Biometric User Authentication for It Security: From Fundamentals to Handwriting 2006 Edition Contributor(s): Vielhauer, Claus (Author) |
|
![]() |
ISBN: 038726194X ISBN-13: 9780387261942 Publisher: Springer OUR PRICE: $104.49 Product Type: Hardcover - Other Formats Published: September 2005 Annotation: Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. |
Additional Information |
BISAC Categories: - Computers | Computer Vision & Pattern Recognition - Computers | Computer Science - Computers | Information Technology |
Dewey: 006.4 |
LCCN: 2005051561 |
Series: Advances in Information Security |
Physical Information: 0.81" H x 6.42" W x 9.54" (1.35 lbs) 284 pages |
Descriptions, Reviews, Etc. |
Publisher Description: Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. |