000 03563nam a22005295i 4500
001 978-3-031-49071-2
003 DE-He213
005 20240730170919.0
007 cr nn 008mamaa
008 240109s2024 sz | s |||| 0|eng d
020 _a9783031490712
_9978-3-031-49071-2
024 7 _a10.1007/978-3-031-49071-2
_2doi
050 4 _aTK7882.B56
072 7 _aUYQP
_2bicssc
072 7 _aCOM016000
_2bisacsh
072 7 _aUYQP
_2thema
082 0 4 _a006.248
_223
100 1 _aSmith-Creasey, Max.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_996200
245 1 0 _aContinuous Biometric Authentication Systems
_h[electronic resource] :
_bAn Overview /
_cby Max Smith-Creasey.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2024.
300 _aX, 118 p. 9 illus., 8 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5776
505 0 _aIntroduction -- Traditional Authentication -- Continuous Authentication -- Biometrics for Continuous Authentication -- Considerations and Challenges -- Conclusion.
520 _aThis book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges. This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable todevices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches. This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.
650 0 _aBiometric identification.
_911407
650 0 _aPattern recognition systems.
_93953
650 0 _aData protection
_xLaw and legislation.
_923450
650 1 4 _aBiometrics.
_932763
650 2 4 _aAutomated Pattern Recognition.
_931568
650 2 4 _aPrivacy.
_935098
710 2 _aSpringerLink (Online service)
_996207
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031490705
776 0 8 _iPrinted edition:
_z9783031490729
830 0 _aSpringerBriefs in Computer Science,
_x2191-5776
_996208
856 4 0 _uhttps://doi.org/10.1007/978-3-031-49071-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c87277
_d87277