 декабря 2011 г.
Издательство Springer, 2009, -506 pp. Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and automatically recognizing a person. Questions such as Is this person authorized to enter the facility?, Is this individual entitled to access the privileged information?, and Did this person previously apply for a passport? are routinely asked in a variety of organizations in both person’s identity. Because biometric...

Riaz R. (ed.) Biometric Systems, Design and Applications

  • формат pdf
  • размер 5.35 МБ
  • добавлен 28 октября 2011 г.
Издательство InTech, 2011, -274 pp. Biometric authentication has been widely used for access control and security systems over the past few years. It is the study of the physiological (biometric) and behavioral (soft-biometric) traits of humans which are required to classify them. A general biometric system consists of different modules including single or multi-sensor data acquisition, enrollment, feature extraction and classification. A person...

Tistarelli M., Li S.Z., Chellappa R. (eds.) Handbook of Remote Biometrics for Surveillance and Security

  • формат pdf
  • размер 26.62 МБ
  • добавлен 11 января 2012 г.
Издательство Springer, 2009, -379 pp. Biometric is a multidimensional problem which is aimed at understanding the uniqueness of human beings to facilitate recognition. In reality, the dimensionality not only comes from the data, as engineers and computer scientists would think of, but more from the intrinsic nature of the recognition process.We expect to be able to recognize people without errors (D1), at a distance of 1–20 meters (D2), in motio...

Yang J. (ed.) Biometrics

  • формат pdf
  • размер 13.15 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -278 pp. Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The key objective of the book is to provide comprehensive reference and text on human authenticatio...

Yang J., Nanni L. (eds.) State of the Art in Biometrics

  • формат pdf
  • размер 20.48 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -326 pp. Biometric recognition is one of the most widely studied problems in computer science. The use of biometrics techniques, such as face, fingerprints, iris, ears, is a solution for obtaining a secure personal identification. However, the old biometrics identification techniques are out of date. The goal of this book is to provide the reader with the most up to date research performed in biometric recognition and...

Yang J., Poh N. (ed.) Recent Application in Biometrics

  • формат pdf
  • размер 25.13 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -314 pp. In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a co...

Yanushkevich S.N., Wang P.S.P., Gavrilova M.L., Srihari S.N. (eds.) Image Pattern Recognition. Synthesis and Analysis in Biometrics

  • формат pdf
  • размер 6.51 МБ
  • добавлен 12 января 2012 г.
Издательство World Scientific, 2007, -453 pp. Computer Vision and Computer Graphics can be thought of as opposite sides of the same coin. In computer graphics we start, for example, with a three-dimensional model of a face, and we attempt to render or project this model onto a two-dimensional surface to create an image of the face. In computer vision we attempt to do the opposite — we start with a two-dimensional image of the face and we try to...

Zhang D., Jing X., Yang, J. Biometric Image Discrimination Technologies

  • формат pdf
  • размер 14.38 МБ
  • добавлен 04 октября 2011 г.
Издательство Idea Group, 2006, -291 pp. Personal identification and verification both play a critical role in our society. Today, more and more business activities and work practices are computerized. E-commerce applications, such as e-banking, or security applications, such as building access, demand fast, real-time and accurate personal identification. Traditional knowledge-based or token-based personal identification or verification systems a...