|
Showing 1 - 4 of
4 matches in All Departments
In the age of e-society, handwritten signature processing is an
enabling technology in a multitude of fields in the "digital
agenda" of many countries, ranging from e-health to e-commerce,
from e-government to e-justice, from e-democracy to e-banking, and
smart cities. Handwritten signatures are very complex signs; they
are the result of an elaborate process that depends on the
psychophysical state of the signer and the conditions under which
the signature apposition process occurs. Notwithstanding, recent
efforts from academies and industries now make possible the
integration of signature-based technologies into other standard
equipment to form complete solutions that are able to support the
security requirements of today's society.Advances in Digital
Handwritten Signature Processing primarily provides an update on
the most fascinating and valuable researches in the multifaceted
field of handwritten signature analysis and processing. The
chapters within also introduce and discuss critical aspects and
precious opportunities related to the use of this technology, as
well as highlight fundamental theoretical and applicative aspects
of the field. This book contains papers by well-recognized and
active researchers and scientists, as well as by engineers and
commercial managers working for large international companies in
the field of signature-based systems for a wide range of
applications and for the development of e-society.This publication
is devoted to both researchers and experts active in the field of
biometrics and handwriting forensics, as well as professionals
involved in the development of signature-based solutions for
advanced applications in medicine, finance, commerce, banking,
public and private administrations, etc. Handwritten Signature
Processing may also be used as an advanced textbook by graduate
students.
We live in a society which is increasingly interconnected, in which
communication between individuals is mostly mediated via some
electronic platform, and transactions are often carried out
remotely. In such a world, traditional notions of trust and
confidence in the identity of those with whom we are interacting,
taken for granted in the past, can be much less reliable.
Biometrics - the scientific discipline of identifying individuals
by means of the measurement of unique personal attributes -
provides a reliable means of establishing or confirming an
individual's identity. These attributes include facial appearance,
fingerprints, iris patterning, the voice, the way we write, or even
the way we walk. The new technologies of biometrics have a wide
range of practical applications, from securing mobile phones and
laptops to establishing identity in bank transactions, travel
documents, and national identity cards. This Very Short
Introduction considers the capabilities of biometrics-based
identity checking, from first principles to the practicalities of
using different types of identification data. Michael Fairhurst
looks at the basic techniques in use today, ongoing developments in
system design, and emerging technologies, all aimed at improving
precision in identification, and providing solutions to an
increasingly wide range of practical problems. Considering how they
may continue to develop in the future, Fairhurst explores the
benefits and limitations of these pervasive and powerful
technologies, and how they can effectively support our increasingly
interconnected society. ABOUT THE SERIES: The Very Short
Introductions series from Oxford University Press contains hundreds
of titles in almost every subject area. These pocket-sized books
are the perfect way to get ahead in a new subject quickly. Our
expert authors combine facts, analysis, perspective, new ideas, and
enthusiasm to make interesting and challenging topics highly
readable.
As biometrics-based identification and identity authentication
become increasingly widespread in their deployment, it becomes
correspondingly important to consider more carefully issues
relating to reliability, usability and inclusion. One factor which
is particularly important in this context is that of the
relationship between the nature of the measurements extracted from
a particular biometric modality and the age of the sample donor,
and the effect which age has on physiological and behavioural
characteristics invoked in a biometric transaction. In Age Factors
in Biometric Processing an international panel of experts explore
the implications of ageing on biometric technologies, and how such
factors can be managed in practical situations. Topics include
understanding the impact of ageing on biometric measurements; age
factors as barriers/opportunities in relation to performance;
modality-related approaches to management of age factors;
implications for practical application; and future trends and
research challenges. Age Factors in Biometric Processing provides
an outstanding overview of this topic for the rapidly expanding
community of stakeholders in biometrics based identification
solutions in academia, industry and government.
The rapid advancements in telecommunications, computing hardware
and software, and data encryption, and the widespread use of
electronic data processing and electronic business conducted
through the Internet have led to a strong increase in information
security threats. The latest advances in information security have
increased practical deployments and scalability across a wide range
of applications to better secure and protect our information
systems and the information stored, processed and transmitted. This
book outlines key emerging trends in information security from the
foundations and technologies in biometrics, cybersecurity, and big
data security to applications in hardware and embedded systems
security, computer forensics, the Internet of Things security, and
network security. Information Security: Foundations, technologies
and applications is a comprehensive review of cutting-edge
algorithms, technologies, and applications, and provides new
insights into a range of fundamentally important topics in the
field. This up-to-date body of knowledge is essential reading for
researchers and advanced students in information security, and for
professionals in sectors where information security is required.
|
You may like...
Top Five
Rosario Dawson, Cedric The Entertainer, …
Blu-ray disc
R40
Discovery Miles 400
|