We a good story
Quick delivery in the UK

Biometric User Authentication for IT Security

- From Fundamentals to Handwriting

About Biometric User Authentication for IT Security

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.

Show more
  • Language:
  • English
  • ISBN:
  • 9781441938732
  • Binding:
  • Paperback
  • Pages:
  • 284
  • Published:
  • November 24, 2010
  • Edition:
  • 12006
  • Dimensions:
  • 155x235x15 mm.
  • Weight:
  • 456 g.
Delivery: 1-2 weeks
Expected delivery: December 11, 2024

Description of Biometric User Authentication for IT Security

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.
Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.

User ratings of Biometric User Authentication for IT Security



Find similar books
The book Biometric User Authentication for IT Security can be found in the following categories:

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.