000 03419nam a22005175i 4500
001 978-0-387-28094-3
003 DE-He213
005 20250710083940.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 _a9780387280943
_a99780387280943
024 7 _a10.1007/0-387-28094-4
_2doi
082 0 4 _a006.4
_223
100 1 _aVielhauer, Claus.
_eauthor.
245 1 0 _aBiometric User Authentication for it Security
_h[recurso electrónico] :
_bFrom Fundamentals to Handwriting /
_cby Claus Vielhauer.
264 1 _aBoston, MA :
_bSpringer US,
_c2006.
300 _aXII, 284 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v18
505 0 _aFundamentals - Overview -- Fundamentals in Biometrics -- Biometric Modalities -- Fundamentals in User Authentication -- Handwriting Biometrics - Overview -- Evaluating Handwriting Biometrics -- Biometric Hash -- User Verification.
520 _aBiometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological trait like fingerprint, iris, face) and active (learned and trained behavior like voice, handwriting and gait) biometric recognition techniques to the reader. This professional book, unlike other publications in this area which concentrate on passive schemes, reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects which are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting. Biometric User Authentication for IT Security: From Fundamentals to Handwriting is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science and electrical engineering for the study of biometrics in the spectrum ranging from signal processing to IT security.
650 0 _aCOMPUTER SCIENCE.
650 0 _aDATA STRUCTURES (COMPUTER SCIENCE).
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aMULTIMEDIA SYSTEMS.
650 0 _aCOMPUTER VISION.
650 0 _aOPTICAL PATTERN RECOGNITION.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aPATTERN RECOGNITION.
650 2 4 _aIMAGE PROCESSING AND COMPUTER VISION.
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY.
650 2 4 _aUSER INTERFACES AND HUMAN COMPUTER INTERACTION.
650 2 4 _aMULTIMEDIA INFORMATION SYSTEMS.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387261942
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v18
856 4 0 _uhttp://dx.doi.org/10.1007/0-387-28094-4
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c56772
_d56772