![]() |
![]() |
Your cart is empty |
||
Showing 1 - 9 of 9 matches in All Departments
"Iris Biometrics: From Segmentation to Template Security" provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more. Open source software is also provided on a dedicated website which includes feature extraction, segmentation and matching schemes applied in this book to foster scientific exchange. Current state-of-the-art approaches accompanied by comprehensive experimental evaluations are presented as well. This book has been designed as a secondary text book or reference for researchers and advanced-level students in computer science and electrical engineering. Professionals working in this related field will also find this book useful as a reference.
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.
This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.
It is our great pleasure to present the proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), which washeld in Salzburg on September 19-21,2005.Continuing the tradition of p- vious CMS conferences, we sought a balanced program containing presentations on various aspects of secure communication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 143 submissions, from which 28 were selected for presentation as full papers. In addition to these regular presentations, the CMS conference featured for the ?rst time a "work in progress track" that enabled authors to report preliminary results and ongoing work. These papers were presented in the form of a poster sessionduringtheconference;anextendedabstractofthepostersappearsinthis proceedings volume. From all papers submitted to the CMS conference, the p- gramcommitteechose13 submissionsfor inclusionin theworkinprogresstrack. In addition to regular presentations, CMS 2005 featured a special session on XMLsecurity, containingbothcontributedandinvitedtalks.Thisspecialsession was jointly organized by Rudig ] er Grimm (TU Ilmenau, Germany) and J] org Schwenk (Ruhr-Universit] at Bochum, Germany). Their assistance in organizing CMS 2005 was greatly appreciated."
TheAustrianCenterforParallelComputation(ACPC)isacooperativeresearch organization founded in 1989 to promote research and education in the eld of Software for Parallel Computer Systems. The areas in which the ACPC is active include algorithms, languages, c- pilers, programmingenvironments, andapplicationsforparallelandhigh-perf- mance computing systems. The partners of ACPC run researchprojects in these elds, use a common pool of hardware equipment, and oer a joint curriculum in ParallelComputationfor graduateand postgraduatestudents. Moreover, s- eral national and international workshops and conferences have been organized within the framework of the ACPC. TheseproceedingsconcerntheFourthInternationalConferenceoftheACPC (ACPC'99), held on February 16{18 in Salzburg, Austria. This conference is a merge of two established international conference/workshop series devoted to parallel processing: the ACPC conferences which were held previously in Salzburg, Gmunden, and Klagenfurt (all Austria) and the Parallel Numerics (ParNum) workshops which were organized in Smolenice (Slovakia), Sorrento (Italy), Gozd Martuljek (Slovenia), and Zakopane (Poland). We invited 20 researchers to participate on the program committee. The conference attracted authors from 22 countries around the worldwho submitted 75 papers, out of which 50 were selected for presentation at the conference. Additionally, a poster session was organized featuring work in progress. Four distinguished researcherspresented invited papers with topics related to the two specialtracksonParallelNumericsandParallelComputinginImageProcessing, Video Processing, and Multimedia.
This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book. ++++ The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to ensure edition identification: ++++ Exercitatio Theol. De Fide, Quam Nonnulli Fingunt, Naturali Johann Franz Buddeus, Johann Andreas Uhl Gollner, 1709
|
![]() ![]() You may like...
1 Recce: Volume 3 - Through Stealth Our…
Alexander Strachan
Paperback
|