Матметоды и моделирование в биологии
  • формат pdf
  • размер 25.13 МБ
  • добавлен 29 сентября 2011 г.
Yang J., Poh N. (ed.) Recent Application in Biometrics
Издательство InTech, 2011, -314 pp.

In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities.
The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices.
The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. Chapter 1 gives an overarching survey of existing implementation of biometric systems on mobile devices. Apart from the conventional biometrics, biomedical data such as blood pressure, ECG and heart beat signal are considered. The authors highlight the technical challenges that need to be overcome. Chapter 2 presents a biometric system based on hand geometry oriented to mobile devices.
Chapter 3 exploits the recent advances in the biometric and heterogeneous wireless networks fields to provide an authentication platform that supports both physical and logical access management.
Section 2 is a collection of four chapters on cancelable biometrics. Chapter 4 provides a comprehensive overview on privacy preserving biometrics, also the state of the art in this field and presents the main trends to be solved. In Chapter 5 the author proposes a new attack algorithm for fingerprint template protection which applies a fast polynomial reconstruction algorithm based on the consistency theorem. Also, the proposed attack method is evaluated, and compared with the known attack methods.
Chapter 6 introduces the technology of contactless fingerprinting and explores its application. In chapter 7 the author proposes a novel method of cancelable biometric identification that combines biological data with the use of artifacts and is resistant to spoofing.
Section 3 groups three biometric encryption applications. Chapter 8 proposes a user specific biometric key with multimodal biometric for encryption. In Chapter 9, the authors apply a cryptography scheme known as the Co-Z approach to biometric systems. Chapter 10 presents a novel remote authentication scheme based on the secret-splitting concept for cloud computing applications.
Finally, Section 4 groups a number of novel biometric applications. Chapter 11 provides a comprehensive review of existing research work that exploits electrocardiograms (ECGs) for human identification as well as addresses several important technical challenges arise from this application. Chapter 12 investigates new magnetic sensing technologies for use in biometrics. In Chapter 13, the authors study run-time reconfigurable hardware platforms and hardware-software co-design techniques for biometric systems. Embedded systems based on programmable logic devices such as field programmable gate arrays (FPGA) are presented as case studies.
Chapter 14 proposes a contactless biometric system based on the combination of hand geometry and palmprint using only low cost devices for medium security environments. The device uses infrared illumination and infrared camera in order to handle changing lighting conditions as well as complex background that contains surfaces and objects with skin-like colors. In Chapter 15 the biometric concept is applied to the fuel cells, microbial fuel cells and micromixer. The findings suggest that a novel flow slab design would be useful to improve Proton Exchange Membrane Fuel Cells (PEMFC) and can even be expanded to other types of cell, and the prototype will be useful in the design of a optimal biophysical passive micromixer and even show the feasibility and potential of biometric concept widely applied in biochemical, biological, chemical analysis, fuel cell and bioenergy.
Читать онлайн
Смотрите также

Albert M. (ed.) Biometrics - Unique and Diverse Applications in Nature, Science, and Technology

  • формат pdf
  • размер 16.91 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -206 pp. From time immemorial, we as humans have been intrigued by, perplexed by, and entertained by observing and analyzing ourselves and the natural world around us. Science and technology have evolved to a point where we can empirically record a measure of a biological or behavioral feature and use it for recognizing patterns, trends, and or discrete phenomena, such as individuals—and this is what biometrics is all...

Li S.Z., Jain A.K. (eds.) Encyclopedia of Biometrics

Энциклопедия
  • формат pdf
  • размер 37.35 МБ
  • добавлен 07 октября 2011 г.
Издательство Springer, 2009, -1445 pp. The Encyclopedia of Biometrics provides a comprehensive reference to concepts, technologies, issues, and trends in the field of biometrics. The volume covers all important aspects – research, development, and applications, including biometric sensors and devices, methods and algorithms, sample quality, system design and implementation, databases, performance testing, information security, and standardizatio...

Maltoni D., Maio M., Jain A.K., Prabhakar S. Handbook of Fingerprint Recognition

  • формат pdf
  • размер 8.24 МБ
  • добавлен 06 декабря 2011 г.
Издательство Springer, 2009, -506 pp. Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and automatically recognizing a person. Questions such as Is this person authorized to enter the facility?, Is this individual entitled to access the privileged information?, and Did this person previously apply for a passport? are routinely asked in a variety of organizations in both person’s identity. Because biometric...

Riaz R. (ed.) Biometric Systems, Design and Applications

  • формат pdf
  • размер 5.35 МБ
  • добавлен 28 октября 2011 г.
Издательство InTech, 2011, -274 pp. Biometric authentication has been widely used for access control and security systems over the past few years. It is the study of the physiological (biometric) and behavioral (soft-biometric) traits of humans which are required to classify them. A general biometric system consists of different modules including single or multi-sensor data acquisition, enrollment, feature extraction and classification. A person...

Tistarelli M., Li S.Z., Chellappa R. (eds.) Handbook of Remote Biometrics for Surveillance and Security

  • формат pdf
  • размер 26.62 МБ
  • добавлен 11 января 2012 г.
Издательство Springer, 2009, -379 pp. Biometric is a multidimensional problem which is aimed at understanding the uniqueness of human beings to facilitate recognition. In reality, the dimensionality not only comes from the data, as engineers and computer scientists would think of, but more from the intrinsic nature of the recognition process.We expect to be able to recognize people without errors (D1), at a distance of 1–20 meters (D2), in motio...

Vielhauer C. Biometric User Authentication for IT Security. From Fundamentals to Handwriting

  • формат pdf
  • размер 5.04 МБ
  • добавлен 31 января 2012 г.
Издательство Springer, 2006, -287 pp. Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric techniques have been implemented into authentication systems...

Yang J. (ed.) Biometrics

  • формат pdf
  • размер 13.15 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -278 pp. Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The key objective of the book is to provide comprehensive reference and text on human authenticatio...

Yang J., Nanni L. (eds.) State of the Art in Biometrics

  • формат pdf
  • размер 20.48 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -326 pp. Biometric recognition is one of the most widely studied problems in computer science. The use of biometrics techniques, such as face, fingerprints, iris, ears, is a solution for obtaining a secure personal identification. However, the old biometrics identification techniques are out of date. The goal of this book is to provide the reader with the most up to date research performed in biometric recognition and...

Yanushkevich S.N., Wang P.S.P., Gavrilova M.L., Srihari S.N. (eds.) Image Pattern Recognition. Synthesis and Analysis in Biometrics

  • формат pdf
  • размер 6.51 МБ
  • добавлен 12 января 2012 г.
Издательство World Scientific, 2007, -453 pp. Computer Vision and Computer Graphics can be thought of as opposite sides of the same coin. In computer graphics we start, for example, with a three-dimensional model of a face, and we attempt to render or project this model onto a two-dimensional surface to create an image of the face. In computer vision we attempt to do the opposite — we start with a two-dimensional image of the face and we try to...

Zhang D., Jing X., Yang, J. Biometric Image Discrimination Technologies

  • формат pdf
  • размер 14.38 МБ
  • добавлен 04 октября 2011 г.
Издательство Idea Group, 2006, -291 pp. Personal identification and verification both play a critical role in our society. Today, more and more business activities and work practices are computerized. E-commerce applications, such as e-banking, or security applications, such as building access, demand fast, real-time and accurate personal identification. Traditional knowledge-based or token-based personal identification or verification systems a...