000 | 04053nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-1-4471-6524-8 | ||
003 | DE-He213 | ||
005 | 20200421112235.0 | ||
007 | cr nn 008mamaa | ||
008 | 140717s2014 xxk| s |||| 0|eng d | ||
020 |
_a9781447165248 _9978-1-4471-6524-8 |
||
024 | 7 |
_a10.1007/978-1-4471-6524-8 _2doi |
|
050 | 4 | _aQA76.9.E94 | |
072 | 7 |
_aUYD _2bicssc |
|
072 | 7 |
_aCOM074000 _2bisacsh |
|
082 | 0 | 4 |
_a004.24 _223 |
245 | 1 | 0 |
_aHandbook of Biometric Anti-Spoofing _h[electronic resource] : _bTrusted Biometrics under Spoofing Attacks / _cedited by S�ebastien Marcel, Mark S. Nixon, Stan Z. Li. |
264 | 1 |
_aLondon : _bSpringer London : _bImprint: Springer, _c2014. |
|
300 |
_aXVII, 281 p. 95 illus., 50 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Computer Vision and Pattern Recognition, _x2191-6586 |
|
505 | 0 | _aIntroduction -- Forgeries of Fingerprints in Forensic Science -- Fingerprint Anti-Spoofing in Biometric Systems -- Face Anti-Spoofing: Visual Approach -- Face Anti-Spoofing: Multi-Spectral Approach -- Iris Anti-Spoofing -- Speaker Recognition Anti-Spoofing -- Gait Anti-Spoofing -- Multimodal Anti-Spoofing in Biometric Recognition Systems -- Evaluation Methodologies -- Related Standards -- Legal Aspects: Biometric Data, Evidence Rules and Trusted Identities -- Ethical Issues in Anti-Spoofing -- Evaluation Databases. | |
520 | _aAs the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks. Novel theoretical methods are also introduced to evaluate the various possible countermeasures. Topics and features: Provides a detailed introduction to the field of biometric anti-spoofing and a thorough review of the associated literature Examines spoofing attacks against five biometric modalities, namely, fingerprints, face, iris, speaker and gait Discusses anti-spoofing measures for multi-model biometric systems Reviews evaluation methodologies, international standards, and legal and ethical issues Describes current challenges and suggests directions for future research Presents the latest work from a global selection of experts in the field, including members of the TABULA RASA project This comprehensive text/reference is truly essential reading for all biometric researchers and practitioners in industry and academia. Graduate students of computer science and electronic engineering will also find the book to be a useful supplementary reference for courses on biometrics. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer system failures. | |
650 | 0 | _aMathematical statistics. | |
650 | 0 | _aImage processing. | |
650 | 0 | _aPattern recognition. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystem Performance and Evaluation. |
650 | 2 | 4 | _aImage Processing and Computer Vision. |
650 | 2 | 4 | _aPattern Recognition. |
650 | 2 | 4 | _aProbability and Statistics in Computer Science. |
700 | 1 |
_aMarcel, S�ebastien. _eeditor. |
|
700 | 1 |
_aNixon, Mark S. _eeditor. |
|
700 | 1 |
_aLi, Stan Z. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781447165231 |
830 | 0 |
_aAdvances in Computer Vision and Pattern Recognition, _x2191-6586 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4471-6524-8 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c58240 _d58240 |