000 04053nam a22005415i 4500
001 978-1-4471-6524-8
003 DE-He213
005 20200421112235.0
007 cr nn 008mamaa
008 140717s2014 xxk| s |||| 0|eng d
020 _a9781447165248
_9978-1-4471-6524-8
024 7 _a10.1007/978-1-4471-6524-8
_2doi
050 4 _aQA76.9.E94
072 7 _aUYD
_2bicssc
072 7 _aCOM074000
_2bisacsh
082 0 4 _a004.24
_223
245 1 0 _aHandbook of Biometric Anti-Spoofing
_h[electronic resource] :
_bTrusted Biometrics under Spoofing Attacks /
_cedited by S�ebastien Marcel, Mark S. Nixon, Stan Z. Li.
264 1 _aLondon :
_bSpringer London :
_bImprint: Springer,
_c2014.
300 _aXVII, 281 p. 95 illus., 50 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Computer Vision and Pattern Recognition,
_x2191-6586
505 0 _aIntroduction -- Forgeries of Fingerprints in Forensic Science -- Fingerprint Anti-Spoofing in Biometric Systems -- Face Anti-Spoofing: Visual Approach -- Face Anti-Spoofing: Multi-Spectral Approach -- Iris Anti-Spoofing -- Speaker Recognition Anti-Spoofing -- Gait Anti-Spoofing -- Multimodal Anti-Spoofing in Biometric Recognition Systems -- Evaluation Methodologies -- Related Standards -- Legal Aspects: Biometric Data, Evidence Rules and Trusted Identities -- Ethical Issues in Anti-Spoofing -- Evaluation Databases.
520 _aAs the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks. Novel theoretical methods are also introduced to evaluate the various possible countermeasures. Topics and features: Provides a detailed introduction to the field of biometric anti-spoofing and a thorough review of the associated literature Examines spoofing attacks against five biometric modalities, namely, fingerprints, face, iris, speaker and gait Discusses anti-spoofing measures for multi-model biometric systems Reviews evaluation methodologies, international standards, and legal and ethical issues Describes current challenges and suggests directions for future research Presents the latest work from a global selection of experts in the field, including members of the TABULA RASA project This comprehensive text/reference is truly essential reading for all biometric researchers and practitioners in industry and academia. Graduate students of computer science and electronic engineering will also find the book to be a useful supplementary reference for courses on biometrics.
650 0 _aComputer science.
650 0 _aComputer system failures.
650 0 _aMathematical statistics.
650 0 _aImage processing.
650 0 _aPattern recognition.
650 1 4 _aComputer Science.
650 2 4 _aSystem Performance and Evaluation.
650 2 4 _aImage Processing and Computer Vision.
650 2 4 _aPattern Recognition.
650 2 4 _aProbability and Statistics in Computer Science.
700 1 _aMarcel, S�ebastien.
_eeditor.
700 1 _aNixon, Mark S.
_eeditor.
700 1 _aLi, Stan Z.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781447165231
830 0 _aAdvances in Computer Vision and Pattern Recognition,
_x2191-6586
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4471-6524-8
912 _aZDB-2-SCS
942 _cEBK
999 _c58240
_d58240