LEADER 04542nam 22006255 450 001 9910337652003321 005 20200704193516.0 010 $a3-319-98734-8 024 7 $a10.1007/978-3-319-98734-7 035 $a(CKB)4100000007110588 035 $a(MiAaPQ)EBC5568406 035 $a(DE-He213)978-3-319-98734-7 035 $a(PPN)231464606 035 $a(EXLCZ)994100000007110588 100 $a20181024d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBiometric-Based Physical and Cybersecurity Systems /$fedited by Mohammad S. Obaidat, Issa Traore, Isaac Woungang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (590 pages) 311 $a3-319-98733-X 327 $aIntroduction -- Part 1: Advances in Legacy Technologies -- Advances in Fingerprint Technology -- Recognition-based on Eye Biometrics Iris and Retina -- 3D Hand Geometry Recognition -- Fundamentals and Advances in 3D Face Recognition -- Part 2: Emerging Technologies -- Advances in Key Stroke Dynamics-based Security Schemes -- Behavioral Biometrics Based on Human-Computer Interaction Devices -- Continuous Authentication Using Writing Style -- Facets and Promises of Gait Biometrics Recognition -- Online Signature-based Biometrics Recognition -- EEG-based Biometrics -- Part 3: Hybrid Technologies -- Multimodal Biometrics Invariant Fusion Techniques -- Biometrics Based on Healthcare Sensors -- Biometric Authentication for Wearables -- Cognitive Biometrics for User Authentication -- Finger Knuckle based multi-biometrics authentication systems -- Part 4: Enabling Technologies -- Leveraging Cloud-based Resources for Automated Biometric Identification -- Automated Biometric Authentication with Cloud Computing -- Biometrics Security and Internet of Things -- Part 5: Technology and Society -- Protecting the Integrity of Elections using Biometrics -- Ethical, Legal, and Social Implications of Biometrics Technologies -- Conclusion. 330 $aThis book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors. 606 $aSignal processing 606 $aImage processing 606 $aSpeech processing systems 606 $aBiometry 606 $aSystem safety 606 $aComputer security 606 $aSignal, Image and Speech Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/T24051 606 $aBiometrics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22040 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aSignal processing. 615 0$aImage processing. 615 0$aSpeech processing systems. 615 0$aBiometry. 615 0$aSystem safety. 615 0$aComputer security. 615 14$aSignal, Image and Speech Processing. 615 24$aBiometrics. 615 24$aSecurity Science and Technology. 615 24$aSystems and Data Security. 676 $a006.4 702 $aObaidat$b Mohammad S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTraore$b Issa$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWoungang$b Isaac$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910337652003321 996 $aBiometric-Based Physical and Cybersecurity Systems$91954041 997 $aUNINA