| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910141501003321 |
|
|
Autore |
Naït-Ali Amine |
|
|
Titolo |
Signal and image processing for biometrics [[electronic resource] /] / edited by Amine Naït-Ali, Régis Fournier |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, : ISTE |
|
Hoboken, N.J., : Wiley, 2012 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-118-56191-0 |
1-299-18712-9 |
1-118-58811-8 |
1-118-58819-3 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (337 p.) |
|
|
|
|
|
|
Collana |
|
Digital signal and image processing series |
|
|
|
|
|
|
Altri autori (Persone) |
|
Naït-AliAmine |
FournierRegis |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Biometric identification |
Image processing |
Signal processing |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction to biometrics -- Introduction to 2D face recognition -- Facial soft biometrics for person recognition -- Modeling, reconstruction, and tracking for face recognition -- 3D face recognition -- Introduction to the iris biometrics -- Voice biometrics : speaker verification and identification -- Introduction to hand biometrics -- Hidden biometrics -- Performance evaluation of biometric systems -- Classification techniques for biometrics -- Data cryptography -- Visual data protection -- Biometrics in forensics. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The aim of this book is to deal with biometrics in terms of signal and image processing methods and algorithms. This will help engineers and students working in digital signal and image processing deal with the implementation of such specific algorithms.It discusses numerous signal and image processing techniques that are very often used in |
|
|
|
|
|
|
|
|
|
|
|
|
|
biometric applications. In particular, algorithms related to hand feature extraction, speech recognition, 2D/3D face biometrics, video surveillance and other interesting approaches are presented. Moreover, in some chapters, Matlab codes are provide |
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996466068503316 |
|
|
Titolo |
Engineering Secure Software and Systems : Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011, Proceedings / / edited by Úlfar Erlingsson, Roel Wieringa, Nicola Zannone |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2011.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XI, 273 p. 69 illus., 21 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 6542 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer communication systems |
Data encryption (Computer science) |
Software engineering |
Data structures (Computer science) |
Computer science—Mathematics |
Computers |
Computer Communication Networks |
Cryptology |
Software Engineering/Programming and Operating Systems |
Data Structures and Information Theory |
Math Applications in Computer Science |
Models and Principles |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the Third |
|
|
|
|
|
|
|
|
|
|
International Symposium on Engineering Secure Software and Systems, ESSoS 2011, held in Madrid, Italy, in February 2011. The 18 revised full papers presented together with 3 idea papers were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on model-based security, tools and mechanisms, Web security, security requirements engineering, and authorization. |
|
|
|
|
|
| |