語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Biometric-Based Physical and Cyberse...
~
Obaidat, Mohammad S.
Biometric-Based Physical and Cybersecurity Systems
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Biometric-Based Physical and Cybersecurity Systems/ edited by Mohammad S. Obaidat, Issa Traore, Isaac Woungang.
其他作者:
Obaidat, Mohammad S.
面頁冊數:
XVIII, 590 p. 307 illus., 151 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Signal processing. -
電子資源:
https://doi.org/10.1007/978-3-319-98734-7
ISBN:
9783319987347
Biometric-Based Physical and Cybersecurity Systems
Biometric-Based Physical and Cybersecurity Systems
[electronic resource] /edited by Mohammad S. Obaidat, Issa Traore, Isaac Woungang. - 1st ed. 2019. - XVIII, 590 p. 307 illus., 151 illus. in color.online resource.
Introduction -- Part 1: Advances in Legacy Technologies -- Advances in Fingerprint Technology -- Recognition-based on Eye Biometrics Iris and Retina -- 3D Hand Geometry Recognition -- Fundamentals and Advances in 3D Face Recognition -- Part 2: Emerging Technologies -- Advances in Key Stroke Dynamics-based Security Schemes -- Behavioral Biometrics Based on Human-Computer Interaction Devices -- Continuous Authentication Using Writing Style -- Facets and Promises of Gait Biometrics Recognition -- Online Signature-based Biometrics Recognition -- EEG-based Biometrics -- Part 3: Hybrid Technologies -- Multimodal Biometrics Invariant Fusion Techniques -- Biometrics Based on Healthcare Sensors -- Biometric Authentication for Wearables -- Cognitive Biometrics for User Authentication -- Finger Knuckle based multi-biometrics authentication systems -- Part 4: Enabling Technologies -- Leveraging Cloud-based Resources for Automated Biometric Identification -- Automated Biometric Authentication with Cloud Computing -- Biometrics Security and Internet of Things -- Part 5: Technology and Society -- Protecting the Integrity of Elections using Biometrics -- Ethical, Legal, and Social Implications of Biometrics Technologies -- Conclusion.
This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.
ISBN: 9783319987347
Standard No.: 10.1007/978-3-319-98734-7doiSubjects--Topical Terms:
561459
Signal processing.
LC Class. No.: TK5102.9
Dewey Class. No.: 621.382
Biometric-Based Physical and Cybersecurity Systems
LDR
:03614nam a22004215i 4500
001
1008760
003
DE-He213
005
20200704193516.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783319987347
$9
978-3-319-98734-7
024
7
$a
10.1007/978-3-319-98734-7
$2
doi
035
$a
978-3-319-98734-7
050
4
$a
TK5102.9
050
4
$a
TA1637-1638
072
7
$a
TTBM
$2
bicssc
072
7
$a
TEC008000
$2
bisacsh
072
7
$a
TTBM
$2
thema
072
7
$a
UYS
$2
thema
082
0 4
$a
621.382
$2
23
245
1 0
$a
Biometric-Based Physical and Cybersecurity Systems
$h
[electronic resource] /
$c
edited by Mohammad S. Obaidat, Issa Traore, Isaac Woungang.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XVIII, 590 p. 307 illus., 151 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Part 1: Advances in Legacy Technologies -- Advances in Fingerprint Technology -- Recognition-based on Eye Biometrics Iris and Retina -- 3D Hand Geometry Recognition -- Fundamentals and Advances in 3D Face Recognition -- Part 2: Emerging Technologies -- Advances in Key Stroke Dynamics-based Security Schemes -- Behavioral Biometrics Based on Human-Computer Interaction Devices -- Continuous Authentication Using Writing Style -- Facets and Promises of Gait Biometrics Recognition -- Online Signature-based Biometrics Recognition -- EEG-based Biometrics -- Part 3: Hybrid Technologies -- Multimodal Biometrics Invariant Fusion Techniques -- Biometrics Based on Healthcare Sensors -- Biometric Authentication for Wearables -- Cognitive Biometrics for User Authentication -- Finger Knuckle based multi-biometrics authentication systems -- Part 4: Enabling Technologies -- Leveraging Cloud-based Resources for Automated Biometric Identification -- Automated Biometric Authentication with Cloud Computing -- Biometrics Security and Internet of Things -- Part 5: Technology and Society -- Protecting the Integrity of Elections using Biometrics -- Ethical, Legal, and Social Implications of Biometrics Technologies -- Conclusion.
520
$a
This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.
650
0
$a
Signal processing.
$3
561459
650
0
$a
Image processing.
$3
557495
650
0
$a
Speech processing systems.
$3
564428
650
0
$a
Biometrics (Biology).
$3
1249740
650
0
$a
System safety.
$3
639363
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Signal, Image and Speech Processing.
$3
670837
650
2 4
$a
Biometrics.
$3
677095
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Systems and Data Security.
$3
677062
700
1
$a
Obaidat, Mohammad S.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
681629
700
1
$a
Traore, Issa.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1105994
700
1
$a
Woungang, Isaac.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
856770
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319987330
776
0 8
$i
Printed edition:
$z
9783319987354
776
0 8
$i
Printed edition:
$z
9783030075262
856
4 0
$u
https://doi.org/10.1007/978-3-319-98734-7
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入