Матметоды и моделирование в биологии
  • формат pdf
  • размер 8.24 МБ
  • добавлен 06 декабря 2011 г.
Maltoni D., Maio M., Jain A.K., Prabhakar S. Handbook of Fingerprint Recognition
Издательство Springer, 2009, -506 pp.

Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and automatically recognizing a person. Questions such as Is this person authorized to enter the facility?, Is this individual entitled to access the privileged information?, and Did this person previously apply for a passport? are routinely asked in a variety of organizations in both person’s identity. Because biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for person recognition than traditional token- (e.g., keys or ID cards) or knowledge- (e.g., password or PIN) based methods. Biometric recognition provides better security, higher efficiency, and, in many instances, increased user convenience. It is for these reasons that biometric recognition systems are being increasingly deployed in a large number of govement (e.g., border crossing, national ID card, e-passports) and civilian (e.g., computer network logon, mobile phone, Web access, smartcard) applications.
A number of biometric technologies have been developed and several of them have been successfully deployed. Among these, fingerprints, face, iris, voice, and hand geometry are the ones that are most commonly used. Each biometric trait has its strengths and weaknesses and the choice of a particular trait typically depends on the requirements of the application. Various biometric identifiers can also be compared on the following factors; universality, distinctiveness, permanence, collectability, performance, acceptability and circumvention. Because of the well-known distinctiveness (individuality) and persistence properties of fingerprints as well as cost and maturity of products, fingerprints are the most widely deployed biometric characteristics. It is generally believed that the patte on each finger is unique. Given that there are about 6.5 billion living people on Earth and assuming each person has 10 fingers, there are 65 billion unique fingers! In fact, fingerprints and biometrics are often considered synonyms! Fingerprints were first introduced as a method for person identification over 100 years back. Now, every forensics and law enforcement agency worldwide routinely uses automatic fingerprint identification systems (AFIS). While law enforcement agencies were the earliest adopters of the fingerprint recognition technology, increasing conces about national public and private sectors. Traditional credential based systems no longer suffice to verify a behavioral characteristics or identifiers (e.g., fingerprints, face, iris, voice, hand geometry) for security, financial fraud and identity fraud have created a growing need for fingerprint technology for person recognition in a number of non-forensic applications.
Fingerprint recognition system can be viewed as a patte recognition system. Designing algorithms capable of extracting salient features from fingerprints and matching them in a robust way are quite challenging problems. This is particularly so when the users are uncooperative, the finger surface is dirty or scarred and the resulting fingerprint image quality is poor. There is a popular misconception that automatic fingerprint recognition is a fully solved problem since automatic fingerprint systems have been around for almost 40 years. On the contrary, fingerprint recognition is still a challenging and important patte recognition problem because of the large intra-class variability and large inter-class similarity in fingerprint pattes. This book reflects the progress made in automatic techniques for fingerprint recognition over the past 4 decades. We have attempted to organize, classify and present hundreds of existing approaches to feature extraction and matching in a systematic way. We hope this book would be of value to researchers interested in making contributions to this area, and system integrators and experts in different application domains who desire to explore not only the general concepts but also the intricate details of this fascinating technology.

Introduction
Fingerprint Sensing
Fingerprint Analysis and Representation
Fingerprint Matching
Fingerprint Classification and Indexing
Synthetic Fingerprint Generation
Biometric Fusion
Fingerprint Individuality
Securing Fingerprint Systems
Смотрите также

Bremer M., Doerge R.W. Statistics at the Bench: A Step-by-Step Handbook for Biologists

  • формат pdf
  • размер 10.23 МБ
  • добавлен 03 октября 2011 г.
Laboratory Press, 2009. - 200 pages. Statistics at the Bench is a convenient bench-side companion for biologists, designed as a handy reference guide for elementary and intermediate statistical analyses. The expectations for biologists to have a more complete understanding of statistics are growing rapidly. New technologies and new areas of science, such as microarrays, next-generation sequencing, and proteomics, have dramatically increased the...

Dasgupta D., Nino L.F. Immunological Computation: Theory and Applications

  • формат pdf
  • размер 3.96 МБ
  • добавлен 03 декабря 2011 г.
CRC Press,Taylor & Francis Group and Auerbach Publications, 2009, 277 pages Clearly, nature has been very effective in creating organisms that are capable of protecting themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The powerful information-processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors...

Li S.Z., Jain A.K. (eds.) Encyclopedia of Biometrics

Энциклопедия
  • формат pdf
  • размер 37.35 МБ
  • добавлен 07 октября 2011 г.
Издательство Springer, 2009, -1445 pp. The Encyclopedia of Biometrics provides a comprehensive reference to concepts, technologies, issues, and trends in the field of biometrics. The volume covers all important aspects – research, development, and applications, including biometric sensors and devices, methods and algorithms, sample quality, system design and implementation, databases, performance testing, information security, and standardizatio...

Riaz R. (ed.) Biometric Systems, Design and Applications

  • формат pdf
  • размер 5.35 МБ
  • добавлен 28 октября 2011 г.
Издательство InTech, 2011, -274 pp. Biometric authentication has been widely used for access control and security systems over the past few years. It is the study of the physiological (biometric) and behavioral (soft-biometric) traits of humans which are required to classify them. A general biometric system consists of different modules including single or multi-sensor data acquisition, enrollment, feature extraction and classification. A person...

Tistarelli M., Li S.Z., Chellappa R. (eds.) Handbook of Remote Biometrics for Surveillance and Security

  • формат pdf
  • размер 26.62 МБ
  • добавлен 11 января 2012 г.
Издательство Springer, 2009, -379 pp. Biometric is a multidimensional problem which is aimed at understanding the uniqueness of human beings to facilitate recognition. In reality, the dimensionality not only comes from the data, as engineers and computer scientists would think of, but more from the intrinsic nature of the recognition process.We expect to be able to recognize people without errors (D1), at a distance of 1–20 meters (D2), in motio...

Vielhauer C. Biometric User Authentication for IT Security. From Fundamentals to Handwriting

  • формат pdf
  • размер 5.04 МБ
  • добавлен 31 января 2012 г.
Издательство Springer, 2006, -287 pp. Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric techniques have been implemented into authentication systems...

Yang J. (ed.) Biometrics

  • формат pdf
  • размер 13.15 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -278 pp. Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The key objective of the book is to provide comprehensive reference and text on human authenticatio...

Yang J., Nanni L. (eds.) State of the Art in Biometrics

  • формат pdf
  • размер 20.48 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -326 pp. Biometric recognition is one of the most widely studied problems in computer science. The use of biometrics techniques, such as face, fingerprints, iris, ears, is a solution for obtaining a secure personal identification. However, the old biometrics identification techniques are out of date. The goal of this book is to provide the reader with the most up to date research performed in biometric recognition and...

Yang J., Poh N. (ed.) Recent Application in Biometrics

  • формат pdf
  • размер 25.13 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -314 pp. In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a co...

Zhang D., Jing X., Yang, J. Biometric Image Discrimination Technologies

  • формат pdf
  • размер 14.38 МБ
  • добавлен 04 октября 2011 г.
Издательство Idea Group, 2006, -291 pp. Personal identification and verification both play a critical role in our society. Today, more and more business activities and work practices are computerized. E-commerce applications, such as e-banking, or security applications, such as building access, demand fast, real-time and accurate personal identification. Traditional knowledge-based or token-based personal identification or verification systems a...