rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780750679671

Biometric Technologies and Verification Systems

by
  • ISBN13:

    9780750679671

  • ISBN10:

    0750679670

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2007-03-16
  • Publisher: Elsevier Science
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $83.95 Save up to $54.80
  • Buy New
    $83.87
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

    7-Day eTextbook Access 7-Day eTextbook Access

Summary

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in. * Contains elements such as Sidebars, Tips, Notes and URL links * Heavily illustrated with over 150 illustrations, screen captures, and photographs * Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

Table of Contents

Overview of Biometrics Technology and Verification Systems
What Is Biometrics?
Types of Biometrics Technology and Verification Systems
Biometrics Technology and Verification Systems Standards
How Biometrics Eye Analysis Technology Works
How Iris Pattern Recognition Works
How Retina Pattern Recognition Works
How Biometrics Facial Recognition Technology Works
How Video Face Recognition Works
How Facial Thermal Imaging in The Infrared Spectrum Works
How Biometrics Finger Scanning Analysis Technology Works
How Finger Image Capture Works
How Fingerscanning Verification and Recognition Works
How Biometrics Geometry Analysis Technology Works
How Hand Geometry Image Technology Works
How Finger Geometry Technology Works
How Biometrics Verification Technology Works
How Dynamic Signature Verification Technology Works
How Voice Recognition Technology Works
How Keystroke Dynamics Technology Works
How Palm Print Pattern Recognition Technology Works
How Vein Pattern Analysis Recognition Technology Works
How Ear Shape Analysis Technology Works
How Body Odor And/Or Scent Analysis and Other Advanced Technology Works
How DNA Measurement Technology Works
How Privacy Enhanced Biometrics Based Verification/Authentication Works
How Fingerprint Verification/Authentication Technology Works
Vulnerable Points of A Biometric Verification System
How Brute Force Attacks Work
How Data Hiding Technology Works
Image-Based Challenges/Response Methods
How Cancelable Biometrics Work
Large-Scale Implementation/Deployment of Biometrics Technologies and Verification Systems
Specialized Biometrics Enterprise Deployment
How to Implement Biometrics Technology and Verification Systems
Biometrics Solutions and Future Directions
How Mapping The Body Technology Works
Selecting Biometric Solutions
Biometric Benefits
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program