Biometric User Authentication for IT Security Biometric User Authentication for IT Security
Advances in Information Security

Biometric User Authentication for IT Security

From Fundamentals to Handwriting

    • $119.99
    • $119.99

Publisher Description

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.


Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.


Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security.

GENRE
Computers & Internet
RELEASED
2005
December 28
LANGUAGE
EN
English
LENGTH
296
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
2.5
MB
Biometrics and ID Management Biometrics and ID Management
2011
Biometric ID Management and Multimodal Communication Biometric ID Management and Multimodal Communication
2009
Securing Social Identity in Mobile Platforms Securing Social Identity in Mobile Platforms
2020
Advances in Biometrics Advances in Biometrics
2007
Handbook of Biometric Anti-Spoofing Handbook of Biometric Anti-Spoofing
2019
Handbook of Multibiometrics Handbook of Multibiometrics
2006
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007