LEADER 03175nam 2200613 450 001 9910823391903321 005 20230125182541.0 010 $a1-60807-018-2 035 $a(CKB)2670000000133266 035 $a(EBL)829297 035 $a(OCoLC)769343996 035 $a(SSID)ssj0000652455 035 $a(PQKBManifestationID)12260434 035 $a(PQKBTitleCode)TC0000652455 035 $a(PQKBWorkID)10642595 035 $a(PQKB)11236085 035 $a(Au-PeEL)EBL829297 035 $a(CaPaEBR)ebr10522164 035 $a(CaBNVSL)mat09100850 035 $a(IEEE)9100850 035 $a(MiAaPQ)EBC829297 035 $a(EXLCZ)992670000000133266 100 $a20200729d2011 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBiometrics in identity management $econcepts to applications /$fShimon K. Modi 210 1$aBoston :$cArtech House,$dc2011. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2011] 215 $a1 online resource (278 p.) 225 1 $aInformation security and privacy series 300 $aDescription based upon print version of record. 311 $a1-60807-017-4 320 $aIncludes bibliographical references and index. 327 $aCh. 1. Introduction -- Ch. 2. Fundamentals of technical evaluations -- Ch. 3. Fingerprint recognition -- Ch. 4. Face recognition -- Ch. 5. Iris recognition -- Ch. 6. Hand geometry recognition -- Ch. 7. Speaker recognition -- Ch. 8. Vascular pattern recognition -- Ch. 9. Dynamic signature verification -- Ch. 10. Keystroke dynamics, retina, DNA, and gait recognition -- Ch. 11. Multibiometric systems -- Ch. 12. Biometric standards -- Ch. 13. Biometric testing and evaluation programs -- Ch. 14. Designing and deploying biometric systems -- Ch. 15. Biometric system security -- Ch. 16. Privacy concerns in biometric applications. 330 $aIn today's digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progressively complex. This has brought the spotlight on the importance of effective and efficient means of ascertaining an individual's identity. Biometric technologies like fingerprint recognition, face recognition, iris recognition etc. have a long history of use in law enforcement applications and are now 410 0$aArtech House information security and privacy series. 606 $aBiometric identification 606 $aBiometric identification$xTechnological innovations 606 $aIdentification$xData processing 615 0$aBiometric identification. 615 0$aBiometric identification$xTechnological innovations. 615 0$aIdentification$xData processing. 676 $a570.191950285 700 $aModi$b Shimon K.$01602948 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910823391903321 996 $aBiometrics in identity management$93927102 997 $aUNINA