Books > Computing & IT > Applications of computing > Image processing
|
Buy Now
Automated Biometrics - Technologies and Systems (Hardcover, 2000 ed.)
Loot Price: R4,746
Discovery Miles 47 460
|
|
Automated Biometrics - Technologies and Systems (Hardcover, 2000 ed.)
Series: The International Series on Asian Studies in Computer and Information Science, 7
Expected to ship within 12 - 17 working days
|
Biometrics-based authentication and identification are emerging as
the most reliable method to authenticate and identify individuals.
Biometrics requires that the person to be identified be physically
present at the point-of-identification and relies on something
which you are or you do' to provide better security, increased
efficiency, and improved accuracy. Automated biometrics deals with
physiological or behavioral characteristics such as fingerprints,
signature, palmprint, iris, hand, voice and face that can be used
to authenticate a person's identity or establish an identity from a
database. With rapid progress in electronic and Internet commerce,
there is also a growing need to authenticate the identity of a
person for secure transaction processing. Designing an automated
biometrics system to handle large population identification,
accuracy and reliability of authentication are challenging tasks.
Currently, there are over ten different biometrics systems that are
either widely used or under development. Some automated biometrics,
such as fingerprint identification and speaker verification, have
received considerable attention over the past 25 years, and some
issues like face recognition and iris-based authentication have
been studied extensively resulting in successful development of
biometrics systems in commercial applications. However, very few
books are exclusively devoted to such issues of automated
biometrics. Automated Biometrics: Technologies and Systems
systematically introduces the technologies and systems, and
explores how to design the corresponding systems with in-depth
discussion. The issues addressed in this book are highly relevant
to many fundamental concerns of both researchers and practitioners
of automated biometrics in computer and system security.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.