Search Results - "biometrics"
Suggested Topics within your search.
Suggested Topics within your search.
- Biometric identification 11
- Pattern recognition systems 7
- Automation 6
- Computer security 6
- Identification 6
- Security measures 4
- Computer networks 2
- Data protection 2
- Methodology 2
- Automatic control 1
- Biomedical Engineering 1
- Biometry 1
- Computational intelligence 1
- Computer science 1
- Computer vision 1
- Cryptography 1
- Cyberterrorism 1
- Data integrity 1
- Data mining -- Congresses 1
- Data processing 1
- Database security 1
- Detectors 1
- Diagnostic Imaging 1
- Diagnostic imaging 1
- Digital watermaking 1
- Distributed processing 1
- Electronic data processing 1
- Equipment and supplies 1
- Fingerprints 1
- Forensic Anthropology 1
-
1
Biometrics concepts, methodologies, tools, and applications
Published 2017Subjects: “…Biometric identification…”
Book -
2
Biometrics personal identification in networked society
Published 1999Table of Contents: “…Introduction to biometrics -- Fingerprint verification -- Face recognition -- Hand geometry based verification -- Recognizing persons by their iris patterns -- Retina identification -- Automatic on-line signature verification -- Speaker recognition -- Infrared identification of faces and body parts -- Keystroke dynamics based authentication -- Automatic gait recognition -- Objective odour measurements -- Ear biometrics -- DNA based identification -- Large scale systems -- Multimodal biometrics -- Technical testing and evaluation of biometric identification devices -- Smartcard based authentication -- Biometrics : identifying law and policy concerns.…”
Book -
3
Biometric authentication a machine learning approach
Published 2005Subjects: “…Biometric identification…”
Book -
4
-
5
-
6
-
7
-
8
Touchless fingerprint biometrics
Published 2016Table of Contents: “…Introduction -- Biometric Systems -- Touchless and Less-Constrained Biometrics -- Fingerprint Biometrics -- Touchless Fingerprint Recognition -- Experimental Results -- Conclusions and Future Work…”
Book -
9
Biometrics in support of military operations lessons from the battlefield
Published 2017Subjects: “…Biometric identification United States.…”
Book -
10
-
11
Biometric image discrimination technologies
Published 2006Subjects: “…Biometric identification…”
Book -
12
-
13
Watermarked face recognition scheme-enhancing the security while maintaining the effectiveness of biometric authentication systems
Published 2016Subjects: “…Biometric identification…”
Thesis Book -
14
Handbook of research on multimedia cyber security
Published 2020Subjects: “…Biometric identification…”
Book -
15
-
16
Identity, security and democracy the wider social and ethical implications of automated systems for human identification
Published 2009Table of Contents: “…Cosmi [and others] -- Biometric, identification and practical ethics / Arnon Harel -- Machine-readable bodies biometrics, informatization and surveillance / Irma can der Ploeg -- The biometric society : risks and opportunities / Manfred U.A. …”
Conference Proceeding Book -
17
Computer security basics
Published 2006Table of Contents: “…Introduction -- Some security history -- Computer system security and access controls -- Viruses and other wildlife -- Establishing and maintaining a security policy -- Web attacks and internet vulnerabilities -- Encryption -- Communications and network security -- Physical security and biometrics -- Wireless network security.…”
Book -
18
Cyber security and IT infrastructure protection
Published 2014Table of Contents: “…Disaster recovery -- 6. Biometrics -- 7. Homeland security -- 8. Cyber warfare -- 9. …”
Book -
19
Security engineering a guide to building dependable distributed systems
Published 2008Table of Contents: “…-- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance.…”
Book -
20
Intelligence collection
Published 2014Table of Contents: “…Biological, Medical, and Biometric Intelligence -- 17. Materiel Acquisition and Exploitation -- PART III. …”
Book


