Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Biometric security and privacy = opp...
~
Jiang, Richard.
Linked to FindBook
Google Book
Amazon
博客來
Biometric security and privacy = opportunities & challenges in the big data era /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Biometric security and privacy/ edited by Richard Jiang ... [et al.].
Reminder of title:
opportunities & challenges in the big data era /
other author:
Jiang, Richard.
Published:
Cham :Springer International Publishing : : 2017.,
Description:
viii, 424 p. :ill., digital ;24 cm.
[NT 15003449]:
Introduction -- Part I - New Methods in Biometrics -- Deep Biometrics: A Robust Approach to Biometrics in Big Data Issues -- Multimodal Biometric Fusion via Ensemble Learning -- Fuzzy Logic for Precise Biometric Systems -- Hierarchical Biometric Verification with Sparse Features -- Dynamic Programming for Biometric Verification -- Part II - New Advances in Various Biometric Technologies -- Paleographic Handwriting Analysis for Author Identification -- Palmprints versus Fingerprints: Rivals or Friends? -- A Survey on Soft Biometrics for Forensic Analysis -- Robust Biometric Verification with Low Quality Data -- Streamed Biometric Verification for Big Data Challenge -- Privacy-Protected Biometric Verification for Security Applications -- Part III - New Applications using Biometrics -- Biometric Key Generation using Fuzzy Extractor for Mobile Banking -- Securing Electronic Medical Records Using Biometric Authentication -- Body Biometrics from MRI Images for Medicine Advice -- Identify Invisible Persons in Social Network -- From Memory to Human Recognition in Cognitive Robots.
Contained By:
Springer eBooks
Subject:
Biometric identification. -
Online resource:
http://dx.doi.org/10.1007/978-3-319-47301-7
ISBN:
9783319473017
Biometric security and privacy = opportunities & challenges in the big data era /
Biometric security and privacy
opportunities & challenges in the big data era /[electronic resource] :edited by Richard Jiang ... [et al.]. - Cham :Springer International Publishing :2017. - viii, 424 p. :ill., digital ;24 cm. - Signal processing for security technologies,2510-1498. - Signal processing for security technologies..
Introduction -- Part I - New Methods in Biometrics -- Deep Biometrics: A Robust Approach to Biometrics in Big Data Issues -- Multimodal Biometric Fusion via Ensemble Learning -- Fuzzy Logic for Precise Biometric Systems -- Hierarchical Biometric Verification with Sparse Features -- Dynamic Programming for Biometric Verification -- Part II - New Advances in Various Biometric Technologies -- Paleographic Handwriting Analysis for Author Identification -- Palmprints versus Fingerprints: Rivals or Friends? -- A Survey on Soft Biometrics for Forensic Analysis -- Robust Biometric Verification with Low Quality Data -- Streamed Biometric Verification for Big Data Challenge -- Privacy-Protected Biometric Verification for Security Applications -- Part III - New Applications using Biometrics -- Biometric Key Generation using Fuzzy Extractor for Mobile Banking -- Securing Electronic Medical Records Using Biometric Authentication -- Body Biometrics from MRI Images for Medicine Advice -- Identify Invisible Persons in Social Network -- From Memory to Human Recognition in Cognitive Robots.
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as quality issue, biometric template protection, and anti-spoofing. The book also focuses on several emerging topics such as big data issues, mobile biometrics and multispectral biometrics, and includes a number of new biometrics such as vein pattern, acoustic biometrics, eye-blinking EOG, ECG, gait and handwriting. Authors also show how to use biometrics in cyber security applications and its relevant legal matters under EU legislation. The contributors cover the topics, their methods, and their applications in depth.
ISBN: 9783319473017
Standard No.: 10.1007/978-3-319-47301-7doiSubjects--Topical Terms:
729691
Biometric identification.
LC Class. No.: TK7882.B56
Dewey Class. No.: 006.248
Biometric security and privacy = opportunities & challenges in the big data era /
LDR
:02979nmm a2200349 a 4500
001
2089171
003
DE-He213
005
20170628140258.0
006
m d
007
cr nn 008maaau
008
171013s2017 gw s 0 eng d
020
$a
9783319473017
$q
(electronic bk.)
020
$a
9783319473000
$q
(paper)
024
7
$a
10.1007/978-3-319-47301-7
$2
doi
035
$a
978-3-319-47301-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7882.B56
072
7
$a
TTBM
$2
bicssc
072
7
$a
UYS
$2
bicssc
072
7
$a
TEC008000
$2
bisacsh
072
7
$a
COM073000
$2
bisacsh
082
0 4
$a
006.248
$2
23
090
$a
TK7882.B56
$b
B615 2017
245
0 0
$a
Biometric security and privacy
$h
[electronic resource] :
$b
opportunities & challenges in the big data era /
$c
edited by Richard Jiang ... [et al.].
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
viii, 424 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Signal processing for security technologies,
$x
2510-1498
505
0
$a
Introduction -- Part I - New Methods in Biometrics -- Deep Biometrics: A Robust Approach to Biometrics in Big Data Issues -- Multimodal Biometric Fusion via Ensemble Learning -- Fuzzy Logic for Precise Biometric Systems -- Hierarchical Biometric Verification with Sparse Features -- Dynamic Programming for Biometric Verification -- Part II - New Advances in Various Biometric Technologies -- Paleographic Handwriting Analysis for Author Identification -- Palmprints versus Fingerprints: Rivals or Friends? -- A Survey on Soft Biometrics for Forensic Analysis -- Robust Biometric Verification with Low Quality Data -- Streamed Biometric Verification for Big Data Challenge -- Privacy-Protected Biometric Verification for Security Applications -- Part III - New Applications using Biometrics -- Biometric Key Generation using Fuzzy Extractor for Mobile Banking -- Securing Electronic Medical Records Using Biometric Authentication -- Body Biometrics from MRI Images for Medicine Advice -- Identify Invisible Persons in Social Network -- From Memory to Human Recognition in Cognitive Robots.
520
$a
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as quality issue, biometric template protection, and anti-spoofing. The book also focuses on several emerging topics such as big data issues, mobile biometrics and multispectral biometrics, and includes a number of new biometrics such as vein pattern, acoustic biometrics, eye-blinking EOG, ECG, gait and handwriting. Authors also show how to use biometrics in cyber security applications and its relevant legal matters under EU legislation. The contributors cover the topics, their methods, and their applications in depth.
650
0
$a
Biometric identification.
$3
729691
650
0
$a
Big data.
$3
2045508
650
0
$a
Artificial intelligence.
$3
516317
650
1 4
$a
Engineering.
$3
586835
650
2 4
$a
Signal, Image and Speech Processing.
$3
891073
650
2 4
$a
Biometrics.
$3
898232
650
2 4
$a
Big Data/Analytics.
$3
2186785
650
2 4
$a
User Interfaces and Human Computer Interaction.
$3
892554
650
2 4
$a
Security Science and Technology.
$3
1531662
650
2 4
$a
Systems and Data Security.
$3
898223
700
1
$a
Jiang, Richard.
$3
3219545
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Signal processing for security technologies.
$3
3219546
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-47301-7
950
$a
Engineering (Springer-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9315343
電子資源
11.線上閱覽_V
電子書
EB TK7882.B56
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login