TY - BOOK AU - Vielhauer,Claus ED - SpringerLink (Online service) TI - Biometric User Authentication for it Security: From Fundamentals to Handwriting T2 - Advances in Information Security, SN - 9780387280943 U1 - 006.4 23 PY - 2006/// CY - Boston, MA PB - Springer US KW - COMPUTER SCIENCE KW - DATA STRUCTURES (COMPUTER SCIENCE) KW - DATA ENCRYPTION (COMPUTER SCIENCE) KW - MULTIMEDIA SYSTEMS KW - COMPUTER VISION KW - OPTICAL PATTERN RECOGNITION KW - PATTERN RECOGNITION KW - IMAGE PROCESSING AND COMPUTER VISION KW - DATA ENCRYPTION KW - DATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY KW - USER INTERFACES AND HUMAN COMPUTER INTERACTION KW - MULTIMEDIA INFORMATION SYSTEMS N1 - Fundamentals - Overview -- Fundamentals in Biometrics -- Biometric Modalities -- Fundamentals in User Authentication -- Handwriting Biometrics - Overview -- Evaluating Handwriting Biometrics -- Biometric Hash -- User Verification N2 - Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security UR - http://dx.doi.org/10.1007/0-387-28094-4 ER -