|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910585799903321 |
|
|
Titolo |
Multimedia security 2 : biometrics, video surveillance and multimedia encryption / / edited by William Puech |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, New Jersey : , : John Wiley & Sons, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-119-98739-3 |
1-394-15038-5 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (320 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Interactive multimedia |
Multimedia systems |
Artificial intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword by Gildas Avoine -- Foreword by Cédric Richard -- Preface -- Chapter 1. Biometrics and Applications -- 1.1. Introduction -- 1.2. History of biometrics -- 1.3. The foundations of biometrics -- 1.3.1. Uses of biometrics -- 1.3.2. Definitions -- 1.3.3. Biometric modalities -- 1.4. Scientific issues -- 1.4.1. Presentation attacks -- 1.4.2. Acquisition of new biometric data or hidden biometrics -- 1.4.3. Quality of biometric data -- 1.4.4. Efficient representation of biometric data -- 1.4.5. Protecting biometric data -- 1.4.6. Aging biometric data -- 1.5. Conclusion -- 1.6. References -- Chapter 2. Protecting Documents Using Printed Anticopy Elements -- 2.1. Introduction -- 2.2. Document authentication approaches: an overview -- 2.3. Print test shapes -- 2.3.1. Print test signatures -- 2.3.2. Glyphs -- 2.3.3. Guilloches -- 2.4. Copy-sensitive graphical codes -- 2.4.1. Copy detection pattern -- 2.4.2. Two-level barcodes -- 2.4.3. Watermarked barcodes -- 2.4.4. Performance of CSGC authentication -- 2.5. Conclusion -- 2.6. References -- Chapter 3. Verifying Document Integrity -- 3.1. Introduction -- 3.2. Fraudulent manipulation of document images -- 3.2.1. Imitation -- 3.2.2. Copy-and-paste of a |
|
|
|
|