Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
Iris recognition technologies for identity management are already deployed globally in several large-scale nationwide biometric projects and are currently entering the mobile market. More recently, periocular recognition has been employed to augment the biometric performance of the iris in unconstrained environments where only the ocular region is present in the image. Iris and Periocular Biometric Recognition provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition over six broad areas: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends. With contributions from experts in industry and academia, this book is essential reading for researchers, graduate students and practitioners in biometrics and related fields.
"Iris Biometrics: From Segmentation to Template Security" provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more. Open source software is also provided on a dedicated website which includes feature extraction, segmentation and matching schemes applied in this book to foster scientific exchange. Current state-of-the-art approaches accompanied by comprehensive experimental evaluations are presented as well. This book has been designed as a secondary text book or reference for researchers and advanced-level students in computer science and electrical engineering. Professionals working in this related field will also find this book useful as a reference.
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.
|
You may like...
How Did We Get Here? - A Girl's Guide to…
Mpoomy Ledwaba
Paperback
(1)
|