Biometric User Authentication for IT Security Biometric User Authentication for IT Security
Advances in Information Security

Biometric User Authentication for IT Security

From Fundamentals to Handwriting

    • € 119,99
    • € 119,99

Beschrijving uitgever

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.


Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.


Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security.

GENRE
Computers en internet
UITGEGEVEN
2005
28 december
TAAL
EN
Engels
LENGTE
296
Pagina's
UITGEVER
Springer US
PROVIDER INFO
Springer Science & Business Media LLC
GROOTTE
2,5
MB
Intrusion Detection and Correlation Intrusion Detection and Correlation
2005
The Austin Protocol Compiler The Austin Protocol Compiler
2006
Security in E-Learning Security in E-Learning
2006
Impacts and Risk Assessment of Technology for Internet Security Impacts and Risk Assessment of Technology for Internet Security
2006
Hop Integrity in the Internet Hop Integrity in the Internet
2006
Understanding Intrusion Detection through Visualization Understanding Intrusion Detection through Visualization
2006