000 | 03522nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-1-84628-064-1 | ||
003 | DE-He213 | ||
005 | 20201213200612.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2005 xxk| s |||| 0|eng d | ||
020 |
_a9781846280641 _9978-1-84628-064-1 |
||
024 | 7 |
_a10.1007/b138151 _2doi |
|
050 | 4 | _aQ337.5 | |
050 | 4 | _aTK7882.P3 | |
072 | 7 |
_aUYQP _2bicssc |
|
072 | 7 |
_aCOM016000 _2bisacsh |
|
082 | 0 | 4 |
_a006.4 _223 |
100 | 1 |
_aWayman, James. _eeditor. |
|
245 | 1 | 0 |
_aBiometric Systems _h[electronic resource] : _bTechnology, Design and Performance Evaluation / _cedited by James Wayman, Anil Jain, Davide Maltoni, Dario Maio. |
264 | 1 |
_aLondon : _bSpringer London, _c2005. |
|
300 |
_aXIV, 370 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aAn Introduction to Biometric Authentication Systems -- Fingerprint Identification Technology -- Iris Recognition -- Face Recognition -- Elements of Speaker Verification -- Technology Evaluation of Fingerprint Verification Algorithms -- Methods for Assessing Progress in Face Recognition -- The NIST speaker recognition evaluation program -- Large-Scale Identification System Design -- Biometric System Integration -- Biometrics and the US Constitution -- Privacy Issues in the Application of Biometrics: a European Perspective. | |
520 | _aThe use of computers to recognize humans from physical and behavioral traits dates back to the digital computer evolution of the 1960s. But even after decades of research and hundreds of major deployments, the field of biometrics remains fresh and exciting as new technologies are developed andoldtechnologiesareimprovedandfieldedinnewapplications.Wor- wide over the past few years,there has been a marked increase in both g- ernment and private sector interest in large-scale biometric deployments for accelerating human–machine processes, efficiently delivering human services, fighting identity fraud and even combating terrorism. The p- pose of this book is to explore the current state of the art in biometrics- tems and it is the system aspect that we have wished to emphasize. By their nature, biometric technologies sit at the exact boundary of the human–machineinterface.Butlikealltechnologies,bythemselvestheycan provide no value until deployed in a system with support hardware, n- work connections, computers, policies and procedures, all tuned together to work withpeople to improve some real business process within a social structure. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aComputer vision. | |
650 | 0 | _aOptical pattern recognition. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aPattern Recognition. |
650 | 2 | 4 | _aSpecial Purpose and Application-Based Systems. |
650 | 2 | 4 | _aImage Processing and Computer Vision. |
650 | 2 | 4 | _aComputer Imaging, Vision, Pattern Recognition and Graphics. |
650 | 2 | 4 | _aUser Interfaces and Human Computer Interaction. |
650 | 2 | 4 | _aSignal, Image and Speech Processing. |
700 | 1 |
_aJain, Anil. _eeditor. |
|
700 | 1 |
_aMaltoni, Davide. _eeditor. |
|
700 | 1 |
_aMaio, Dario. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781852335960 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/b138151 |
912 | _aZDB-2-SCS | ||
950 | _aComputer Science (Springer-11645) | ||
999 |
_c13028 _d13028 |