Матметоды и моделирование в биологии
  • формат pdf
  • размер 14.38 МБ
  • добавлен 04 октября 2011 г.
Zhang D., Jing X., Yang, J. Biometric Image Discrimination Technologies
Издательство Idea Group, 2006, -291 pp.

Personal identification and verification both play a critical role in our society. Today, more and more business activities and work practices are computerized. E-commerce applications, such as e-banking, or security applications, such as building access, demand fast, real-time and accurate personal identification. Traditional knowledge-based or token-based personal identification or verification systems are tedious, time-consuming, inefficient and expensive.
Knowledge-based approaches use "something that you know" (such as passwords and personal identification numbers) for personal identification; token-based approaches, on the other hand, use "something that you have" (such as passports or credit cards) for the same purpose. Tokens (e.g., credit cards) are time-consuming and expensive to replace. Passwords (e.g., for computer login and e-mail accounts) are hard to remember. A company may spend $14 to $28 (U.S.) on handling a password reset, and about 19% of help-desk calls are related to the password reset problem. This may suggest that the traditional knowledge-based password protection is unsatisfactory. Since these approaches are not based on any inherent attribute of an individual in the identification process, they are unable to differentiate between an authorized person and an impostor who fraudulently acquires the "token" or "knowledge" of the authorized person. These shortcomings have led to biometrics identification or verification systems becoming the focus of the research community in recent years.
Biometrics, which refers to automatic recognition of people based on their distinctive anatomical (e.g., face, fingerprint, iris, etc.) and behavioral (e.g., online/off-line signature, voice, gait, etc.) characteristics, is a hot topic nowadays, since there is a growing need for secure transaction processing using reliable methods. Biometrics-based authentication can overcome some of the limitations of the traditional automatic personal identification technologies, but still, new algorithms and solutions are required.
After the Sept. 11, 2001 terrorist attacks, the interest in biometrics-based security solutions and applications has increased dramatically, especially in the need to spot potential criminals in crowds. This further pushes the demand for the development of different biometrics products. For example, some airlines have implemented iris recognition technology in airplane control rooms to prevent any entry by unauthorized persons. In 2004, all Australian inteational airports implemented passports using face recognition technology for airline crews, and this eventually became available to all Australian passport holders. A steady rise in revenues is predicted from biometrics for 2002-2007, from $928 million in 2003 to $4.035 million in 2007.
Biometrics involves the automatic identification of an individual based on his physiological or behavioral characteristics. In a non-sophisticated way, biometrics has existed for centuries. Parts of our bodies and aspects of our behavior have historically been used as a means of identification. The study of finger images dates back to ancient China; we often remember and identify a person by his or her face, or by the sound of his or her voice; and signature is the established method of authentication in banking, for legal contracts and many other walks of life.

An Introduction to Biometrics Image Discrimination (BID)
Principal Component Analysis
Linear Discriminant Analysis
PCA/LDA Applications in Biometrics
Statistical Uncorrelation Analysis
Solutions of LDA for Small Sample Size Problems
An Improved LDA Approach
Discriminant DCT Feature Extraction
Other Typical BID Improvements
Advanced BID Technologies
Complete Keel Fisher Discriminant Analysis
Two-Directional PCA/LDA
Feature Fusion Using Complex Discriminator
Смотрите также

Li S.Z., Jain A.K. (eds.) Encyclopedia of Biometrics

Энциклопедия
  • формат pdf
  • размер 37.35 МБ
  • добавлен 07 октября 2011 г.
Издательство Springer, 2009, -1445 pp. The Encyclopedia of Biometrics provides a comprehensive reference to concepts, technologies, issues, and trends in the field of biometrics. The volume covers all important aspects – research, development, and applications, including biometric sensors and devices, methods and algorithms, sample quality, system design and implementation, databases, performance testing, information security, and standardizatio...

Maltoni D., Maio M., Jain A.K., Prabhakar S. Handbook of Fingerprint Recognition

  • формат pdf
  • размер 8.24 МБ
  • добавлен 06 декабря 2011 г.
Издательство Springer, 2009, -506 pp. Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and automatically recognizing a person. Questions such as Is this person authorized to enter the facility?, Is this individual entitled to access the privileged information?, and Did this person previously apply for a passport? are routinely asked in a variety of organizations in both person’s identity. Because biometric...

Riaz R. (ed.) Biometric Systems, Design and Applications

  • формат pdf
  • размер 5.35 МБ
  • добавлен 28 октября 2011 г.
Издательство InTech, 2011, -274 pp. Biometric authentication has been widely used for access control and security systems over the past few years. It is the study of the physiological (biometric) and behavioral (soft-biometric) traits of humans which are required to classify them. A general biometric system consists of different modules including single or multi-sensor data acquisition, enrollment, feature extraction and classification. A person...

Sneath P.H.A., Sokal R.R. Numerical taxonomy: The principles and practices of numerical classification

  • формат djvu
  • размер 3.83 МБ
  • добавлен 26 ноября 2011 г.
San-Francisco: Freeman, 1973. – 573 p. Preface The aims and principles of numerical taxonomy. Taxonomic principles. Taxonomic evidence. The estimation taxonomic resemblance. Taxonomic structure. The study of phylogeny. Population dynamics. dentification and discrimination. mplications for nomenclature. A critical examination of numerical taxonomy. Numerical taxonomy in fields other than biological systematics. The future of systematics. Appendixe...

Tistarelli M., Li S.Z., Chellappa R. (eds.) Handbook of Remote Biometrics for Surveillance and Security

  • формат pdf
  • размер 26.62 МБ
  • добавлен 11 января 2012 г.
Издательство Springer, 2009, -379 pp. Biometric is a multidimensional problem which is aimed at understanding the uniqueness of human beings to facilitate recognition. In reality, the dimensionality not only comes from the data, as engineers and computer scientists would think of, but more from the intrinsic nature of the recognition process.We expect to be able to recognize people without errors (D1), at a distance of 1–20 meters (D2), in motio...

Vielhauer C. Biometric User Authentication for IT Security. From Fundamentals to Handwriting

  • формат pdf
  • размер 5.04 МБ
  • добавлен 31 января 2012 г.
Издательство Springer, 2006, -287 pp. Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric techniques have been implemented into authentication systems...

Yang J. (ed.) Biometrics

  • формат pdf
  • размер 13.15 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -278 pp. Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The key objective of the book is to provide comprehensive reference and text on human authenticatio...

Yang J., Nanni L. (eds.) State of the Art in Biometrics

  • формат pdf
  • размер 20.48 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -326 pp. Biometric recognition is one of the most widely studied problems in computer science. The use of biometrics techniques, such as face, fingerprints, iris, ears, is a solution for obtaining a secure personal identification. However, the old biometrics identification techniques are out of date. The goal of this book is to provide the reader with the most up to date research performed in biometric recognition and...

Yang J., Poh N. (ed.) Recent Application in Biometrics

  • формат pdf
  • размер 25.13 МБ
  • добавлен 29 сентября 2011 г.
Издательство InTech, 2011, -314 pp. In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a co...

Yanushkevich S.N., Wang P.S.P., Gavrilova M.L., Srihari S.N. (eds.) Image Pattern Recognition. Synthesis and Analysis in Biometrics

  • формат pdf
  • размер 6.51 МБ
  • добавлен 12 января 2012 г.
Издательство World Scientific, 2007, -453 pp. Computer Vision and Computer Graphics can be thought of as opposite sides of the same coin. In computer graphics we start, for example, with a three-dimensional model of a face, and we attempt to render or project this model onto a two-dimensional surface to create an image of the face. In computer vision we attempt to do the opposite — we start with a two-dimensional image of the face and we try to...