Biometric Technologies and Verification Systems (Paperback)
John R. Vacca
- 出版商: Butterworth-Heineman
- 出版日期: 2007-03-01
- 定價: $2,600
- 售價: 8.0 折 $2,080
- 語言: 英文
- 頁數: 656
- 裝訂: Paperback
- ISBN: 0750679670
- ISBN-13: 9780750679671
-
相關分類:
人工智慧、資訊安全、資訊科學
立即出貨 (庫存=1)
買這商品的人也買了...
-
$680$537 -
$880$581 -
$650$514 -
$2,375$2,250 -
$650$507 -
$550$468 -
$450$383 -
$600$510 -
$650$507 -
$990LPI Linux Certification in a Nutshell, 2/e (Paperback)
-
$620$558 -
$350$315 -
$990$891 -
$600$480 -
$720$612 -
$680$578 -
$880$748 -
$780$616 -
$520$406 -
$450$356 -
$980$833 -
$590$502 -
$520$442 -
$450$383 -
$590$502
相關主題
商品描述
Description:
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
Table of Contents:
Part 1: Overview Of Biometrics Technology And Verification Systems
CHAPTER 1: What Is Biometrics?
CHAPTER 2: Types Of Biometrics Technology And Verification Systems
CHAPTER 3: Biometrics Technology And Verification Systems Standards
Part 2: How Biometrics Eye Analysis Technology Works
CHAPTER 4: How Iris Pattern Recognition Works
CHAPTER 5: How Retina Pattern Recognition Works
Part 3: How Biometrics Facial Recognition Technology Works
CHAPTER 6: How Video Face Recognition Works
CHAPTER 7: How Facial Thermal Imaging In The Infrared Spectrum Works
Part 4: How Biometrics Finger Scanning Analysis Technology Works
CHAPTER 8: How Finger Image Capture Works
CHAPTER 9: How Fingerscanning Verification And Recognition Works
Part 5: How Biometrics Geometry Analysis Technology Works
CHAPTER 10: How Hand Geometry Image Technology Works
CHAPTER 11: How Finger Geometry Technology Works
Part 6: How Biometrics Verification Technology Works
CHAPTER 12: How Dynamic Signature Verification Technology Works
CHAPTER 13: How Voice Recognition Technology Works
CHAPTER 14: How Keystroke Dynamics Technology Works
CHAPTER 15: How Palm Print Pattern Recognition Technology Works
CHAPTER 16: How Vein Pattern Analysis Recognition Technology Works
CHAPTER 17: How Ear Shape Analysis Technology Works
CHAPTER 18: How Body Odor And/Or Scent Analysis And Other Advanced Technology Works
CHAPTER 19: How DNA Measurement Technology Works
Part 7: How Privacy Enhanced Biometrics Based Verification/Authentication Works
CHAPTER 20: How Fingerprint Verification/Authentication Technology Works
CHAPTER 21: Vulnerable Points Of A Biometric Verification System
CHAPTER 22: How Brute Force Attacks Work
CHAPTER 23: How Data Hiding Technology Works
CHAPTER 24: Image-Based Challenges/Response Methods
CHAPTER 25: How Cancelable Biometrics Work
Part 8: Large-Scale Implementation/Deployment Of Biometrics Technologies And Verification Systems
CHAPTER 26: Specialized Biometrics Enterprise Deployment
CHAPTER 27: How to Implement Biometrics Technology And Verification Systems
Part 9: Biometrics Solutions And Future Directions
CHAPTER 28: How Mapping The Body Technology Works
CHAPTER 29: Selecting Biometric Solutions
CHAPTER 30: Biometric Benefits
商品描述(中文翻譯)
《生物識別技術與驗證系統》分為九個部分,共30章,包括生物識別術語和縮寫詞的詳細詞彙表。本書討論了生物識別驗證/認證、識別和系統設計原則的最新技術。它還提供了生物識別如何工作的逐步討論;如何以多種方式收集和分析人體生物識別數據;如何將生物識別作為一種個人識別方法,通過人們獨特的身體或行為特徵來識別他們;以及如何為設計生物識別驗證系統創建詳細的菜單。
只有生物識別驗證/認證是基於人體固有部分的識別。令牌,如智能卡、磁條卡和實體鑰匙可能會丟失、被盜或被複製。密碼可能會被遺忘、共享或被第三方無意中觀察到。對於用戶來說,忘記密碼和丟失的智能卡是一個麻煩,對於系統管理員來說是一個浪費時間的昂貴問題。生物識別安全解決方案在識別和驗證人類方面相對於傳統安全方法具有一些獨特的優勢。本書將有助於確定生物識別在各種安全應用中可以發揮高度安全和特定的作用。
目錄:
第1部分:生物識別技術和驗證系統概述
第1章:什麼是生物識別?
第2章:生物識別技術和驗證系統的類型
第3章:生物識別技術和驗證系統標準
第2部分:生物識別眼部分析技術的工作原理
第4章:虹膜模式識別的工作原理
第5章:視網膜模式識別的工作原理
第3部分:生物識別面部識別技術的工作原理
第6章:視頻人臉識別的工作原理
第7章:紅外光譜中的面部熱成像的工作原理
第4部分:生物識別指紋掃描分析技術的工作原理
第8章:指紋圖像捕獲的工作原理
第9章:指紋掃描的驗證和識別的工作原理
第5部分:生物識別幾何分析技術的工作原理
第10章:手部幾何圖像技術的工作原理
第11章:指紋幾何技術的工作原理
第6部分:生物識別驗證技術的工作原理
第12章:動態簽名驗證技術的工作原理
第13章:語音識別技術的工作原理
第14章:鍵入動態技術的工作原理
第15章:手掌紋模式識別技術的工作原理
第16章:靜脈模式分析識別技術的工作原理
第17章:耳形分析技術的工作原理
第18章:體味和/或氣味分析和其他先進技術的工作原理
第19章:DNA測量技術的工作原理
第7部分:基於隱私增強的生物識別驗證/認證的工作原理
第20章:指紋驗證/認證技術的工作原理
第21章:生物識別驗證系統的弱點
第22章:暴力攻擊的工作原理
第23章:數據隱藏技術的工作原理