Biometric security and privacy : opportunities & challenges in the big data era
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as quality issue, biometric template prote...
Saved in:
Other Authors: | , , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham, Switzerland :
Springer,
2017.
|
Series: | Signal processing for security technologies.
|
Subjects: | |
ISBN: | 9783319473017 9783319473000 |
Physical Description: | 1 online resource |
LEADER | 06310cam a2200553Mi 4500 | ||
---|---|---|---|
001 | 99658 | ||
003 | CZ-ZlUTB | ||
005 | 20240914112116.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 161227s2017 sz ob 001 0 eng d | ||
040 | |a YDX |b eng |e pn |c YDX |d N$T |d IDEBK |d EBLCP |d N$T |d GW5XE |d CNCGM |d COO |d OCLCQ |d AZU |d MERUC |d OCLCF |d UPM |d VT2 |d UWO |d IOG |d ESU |d UAB |d JBG |d IAD |d ICW |d ICN |d OTZ |d OCLCQ |d U3W |d CAUOI |d OCLCQ |d AU@ |d OCLCQ |d WYU |d OCLCQ |d ERF |d ADU |d UKBTH |d OCLCQ |d SRU | ||
020 | |a 9783319473017 |q (electronic bk.) | ||
020 | |z 9783319473000 | ||
024 | 7 | |a 10.1007/978-3-319-47301-7 |2 doi | |
035 | |a (OCoLC)967264255 |z (OCoLC)967326040 |z (OCoLC)970386521 |z (OCoLC)970614758 |z (OCoLC)970682310 |z (OCoLC)971209516 |z (OCoLC)971585734 |z (OCoLC)972433783 |z (OCoLC)972619113 |z (OCoLC)972780296 |z (OCoLC)974649564 |z (OCoLC)981034030 |z (OCoLC)1005779391 |z (OCoLC)1011849316 |z (OCoLC)1048142643 |z (OCoLC)1058291097 |z (OCoLC)1066466421 |z (OCoLC)1066555968 |z (OCoLC)1086522502 |z (OCoLC)1112578094 |z (OCoLC)1112848527 |z (OCoLC)1113040479 | ||
245 | 0 | 0 | |a Biometric security and privacy : |b opportunities & challenges in the big data era / |c Richard Jiang, Somaya Al-maadeed, Ahmed Bouridane, Prof. Danny Crookes, Azeddine Beghdadi, editors. |
260 | |a Cham, Switzerland : |b Springer, |c 2017. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
490 | 1 | |a Signal processing for security technologies | |
505 | 0 | |a Preface; Contents; 1 Fingerprint Quality Assessment: Matching Performance and Image Quality; 1.1 Introduction; 1.2 Background; 1.3 Trial Measures; 1.3.1 Metrics with Single Feature; 1.3.2 Segmentation-Based Metrics; 1.3.2.1 FQA via Informative Region; 1.3.2.2 FQA via Pixel-Pruning; 1.3.3 FQA via Multi-feature; 1.4 Experimental Results; 1.4.1 Software; 1.4.2 Database et Protocol; 1.4.3 Results; 1.4.3.1 ES with Quality; 1.4.3.2 Isometric Bins; 1.4.4 Discussion via Sample Utility; 1.5 Conclusion; References. | |
505 | 8 | |a 2 A Novel Perspective on Hand Vein Patterns for Biometric Recognition: Problems, Challenges, and Implementations2.1 Introduction; 2.2 Vein Pattern Scanning Using Optical Methods; 2.2.1 Vein Pattern Visualization; 2.2.2 Structure of a Hand Vein Recognition Device; 2.3 Problems and Challenges in Vein Pattern Applications; 2.4 Modern Perspectives on Vein Structure Recognition; 2.4.1 Ergonomics and Hand Pose Assessment in Vein pattern Identification; 2.4.2 Synthetic Vein Pattern Generation; 2.4.3 Vein Biometrics in a Connected World; 2.5 Conclusions; References. | |
505 | 8 | |a 3 Improving Biometric Identification Performance Using PCANet Deep Learning and Multispectral Palmprint3.1 Introduction; 3.2 Image Features; 3.3 Proposed Methodology; 3.3.1 Feature Extraction; 3.3.1.1 PCANet Deep Learning; 3.3.1.2 Flexibility Property; 3.3.2 Classification; 3.4 Experimental Results and Discussion; 3.4.1 Experimental Databases; 3.4.2 Identification Test Results; 3.4.2.1 Performance of the Unimodal Systems; 3.4.2.2 Performance of the Multimodal Systems; 3.4.3 Comparison Study; 3.5 Conclusion and Further Work; References; 4 Biometric Acoustic Ear Recognition; 4.1 Introduction. | |
505 | 8 | |a 4.2 Ear Biometrics and Acoustics4.2.1 The Ear as a Biometric; 4.2.2 Image Based Ear Recognition; 4.2.3 Acoustic Based Ear Recognition; 4.2.4 Acoustic Properties of The Ear; 4.2.5 Ears Coupled to Headphones; 4.3 Measuring Device; 4.4 Experiments; 4.4.1 Design Considerations; 4.4.2 Data Collection; 4.5 Data Analysis; 4.5.1 Preprocessing; 4.5.2 Initial Data Analysis; 4.5.3 Statistical Attributes; 4.5.4 Feature Selection and Extraction; 4.5.4.1 All Frequency Components; 4.5.4.2 Octave Bands; 4.5.4.3 Acoustic Properties of The Outer Ear; 4.6 Results; 4.6.1 Performance of All Frequency Components. | |
505 | 8 | |a 4.6.2 Performance of PCA4.6.3 Performance of Octave Bands; 4.6.4 Performance of Ear Characteristic Bands and Peaks; 4.7 Discussion and Future Work; 4.8 Conclusion; References; 5 Eye Blinking EOG Signals as Biometrics; 5.1 Introduction; 5.2 Origin of Eye Blinking EOG Signals; 5.3 Proposed Approach for Eye Blinking EOG Biometric System; 5.3.1 Data Acquisition; 5.3.2 Pre-processing; 5.3.3 Feature Extraction; 5.3.4 Feature Selection; 5.3.5 Classification; 5.3.5.1 Linear Decision Rule; 5.3.5.2 Mahalanobis Decision Rule; 5.4 Experimental Setup and Results; 5.4.1 Identification Mode. | |
500 | |a Includes index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as quality issue, biometric template protection, and anti-spoofing. The book also focuses on several emerging topics such as big data issues, mobile biometrics and multispectral biometrics, and includes a number of new biometrics such as vein pattern, acoustic biometrics, eye-blinking EOG, ECG, gait and handwriting. Authors also show how to use biometrics in cyber security applications and its relevant legal matters under EU legislation. The contributors cover the topics, their methods, and their applications in depth. | ||
504 | |a Includes bibliographical references at the end of each chapters and index. | ||
590 | |a SpringerLink |b Springer Complete eBooks | ||
650 | 0 | |a Biometric identification. | |
650 | 0 | |a Big data. | |
650 | 0 | |a Artificial intelligence. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Jiang, Richard, |e editor. | |
700 | 1 | |a Al-madeed, Somaya, |e editor. | |
700 | 1 | |a Bouridane, Ahmed, |e editor. | |
700 | 1 | |a Crookes, Danny, |d 1956- |e editor. | |
700 | 1 | |a Beghdadi, A. |q (Azeddine), |e editor. | |
776 | 0 | 8 | |i Print version: |z 9783319473000 |z 331947300X |w (OCoLC)958460434 |
830 | 0 | |a Signal processing for security technologies. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-47301-7 |y Plný text |
992 | |c NTK-SpringerENG | ||
999 | |c 99658 |d 99658 | ||
993 | |x NEPOSILAT |y EIZ |