Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Biometrics use an individual's unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, from high security authentication to access to your laptop or phone. With the deployment of biometric systems in different environments such as laptops, mobile phones, airports, e-commerce, and others, users are also gradually getting accustomed with their use in everyday life, and the security weaknesses of these systems are also recognized by fraudsters and hackers. The use of fake biometric traits is commonly termed presentation attacks or spoofing, and unless the security system is equipped with a spoofing detection ability, fake biometric traits can be easily presented to gain illegitimate access. Hence, a secure biometrics system should be able to detect spoofing attacks.
This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader's understanding.
Amit Chatterjee has several years of research experience of working on developing various anti-spoof biometric sensors using optical techniques and has published around 40 Journal and international conference papers and has filed 7 patents.
Preface
Acknowledgements
Author biography
List of acronyms
1 Biometrics
2 Presentation attack detection in biometrics
3 Fringe projection-based secure biometrics
4 Biometric presentation attack detection using speckle metrology
5 Presentation attack detection using fringe projection and biospeckle analysis
6 Presentation attack detection using optical coherence tomography
7 Thermography-based presentation attack detection
8 Miscellaneous
9 Patents: basics and selected descriptions
10 Preliminary experiments and research ideas
Dateiformat: ePUBKopierschutz: ohne DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „glatten” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Ein Kopierschutz bzw. Digital Rights Management wird bei diesem E-Book nicht eingesetzt.
Weitere Informationen finden Sie in unserer E-Book Hilfe.