000 | 03145nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-1-4614-5571-4 | ||
003 | DE-He213 | ||
005 | 20200421112037.0 | ||
007 | cr nn 008mamaa | ||
008 | 121116s2013 xxu| s |||| 0|eng d | ||
020 |
_a9781461455714 _9978-1-4614-5571-4 |
||
024 | 7 |
_a10.1007/978-1-4614-5571-4 _2doi |
|
050 | 4 | _aQH323.5 | |
072 | 7 |
_aUYQP _2bicssc |
|
072 | 7 |
_aUYQV _2bicssc |
|
072 | 7 |
_aCOM016000 _2bisacsh |
|
082 | 0 | 4 |
_a570.15195 _223 |
100 | 1 |
_aRathgeb, Christian. _eauthor. |
|
245 | 1 | 0 |
_aIris Biometrics _h[electronic resource] : _bFrom Segmentation to Template Security / _cby Christian Rathgeb, Andreas Uhl, Peter Wild. |
264 | 1 |
_aNew York, NY : _bSpringer New York : _bImprint: Springer, _c2013. |
|
300 |
_aXXII, 358 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v59 |
|
505 | 0 | _aThe Human Iris as a Biometric Identifier -- Iris Biometric Processing -- State-of-the-Art in Iris Biometrics -- Eye Detection -- Iris Segmentation Methodologies -- Multi-Stage Real-Time Iris Preprocessing -- Experiments on Iris Image Processing -- Image Compression Impact on Iris Recognition.-Advanced Comparison Techniques for Challenging Iris Images -- Experiments on Biometric Comparators -- Iris Biometric Cryptosystems -- Cancelable Iris Biometrics -- Potential Attacks -- Experiments on Iris Biometric Template Protection -- Advances, Applications and Challenges -- Watermarking. | |
520 | _aIris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more. Open source software is also provided on a dedicated website which includes feature extraction, segmentation and matching schemes applied in this book to foster scientific exchange. Current state-of-the-art approaches accompanied by comprehensive experimental evaluations are presented as well. This book has been designed as a secondary text book or reference for researchers and advanced-level students in computer science and electrical engineering. Professionals working in this related field will also find this book useful as a reference. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aPattern recognition. | |
650 | 0 | _aBiometrics (Biology). | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aBiometrics. |
650 | 2 | 4 | _aPattern Recognition. |
650 | 2 | 4 | _aSystems and Data Security. |
700 | 1 |
_aUhl, Andreas. _eauthor. |
|
700 | 1 |
_aWild, Peter. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781461455707 |
830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v59 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-5571-4 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c56421 _d56421 |