Biometric User Authentication for IT Security Biometric User Authentication for IT Security
Advances in Information Security

Biometric User Authentication for IT Security

From Fundamentals to Handwriting

    • USD 119.99
    • USD 119.99

Descripción editorial

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.


Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.


Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security.

GÉNERO
Informática e Internet
PUBLICADO
2005
28 de diciembre
IDIOMA
EN
Inglés
EXTENSIÓN
296
Páginas
EDITORIAL
Springer US
VENTAS
Springer Nature B.V.
TAMAÑO
2.5
MB

Más libros de Claus Vielhauer

Otros libros de esta serie

Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024
Security and Risk Analysis for Intelligent Edge Computing Security and Risk Analysis for Intelligent Edge Computing
2023
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
2023
Blockchain for Cybersecurity in Cyber-Physical Systems Blockchain for Cybersecurity in Cyber-Physical Systems
2023