| 000 | 03154nam a22005055i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-69933-2 | ||
| 003 | DE-He213 | ||
| 005 | 20250710084010.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2008 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387699332 _a99780387699332 |
||
| 024 | 7 |
_a10.1007/978-0-387-69933-2 _2doi |
|
| 082 | 0 | 4 |
_a570.15195 _223 |
| 100 | 1 |
_aShoniregun, Charles A. _eauthor. |
|
| 245 | 1 | 0 |
_aSecuring Biometrics Applications _h[recurso electrónico] / _cby Charles A. Shoniregun, Stephen Crosier. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2008. |
|
| 300 | _bonline resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aResearch Overview And Biometric Technologies -- Biometrics Measurements -- Applications of Biometrics -- Securing Biometrics Applications -- Critical Evaluation And Discussion -- Conclusion. | |
| 520 | _aBiometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identity theft and other security issues, society will have to compromise between security and personal freedoms. Securing Biometrics Applications investigates and identifies key impacts of biometric security applications, while discovering opportunities and challenges presented by the biometric technologies available. This volume also includes new biometric measures for national ID card, passport and centralized database system. Securing Biometrics Applications is designed for a professional audience, researchers, and practitioners. This book is suitable for advanced-level students as a secondary text or reference book in computer science. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aMULTIMEDIA SYSTEMS. | |
| 650 | 0 | _aCOMPUTER VISION. | |
| 650 | 0 | _aBIOMETRICS. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aBIOMETRICS. |
| 650 | 2 | 4 | _aIMAGE PROCESSING AND COMPUTER VISION. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aUSER INTERFACES AND HUMAN COMPUTER INTERACTION. |
| 650 | 2 | 4 | _aMULTIMEDIA INFORMATION SYSTEMS. |
| 700 | 1 |
_aCrosier, Stephen. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387699325 |
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-0-387-69933-2 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c58143 _d58143 |
||