Sign up
Forgot password?
FAQ: Login

Zhang D.D. Automated Biometrics. Technologies and Systems

  • pdf file
  • size 6,94 MB
  • added by
  • info modified
Zhang D.D. Automated Biometrics. Technologies and Systems
Kluwer, 2000. — 336.
In the modern, automated world, there is an ever-growing need to authenticate and identify individuals. The current technology of using a personal identification numbers (PIN) or password for these purposes hardly meets the requirements of an identification system because one has to remember too many passwords and the password or PIN is very insecure. As a result, in today's complex, geographically mobile, increasingly electronically wired information society, the problem of identifying a person continues to pose a great challenge.
Biometrics-based authentication and identification are emerging as the most reliable method. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on "something which you are or you do" to provide better security, increased efficiency, and improved accuracy. It overcomes some of the limitations of the traditional automatic personal identification technologies such as ID cards and PIN: ID cards may be lost, stolen, forgotten, or misplaced whereas PIN may be forgotten or guessed by the impostors. In addition, the traditional identification methods are unable to differentiate between an authorized person and an imposter who fraudulently acquires the "knowledge" or "token" of the authorized person. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate identity of a person for secure transaction processing.
Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, according to the author's best knowledge, so far, very few books have been found exclusively devoted to such issues of automated biometrics.
As such a book about automated biometrics, it will systematically introduce the relative technologies and systems, and explore how. to design the corresponding systems with in-depth discussion. But, this is not meant to suggest a low-relevance of the book to biometrics in general. Rather, the issues of the book addresses are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in security/detective. The materials in the book are the outgrowth of research the author has conducted for many years, and present the author's recent academic achievements made in the field, although, for the sake of completeness, related work of other authors will also be addressed.
Introduction to Biometrics
Part I Biometrics Technologies
Human Body and Biometrics
Signal and Image Processing
Pattern Recognition
Part II Physical Biometrics
Fingerprint System
Palmprint Verification
Face Recognition
Iris Biometrics
Part III Behavioral Biometrics
Speaker Recognition
Signature System
Other Behavioral Biometrics
Part IV Biometrics Applications
Personal Authentication
Biometrics Chinese Medicine
Future Work in Biometrics
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up