Biometric User Authentication for IT Security Biometric User Authentication for IT Security
Advances in Information Security

Biometric User Authentication for IT Security

From Fundamentals to Handwriting

    • 119,99 US$
    • 119,99 US$

Lời Giới Thiệu Của Nhà Xuất Bản

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.


Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.


Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security.

THỂ LOẠI
Máy Vi Tính & Internet
ĐÃ PHÁT HÀNH
2005
28 tháng 12
NGÔN NGỮ
EN
Tiếng Anh
ĐỘ DÀI
296
Trang
NHÀ XUẤT BẢN
Springer US
NGƯỜI BÁN
Springer Nature B.V.
KÍCH THƯỚC
2,5
Mb
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007