Biometric Technology : Authentication, Biocryptography, and Cloud-Based Architecture
Biometric Technology : Authentication, Biocryptography, and Cloud-Based Architecture
Click to enlarge
Author(s): Das, Ravi
ISBN No.: 9781466592452
Pages: 374
Year: 201411
Format: Trade Cloth (Hard Cover)
Price: $ 273.00
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

An Introduction to Biometrics Our Unique Features: Physiological and Behavioral How Our Unique Features Can Positively Identify Us: The World of Biometrics A Formal Definition of Biometrics What Is Recognition? Physiological and Behavioral Biometrics What the Future Holds The Granular Components of Recognition Defining the Biometric Template The Mathematical Files of the Biometric Templates Understanding Some of the Myths Behind Biometrics Understanding the Differences of Verification and Enrollment Templates Summary of Points Covered The Biometric Process Illustrated      For the CIO: What Biometric System to Procure?       For the CIO: Important KPIs to Be Examined Looking beyond the KPI U.S. Federal Government Biometric Metrics and KPI      Biometric Data Interchange Formats       Common Biometric Exchange Format Framework       Biometric Technical Interface Standards U.S. Federal Government Biometric Testing Standards A Review of Biometric Sensors       Optical Scanners       Solid-State Sensors      Ultrasound Sensors      Temperature Differential Sensors       Multispectral Imaging Sensors       Touchless Fingerprint Sensors            CCD Cameras            3-D Sensors/Review of Biometric Sensors in Use      The Disadvantages of Sensors       Typical Biometric Market Segments            Logical Access Control           Physical Access Control            Time and Attendance       Law Enforcement       Surveillance Review of Chapter 1 A Review of the Present and Future Biometric Technologies The Biometric Technologies of Today: Physical and Behavioral Differences between Physical Biometrics and Behavioral Biometrics Which One to Use: Physical or Behavioral Biometrics? Fingerprint Recognition       The Unique Features       The Process of Fingerprint Recognition       Fingerprint Recognition Quality Control Checks       Methods of Fingerprint Collection       The Matching Algorithm      Fingerprint Recognition: Advantages and Disadvantages       Market Applications of Fingerprint Recognition Hand Geometry Recognition       Hand Geometry Recognition: Enrollment Process       Hand Geometry Recognition: Advantages and Disadvantages Vein Pattern Recognition       Components of Vein Pattern Recognition       How Vein Pattern Recognition Works       Vein Pattern Recognition: Advantages and Disadvantages Palm Print Recognition      How Palm Print Recognition Works       Palm Print Recognition: Advantages and Disadvantages Facial Recognition       Facial Recognition: How It Works       Defining the Effectiveness of a Facial Recognition System      Techniques of Facial Recognition      Facial Recognition: Advantages and Disadvantages       Applications of Facial Recognition The Eye: The Iris and the Retina       The Iris      The Physiological Structure of the Iris       Iris Recognition: How It Works      The Market Applications of Iris Recognition      Iris Recognition: Advantages and Disadvantages      The Retina      The Physiology of the Retina      The Process of Retinal Recognition       Retinal Recognition: Advantages and Disadvantages Voice Recognition       Voice Recognition: How It Works       Factors Affecting Voice Recognition       Voice Recognition: Advantages and Disadvantages      The Market Applications of Voice Recognition Signature Recognition       The Differences between a Signature and Signature Recognition      Signature Recognition: How It Works       Signature Recognition: Advantages and Disadvantages Keystroke Recognition      Keystroke Recognition: How It Works       Keystroke Recognition: Advantages and Disadvantages Biometric Technologies of the Future DNA Recognition       DNA Recognition: How It Works       DNA Recognition: Advantages and Disadvantages Gait Recognition       The Process behind Gait Recognition      Gait Recognition: Advantages and Disadvantages Earlobe Recognition       Earlobe Recognition: How It Works      Earlobe Recognition: Advantages and Disadvantages Review of Chapter 2 For the C-Level Executive: A Biometrics Project Management Guide Biometric Technology System Architecture Sensing and Data Acquisition       Multimodal Biometric Systems      Single Sign-On Solutions       Implementing a Multimodal Biometric System      Challenges with Multimodal Biometric Systems Signal and Image Processing      Preprocessing of the Biometric Raw Image      Quality Control Checks       Image Enhancement      Feature Extraction       Postprocessing       Data Compression Data Storage       Search and Retrieval Techniques      Database Search Algorithms      Backup and Recovery of the Database      Database Configurations Template Matching Threshold Decision Making Administration Decision Making       Biometric Templates Adaptation       Establishment of the Security Threshold Values      Reporting and Control       System Mode Adjustment      Privileges to End Users Data Transmission Biometrics Project Management       System Concepts and Classification Schemes       Upgrading to a Newer Biometric System?      The Feasibility Study       Application Classifiers       System Design and Interoperability Factors and Considerations      COTS -Based Biometric Systems       Proprietary or Open-Ended System?      Infrastructure Assessment       The Human Equation      Ergonomic Issues       The Feedback System       Population Dynamics       Systems Requirements Analysis       System Requirements Elicitation      System Requirement Analysis and Regulation      System Requirements Documentation       System Requirements Validation       Biometric System Specifications      System Architectural and Processing Designs       Storage and Matching Combinations      Operational Architecture Design--Multimodal Systems      The Information Processing Architecture      Subsystem Analysis and Design      Data Storage Subsystem Design Considerations      Database Management System       Determining the Security Threshold       Subsystem Implementation and Testing       System Deployment and Integration      Middleware       The Biometric Interface       End User/Administrator Training      System Maintenance       Upgrading an Existing System/Fine Tuning       System Reports and.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...