Biometric Solutions: For Authentication in an E-World: The Springer International Series in Engineering and Computer Science, cartea 697
Editat de David D. Zhangen Limba Engleză Hardback – 31 aug 2002
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 952.57 lei 6-8 săpt. | |
Springer Us – 23 oct 2012 | 952.57 lei 6-8 săpt. | |
Hardback (1) | 957.13 lei 6-8 săpt. | |
Springer Us – 31 aug 2002 | 957.13 lei 6-8 săpt. |
Din seria The Springer International Series in Engineering and Computer Science
- Preț: 119.98 lei
- 24% Preț: 1041.97 lei
- 20% Preț: 422.81 lei
- Preț: 206.36 lei
- 20% Preț: 313.26 lei
- 20% Preț: 643.50 lei
- 18% Preț: 1225.62 lei
- 18% Preț: 965.02 lei
- 20% Preț: 646.12 lei
- 18% Preț: 948.79 lei
- 20% Preț: 646.62 lei
- 15% Preț: 637.46 lei
- 20% Preț: 643.83 lei
- 18% Preț: 949.23 lei
- 20% Preț: 644.48 lei
- 20% Preț: 994.92 lei
- 20% Preț: 645.97 lei
- 18% Preț: 946.87 lei
- 20% Preț: 995.57 lei
- 18% Preț: 956.99 lei
- 20% Preț: 644.98 lei
- 15% Preț: 649.54 lei
- 18% Preț: 950.21 lei
- 18% Preț: 1221.38 lei
- 18% Preț: 957.62 lei
- 15% Preț: 643.99 lei
- 18% Preț: 948.47 lei
- 18% Preț: 947.35 lei
- 20% Preț: 1284.65 lei
Preț: 957.13 lei
Preț vechi: 1167.23 lei
-18% Nou
Puncte Express: 1436
Preț estimativ în valută:
183.19€ • 188.79$ • 154.66£
183.19€ • 188.79$ • 154.66£
Carte tipărită la comandă
Livrare economică 01-15 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781402071423
ISBN-10: 1402071426
Pagini: 451
Ilustrații: XIV, 451 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.78 kg
Ediția:2002
Editura: Springer Us
Colecția Springer
Seria The Springer International Series in Engineering and Computer Science
Locul publicării:New York, NY, United States
ISBN-10: 1402071426
Pagini: 451
Ilustrații: XIV, 451 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.78 kg
Ediția:2002
Editura: Springer Us
Colecția Springer
Seria The Springer International Series in Engineering and Computer Science
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1 Biometrics Applications in An E-world.- 1.1 Biometrics Technologies.- 1.2 Biometrics Systems.- 1.3 Biometrics Applications.- 1.4 Organization of the Book.- 2 Achievements and Challenges in Fingerprint Recognition.- 2.1 Introduction.- 2.2 Fingerprint Recognition Issues.- 2.3 Applications.- 2.4 Fingerprint Recognition Methods and Algorithms.- 2.5 Discussion.- 2.6 Conclusions.- 3 Biometrics Electronic Purse.- 3.1 Introduction.- 3.2 Smart-Card Technology.- 3.3 Biometric Methodologies.- 3.4 Design of Biometrics Electronic Purse.- 3.5 Conclusions.- 4 Face Recognition and Its Application.- 4.1 Introduction.- 4.2 Face as a BiometriC.- 4.3 The Technology of Face Recognition.- 4.4 Privacy Issues.- 4.5 Application Domain.- 4.6 The IBM Face Recognition System.- 4.7 Conclusions.- 5 Personalize Mobile Access by Speaker Authentication.- 5.1 Introduction.- 5.2 Bilateral User Authentication Framework.- 5.3 Enabling Speaker Authentication Technologies.- 5.4 Simulations.- 5.5 Conclusions.- 6 Biometrics on the Internet: Security Application and Services.- 6.1 Introduction.- 6.2 Communications Networks and Internet.- 6.3 Biometrics.- 6.4 The Personal Identification Network: Biometrics Services via the Internet.- 6.5 Other Biometric Topics in Internet Applications.- 6.6 Conclusions and Future Trends.- 7 Forensic Identification Reporting Using Automatic Biometric Systems.- 7.1 Introduction.- 7.2 Biometric Systems and Classical Forensic Reporting.- 7.3 Bayesian Analysis of Forensic Evidence.- 7.4 Assessment of Forensic Biometric Systems.- 7.5 Case Study: Forensic Speaker Recognition.- 7.6 Conclusions.- 8 Signature Security System for E-commerce.- 8.1 Introduction.- 8.2 Literature Overview.- 8.3 A Typical On-Line Signature Verification System.- 8.4 Proposed On-Line Dynamic Signature Verification Applications.- 8.5 Conclusions.- 9 Web Guard: A Biometrics Identification System for Network Security.- 9.1 Introduction.- 9.2 Biometrics Data Warehouse.- 9.3 Dynamic Feature Selection.- 9.4 Hierarchical Search.- 9.5 Robust Classification via Fuzzy Neural Network.- 9.6 System Implementation.- 9.7 Experimental Results.- 9.8 Conclusions.- 10 Smart Card Application Based on Palmprint Identification.- 10.1 Introduction.- 10.2 On-line Palmprint Identification System.- 10.3 Smart Card Architecture.- 10.4 System Analysis and Applications.- 10.5 Conclusions.- 11 Secure Fingerprint Authentication.- 11.1 Introduction.- 11.2 Biometrics-Based Authentication Systems.- 11.3 Fingerprint Recognition.- 11.4 Techniques to Improve Security.- 11.5 Conclusions.- 12 From Biometrics Technology to Applications Regarding Face, Voice, Signature and Fingerprint Recognition Systems.- 12.1 Introduction.- 12.2 Automatic Speaker Recognition.- 12.3 Automatic Face Recognition.- 12.4 Minutiae-Based Fingerprint Recognition Systems.- 12.5 On-Line HMM-Based Signature Verification System.- 12.6 Multimodality in Biometric Systems.- 12.7 From Technology to Applications.- 13 Face Verification for Access Control.- 13.1 Introduction.- 13.2 Face Detection.- 13.3 Face Verification.- 13.4 Major Challenges.- 13.5 An Example Access Control System Based on Eigenface.- 13.6 Commercial Systems and Performance Evalutation.- 13.7 Summary and Conclusions.- 14 Voice Biometrics for Securing Your Web-Based Business.- 14.1 Introduction.- 14.2 Speaker Verification.- 14.3 Business Opportunities on the Web using Speaker Verification.- 14.4 SpeakEZ Web Authentication Service.- 14.5 Speaker Verification Performance.- 14.6 Summary.- 15 Ability to Verify: A Metric for System Performance in Real-World Comparative Biometric Testing.- 15.1 Introduction.- 15.2 Test Methodology.- 15.3 High-level Test Results.- 15.4 Ability to Verify (ATV).- 15.5 Vendor-generated Test Results.- 15.6 Conclusions.- 16 Automated Authentication Using Hybrid Biometric System.- 16.1 The State of the Art.- 16.2 A Hybrid Biometric Person Authentication Prototype.- 16.3 Database, Tests and Results.- 16.4 Hybrid Biometric Applications.- 16.5 Conclusions.