|
|
Showing 1 - 4 of
4 matches in All Departments
There is much interest in the use of biometrics for verification, identification, and "screening" applications, collectively called biometric authentication. This interest has been heightened because of the threat of terrorism. Biometric authentication systems offer advantages over systems based on knowledge or possession such as unsupervised (legacy) authentication systems based on password/PIN and supervised (legacy) authentication systems based on driver's licences and passports. The most important advantage is increased security: when a person is authenticated based on a biometric, the probability that this person is the originally enrolled person can be statistically estimated or computed in some other way. When a person is authenticated based on a password or even based on human observation, no such probabilities can be determined. Of course, the mere capability to compute this probability is not sufficient, what is needed is that the probability of correct authentication is high and the error probabilities are low. Achieving this probabilistic linking by introducing biometrics in authentication systems brings along many design choices and may introduce additional security loopholes. "Biometrics" examines the many aspects of biometric applications that are an issue even before a particular biometrics has been selected. In addition, the book further studies many issues that are associated with the currently popular biometric identifiers, namely, finger, face, voice, iris, hand (geometry) and signature.
Starting with fingerprints more than a hundred years ago, there has
been ongoing research in biometrics. Within the last forty years
face and speaker recognition have emerged as research topics.
However, as recently as a decade ago, biometrics itself did not
exist as an independent field. Each of the biometric-related topics
grew out of different disciplines. For example, the study of
fingerprints came from forensics and pattern recognition, speaker
recognition evolved from signal processing, the beginnings of face
recognition were in computer vision, and privacy concerns arose
from the public policy arena. One of the challenges of any new
field is to state what the core ideas are that define the field in
order to provide a research agenda for the field and identify key
research problems. Biometrics has been grappling with this
challenge since the late 1990s. With the matu ration of biometrics,
the separate biometrics areas are coalescing into the new
discipline of biometrics. The establishment of biometrics as a
recognized field of inquiry allows the research community to
identify problems that are common to biometrics in general. It is
this identification of common problems that will define biometrics
as a field and allow for broad advancement."
|
Advances in Biometric Person Authentication - International Workshop on Biometric Recognition Systems, IWBRS 2005, Beijing, China, October 22 - 23, 2005, Proceedings (Paperback, 2005 ed.)
Stan Z. Li, Zhenan Sun, Tieniu Tan, Sharath Pankanti, Gerard Chollet, …
|
R1,400
Discovery Miles 14 000
|
Ships in 18 - 22 working days
|
Automatic and reliable authentication of individuals is becoming an
essential part of the modern world, for security and convenience in
our life, in our work andin society.Biometrics-basedsystems utilize
physiologicalorbehavioralch- acteristics of an individual including
the face, iris, ?ngerprint, palmprint, hand, voice, signature, or a
combination of them, for this task. We are now seeing increasing
interest and practical deployment of biometric systems.
TheInternationalWorkshoponBiometricRecognitionSystems(IWBRS2005)
was held in conjunction with ICCV 2005, providing an interactive
forum for leading biometrics researchersand system designers.A
biometric authentication competition (BAC) was conducted by the
workshopto track the state-of-the-art biometrics technologies. This
volume of workshop proceedings includes 32 papers carefully
selected from a total of 130 submissions. The papers address the
problems in face, iris, ?ngerprint, palmprint, speech, writing and
other biometrics, and contribute new
ideastoresearchanddevelopmentofreliableandpracticalsolutionsforbiometric
authentication. We would like to express our gratitude to all the
contributors, reviewers, and ProgramCommittee and
OrganizingCommittee members who made this a very successful
workshop. We also wish to acknowledge the Institute of Automation,
ChineseAcademyofSciences,andSpringerforsponsoringthisworkshop.Special
thanks are due to Miao Hong, Xin Yang, Zhuoshi Wei, Yinghao Cai,
Zhaofeng He, Cheng Zhong, Shiqi Yu and Xianchao Qiu for their hard
work in workshop organization. We hope you could bene?t from the
fruitful workshop to improve the perf- mance of your biometric
systems.
Biometrics: Personal Identification in Networked Society is a
comprehensive and accessible source of state-of-the-art information
on all existing and emerging biometrics: the science of
automatically identifying individuals based on their physiological
or behavior characteristics. In particular, the book covers:
*General principles and ideas of designing biometric-based systems
and their underlying tradeoffs *Identification of important issues
in the evaluation of biometrics-based systems *Integration of
biometric cues, and the integration of biometrics with other
existing technologies *Assessment of the capabilities and
limitations of different biometrics *The comprehensive examination
of biometric methods in commercial use and in research development
*Exploration of some of the numerous privacy and security
implications of biometrics. Also included are chapters on face and
eye identification, speaker recognition, networking, and other
timely technology-related issues. All chapters are written by
leading internationally recognized experts from academia and
industry. Biometrics: Personal Identification in Networked Society
is an invaluable work for scientists, engineers, application
developers, systems integrators, and others working in biometrics.
|
|