Biometric Technologies and Verification Systems (Paperback)
暫譯: 生物識別技術與驗證系統 (平裝本)

John R. Vacca

買這商品的人也買了...

商品描述

Description:

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.

Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.

 

Table of Contents:

Part 1: Overview Of Biometrics Technology And Verification Systems
CHAPTER 1: What Is Biometrics?
CHAPTER 2: Types Of Biometrics Technology And Verification Systems
CHAPTER 3: Biometrics Technology And Verification Systems Standards
Part 2: How Biometrics Eye Analysis Technology Works
CHAPTER 4: How Iris Pattern Recognition Works
CHAPTER 5: How Retina Pattern Recognition Works
Part 3: How Biometrics Facial Recognition Technology Works
CHAPTER 6: How Video Face Recognition Works
CHAPTER 7: How Facial Thermal Imaging In The Infrared Spectrum Works
Part 4: How Biometrics Finger Scanning Analysis Technology Works
CHAPTER 8: How Finger Image Capture Works
CHAPTER 9: How Fingerscanning Verification And Recognition Works
Part 5: How Biometrics Geometry Analysis Technology Works
CHAPTER 10: How Hand Geometry Image Technology Works
CHAPTER 11: How Finger Geometry Technology Works
Part 6: How Biometrics Verification Technology Works
CHAPTER 12: How Dynamic Signature Verification Technology Works
CHAPTER 13: How Voice Recognition Technology Works
CHAPTER 14: How Keystroke Dynamics Technology Works
CHAPTER 15: How Palm Print Pattern Recognition Technology Works
CHAPTER 16: How Vein Pattern Analysis Recognition Technology Works
CHAPTER 17: How Ear Shape Analysis Technology Works
CHAPTER 18: How Body Odor And/Or Scent Analysis And Other Advanced Technology Works
CHAPTER 19: How DNA Measurement Technology Works
Part 7: How Privacy Enhanced Biometrics Based Verification/Authentication Works
CHAPTER 20: How Fingerprint Verification/Authentication Technology Works
CHAPTER 21: Vulnerable Points Of A Biometric Verification System
CHAPTER 22: How Brute Force Attacks Work
CHAPTER 23: How Data Hiding Technology Works
CHAPTER 24: Image-Based Challenges/Response Methods
CHAPTER 25: How Cancelable Biometrics Work
Part 8: Large-Scale Implementation/Deployment Of Biometrics Technologies And Verification Systems
CHAPTER 26: Specialized Biometrics Enterprise Deployment
CHAPTER 27: How to Implement Biometrics Technology And Verification Systems
Part 9: Biometrics Solutions And Future Directions
CHAPTER 28: How Mapping The Body Technology Works
CHAPTER 29: Selecting Biometric Solutions
CHAPTER 30: Biometric Benefits

商品描述(中文翻譯)

描述:生物識別技術與驗證系統分為九個部分,共30章,並包含一個廣泛的生物識別術語和縮寫詞彙表。它討論了生物識別驗證/身份驗證、識別和系統設計原則的最新技術現狀。它還提供了生物識別如何運作的逐步討論;如何以多種方式收集和分析人類的生物識別數據;生物識別如何作為一種個人識別方法,通過人們獨特的身體或行為特徵來識別他們;以及如何為設計生物識別驗證系統創建詳細的菜單。

只有生物識別驗證/身份驗證是基於識別人類內在的一部分。令牌,如智能卡、磁條卡和實體鑰匙,可能會丟失、被盜或被複製。密碼可能會被遺忘、共享或被第三方無意中觀察到。遺忘的密碼和丟失的「智能卡」對用戶來說是一種麻煩,對系統管理員來說則是一種昂貴的時間浪費。生物識別安全解決方案在識別和驗證/身份驗證人類方面提供了一些獨特的優勢,超越了更傳統的安全方法。本書將幫助識別生物識別在各種安全應用中可以發揮高度安全和特定角色的情況。

目錄:
第一部分:生物識別技術與驗證系統概述
第1章:什麼是生物識別?
第2章:生物識別技術與驗證系統的類型
第3章:生物識別技術與驗證系統標準
第二部分:生物識別眼部分析技術的運作方式
第4章:虹膜模式識別的運作方式
第5章:視網膜模式識別的運作方式
第三部分:生物識別面部識別技術的運作方式
第6章:視頻面部識別的運作方式
第7章:紅外光譜中的面部熱成像的運作方式
第四部分:生物識別指紋掃描分析技術的運作方式
第8章:指紋圖像捕捉的運作方式
第9章:指紋掃描驗證與識別的運作方式
第五部分:生物識別幾何分析技術的運作方式
第10章:手部幾何圖像技術的運作方式
第11章:指幾何技術的運作方式
第六部分:生物識別驗證技術的運作方式
第12章:動態簽名驗證技術的運作方式
第13章:語音識別技術的運作方式
第14章:鍵擊動態技術的運作方式
第15章:掌紋模式識別技術的運作方式
第16章:靜脈模式分析識別技術的運作方式
第17章:耳形分析技術的運作方式
第18章:體味和/或氣味分析及其他先進技術的運作方式
第19章:DNA測量技術的運作方式
第七部分:增強隱私的生物識別基於驗證/身份驗證的運作方式
第20章:指紋驗證/身份驗證技術的運作方式
第21章:生物識別驗證系統的脆弱點
第22章:暴力破解攻擊的運作方式
第23章:數據隱藏技術的運作方式
第24章:基於圖像的挑戰/回應方法
第25章:可取消的生物識別的運作方式
第八部分:生物識別技術與驗證系統的大規模實施/部署
第26章:專業生物識別企業部署
第27章:如何實施生物識別技術與驗證系統
第九部分:生物識別解決方案與未來方向
第28章:身體映射技術的運作方式
第29章:選擇生物識別解決方案
第30章:生物識別的好處