| 000 | 03419nam a22005175i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-28094-3 | ||
| 003 | DE-He213 | ||
| 005 | 20250710083940.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2006 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387280943 _a99780387280943 |
||
| 024 | 7 |
_a10.1007/0-387-28094-4 _2doi |
|
| 082 | 0 | 4 |
_a006.4 _223 |
| 100 | 1 |
_aVielhauer, Claus. _eauthor. |
|
| 245 | 1 | 0 |
_aBiometric User Authentication for it Security _h[recurso electrónico] : _bFrom Fundamentals to Handwriting / _cby Claus Vielhauer. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2006. |
|
| 300 |
_aXII, 284 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v18 |
|
| 505 | 0 | _aFundamentals - Overview -- Fundamentals in Biometrics -- Biometric Modalities -- Fundamentals in User Authentication -- Handwriting Biometrics - Overview -- Evaluating Handwriting Biometrics -- Biometric Hash -- User Verification. | |
| 520 | _aBiometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aMULTIMEDIA SYSTEMS. | |
| 650 | 0 | _aCOMPUTER VISION. | |
| 650 | 0 | _aOPTICAL PATTERN RECOGNITION. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aPATTERN RECOGNITION. |
| 650 | 2 | 4 | _aIMAGE PROCESSING AND COMPUTER VISION. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aUSER INTERFACES AND HUMAN COMPUTER INTERACTION. |
| 650 | 2 | 4 | _aMULTIMEDIA INFORMATION SYSTEMS. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387261942 |
| 830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v18 |
|
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/0-387-28094-4 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c56772 _d56772 |
||