Vacca | Biometric Technologies and Verification Systems | E-Book | sack.de
E-Book

E-Book, Englisch, 656 Seiten, Web PDF

Vacca Biometric Technologies and Verification Systems


1. Auflage 2007
ISBN: 978-0-08-048839-4
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 656 Seiten, Web PDF

ISBN: 978-0-08-048839-4
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost 'smart cards' are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

John Vacca is an information technology consultant, professional writer, editor, reviewer and internationally-known, best-selling author based in Pomeroy, Ohio. Since 1982, John has authored 72 books, including:

Identity Theft (Cybersafety) (Publisher: Chelsea House Pub (April 1, 2012 ); System Forensics, Investigation, And Response (Publisher: Jones & Bartlett Learning (September 24, 2010); Managing Information Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Network and Systems Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Computer and Information Security Handbook (Publisher: Morgan Kaufmann (an imprint of Elsevier Inc.) (June 2, 2009)); Biometric Technologies and Verification Systems (Publisher: Elsevier Science & Technology Books (March 16, 2007)); Practical Internet Security (Hardcover): (Publisher: Springer (October 18, 2006)); Optical Networking Best Practices Handbook (Hardcover): (Publisher: Wiley-Interscience (November 28, 2006)); Computer Forensics: Computer Crime Scene Investigation (With CD-ROM), 2nd Edition (Publisher: Charles River Media (May 26, 2005)
John Vacca has also written more than 600 articles in the areas of advanced storage, computer security and aerospace technology (copies of articles and books are available upon request). John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995. In addition, John is also an independent online book reviewer. Finally, John was one of the security consultants for the MGM movie titled: 'AntiTrust,' which was released on January 12, 2001.

Vacca Biometric Technologies and Verification Systems jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Front cover;1
2;Biometric Technologies and Verification Systems;4
3;Copyright page;5
4;Table of contents;8
5;Foreword;12
6;Acknowledgments;14
7;Introduction;16
8;Part 1: Overview of Biometric Technology and Verification Systems;30
8.1;Chapter 1. What Is Biometrics?;32
8.1.1;Improved Biometrics Is Critical to Security! But Is It?;34
8.1.2;Different Biometric Standards;35
8.1.3;Consortium Helps Advance Biometric Technologies;38
8.1.4;How Biometric Verification Systems Work;40
8.1.5;Summary/Conclusion;45
8.1.6;References;46
8.2;Chapter 2. Types of Biometric Technology and Verification Systems;48
8.2.1;Biometric Technologies for Personal Identification;51
8.2.2;Business and Federal Applications of Biometric Technologies;70
8.2.3;Challenges and Issues in Using Biometrics;74
8.2.4;Risk Management Is the Foundation of Effective Strategy;75
8.2.5;Barriers to Future Growth;81
8.2.6;Summary/Conclusion;82
8.2.7;References;82
8.3;Chapter 3. Biometric Technology and Verification Systems Standards;84
8.3.1;Background;86
8.3.2;NIST’s Accomplishments;89
8.3.3;International Civil Aviation Organization;95
8.3.4;Summary/Conclusion;96
8.3.5;References;99
9;Part 2: How Biometric Eye Analysis Technology Works;100
9.1;Chapter 4. How Iris Pattern Recognition Works;102
9.1.1;What Is Iris Pattern Recognition?;102
9.1.2;How Does Iris Pattern Recognition Work?;105
9.1.3;The Biology Behind the Technology;106
9.1.4;Current and Future Use;110
9.1.5;Summary/Conclusion;112
9.1.6;References;113
9.2;Chapter 5. How Retina Pattern Recognition Works;114
9.2.1;The Anatomy and the Uniqueness of the Retina;114
9.2.2;The Technology Behind Retinal Pattern Recognition;116
9.2.3;The Strengths and Weaknesses of Retinal Pattern Recognition;119
9.2.4;The Applications of Retinal Pattern Recognition;120
9.2.5;Summary/Conclusion;121
9.2.6;References;121
10;Part 3: How Biometric Facial Recognition Technology Works;122
10.1;Chapter 6. How Video Face Recognition Works;124
10.1.1;How Facial Recognition Technology Works;126
10.1.2;The Face;127
10.1.3;The Software;128
10.1.4;Summary/Conclusion;130
10.1.5;References;132
10.2;Chapter 7. How Facial Thermal Imaging in the Infrared Spectrum Works;134
10.2.1;Methodology;135
10.2.2;Results and Discussion;137
10.2.3;Summary/Conclusion;139
10.2.4;Reference;140
11;Part 4: How Biometric Fingerscanning Analysis Technology Works;142
11.1;Chapter 8. How Finger Image Capture Works;144
11.1.1;What Is Finger Image Capture?;144
11.1.2;Practical Applications for Finger Image Capture;144
11.1.3;Accuracy and Integrity;145
11.1.4;Biometric Versus Nonbiometric Fingerprinting;152
11.1.5;Fingerprint Market Size;154
11.1.6;Fingerprint Growth Drivers and Enablers;154
11.1.7;Fingerprint Growth Inhibitors;155
11.1.8;Applications;156
11.1.9;Fingerprint Feature Extraction;156
11.1.10;Fingerprint Form Factors;159
11.1.11;Types of Scanners: Optical, Silicon, and Ultrasound;160
11.1.12;Summary/Conclusion;162
11.1.13;References;162
11.2;Chapter 9. How Fingerscanning Verification and Recognition Works;164
11.2.1;Verification and Recognition;164
11.2.2;Verification Algorithms;172
11.2.3;Summary/Conclusion;173
11.2.4;References;174
12;Part 5: How Biometric Geometry Analysis Technology Works;176
12.1;Chapter 10. How Hand Geometry Image Technology Works;178
12.1.1;Applications for Hand Scanning;178
12.1.2;Combining Biometric Methods;179
12.1.3;How It Works;179
12.1.4;Hand Geometry Strengths and Weaknesses;181
12.1.5;Enhanced Biometric Technology;183
12.1.6;Highest User Acceptance;183
12.1.7;Applications;183
12.1.8;Hand Geometry Market Size;185
12.1.9;Summary/Conclusion;185
12.1.10;References;185
12.2;Chapter 11. How Finger Geometry Technology Works;186
12.2.1;One or Two Fingers?;186
12.2.2;A Mixed Reaction;193
12.2.3;Summary/Conclusion;194
12.2.4;References;194
13;Part 6: How Biometric Verification Technology Works;196
13.1;Chapter 12. How Dynamic Signature Verification Technology Works;198
13.1.1;Requirements of a Dynamic Signature Verification System;198
13.1.2;Dynamic Signature Verification Costs;201
13.1.3;Advantages of Dynamic Signature Verification;201
13.1.4;Disadvantages of Dynamic Signature Verification;202
13.1.5;Summary/Conclusion;202
13.1.6;References;203
13.2;Chapter 13. How Voice Recognition Technology Works;204
13.2.1;Voice Recognition: Security and Costs;207
13.2.2;Areas of Opportunity: Education;208
13.2.3;Summary/Conclusion;208
13.2.4;References;209
13.3;Chapter 14. How Keystroke Dynamics Technology Works;210
13.3.1;What Is Keystroke Dynamics?;210
13.3.2;How Effective Is Keystroke Dynamics?;212
13.3.3;Keystroke Dynamics in Corporate Use;212
13.3.4;Markets for Keystroke Dynamics;214
13.3.5;Summary/Conclusion;215
13.3.6;References;215
13.4;Chapter 15. How Palm Print Pattern Recognition Technology Works;216
13.4.1;History;216
13.4.2;Approach: Concept;218
13.4.3;United States Government Evaluations;220
13.4.4;Standards Overview;221
13.4.5;Summary/Conclusion;221
13.4.6;Reference;222
13.5;Chapter 16. How Vein Pattern Analysis Recognition Technology Works;224
13.5.1;History;224
13.5.2;Approach: Vascular Pattern in the Back of Hands;227
13.5.3;Summary/Conclusion;229
13.5.4;References;230
13.6;Chapter 17. How Ear-Shape Analysis Technology Works;232
13.6.1;Related Work;233
13.6.2;Technical Approach: Ear-Shape Model Building;235
13.6.3;Experimental Results: Data Acquisition;238
13.6.4;Summary/Conclusion;240
13.6.5;References;242
13.7;Chapter 18. How Body Odor and /or Scent Analysis Technology Works;244
13.7.1;Body Odor;246
13.7.2;Sensing System;251
13.7.3;Pattern-Recognition System;252
13.7.4;Olfactory Signal Processing and Pattern-Recognition System;253
13.7.5;Prototype Electronic Nose;255
13.7.6;Problems;256
13.7.7;Electronic Versus Human Nose;257
13.7.8;Who Works with It?;258
13.7.9;Current Applications;259
13.7.10;Future Applications;260
13.7.11;Messengers in Your Mouth;261
13.7.12;Problems Now and Later;262
13.7.13;Pores and Wrinkles;264
13.7.14;Summary/Conclusion;265
13.7.15;References;266
13.8;Chapter 19. How DNA Measurement Technology Works;268
13.8.1;How Is DNA Measurement Used as a Biometric Identifier?;269
13.8.2;DNA Template: DNA Fingerprinting;271
13.8.3;DNA Template: DNA Profiling;272
13.8.4;How Does It Work?;274
13.8.5;Digitalization and Storage;275
13.8.6;Technology: State of Development;279
13.8.7;Challenges and Limitations;279
13.8.8;Applications;281
13.8.9;Future Trends;281
13.8.10;Summary/Conclusion;283
13.8.11;References;283
14;Part 7: How Privacy-Enhanced Biometric-Based Verification/Authentication Works;286
14.1;Chapter 20. How Fingerprint Verification/Authentication Technology Works;288
14.1.1;History;289
14.1.2;Fingerprints;290
14.1.3;Fingerprint Verification;291
14.1.4;Feature Types;296
14.1.5;Image Processing and Verification;298
14.1.6;Technology: State of Development;308
14.1.7;Security;309
14.1.8;Privacy;310
14.1.9;Summary/Conclusion;312
14.1.10;References;314
14.2;Chapter 21. Vulnerable Points of a Biometric Verification System;316
14.2.1;Fingerprint Verification;318
14.2.2;Vulnerable Points of a Biometric System;321
14.2.3;Brute Force Attack Directed at Matching Fingerprint Minutiae;323
14.2.4;A More Realistic Model;326
14.2.5;WSQ-Based Data Hiding;327
14.2.6;The Decoder;334
14.2.7;Image-Based Challenge/Response Method;335
14.2.8;Cancelable Biometrics;337
14.2.9;Summary/Conclusion;343
14.2.10;References;344
14.3;Chapter 22. How Brute Force Attacks Work;346
14.3.1;Biometric Cryptography: Key Generation Using Feature and Parametric Aggregation to Show How Brute Force Attacks Work;347
14.3.2;Brute Force Attacks in General;350
14.3.3;Biometric Crypto Algorithms to Repel Brute Force Attacks;357
14.3.4;Summary/Conclusion;364
14.3.5;References;365
14.4;Chapter 23. How Data-Hiding Technology Works;368
14.4.1;Watermarking Techniques;372
14.4.2;Hiding Biometric Data;373
14.4.3;Experimental Results;376
14.4.4;Hiding a Fingerprint;380
14.4.5;Summary/Conclusion;386
14.4.6;References;387
14.5;Chapter 24. Image-Based Challenges/Response Methods;388
14.5.1;Image-Based Biometric User Verification Systems;388
14.5.2;Image-Based Biometric Verification Systems for Credit Cards;392
14.5.3;Summary/Conclusion;407
14.5.4;References;408
14.6;Chapter 25. How Cancelable Biometrics Work;410
14.6.1;Replaceable Biometrics;416
14.6.2;Cancelable Biometric Algorithm;418
14.6.3;Summary/Conclusion;420
14.6.4;References;421
15;Part 8: Large-Scale Implementation/Deployment of Biometric Technologies and Verification Systems;422
15.1;Chapter 26. Specialized Biometric Enterprise Deployment;424
15.1.1;Biometrics: Life Measures;426
15.1.2;The Case for Biometrics in Enterprise Security;427
15.1.3;Present State of Enterprise Specialized Biometric Security;432
15.1.4;Example Enterprise Scenarios;438
15.1.5;Summary/Conclusion;442
15.1.6;References;445
15.2;Chapter 27. How to Implement Biometric Technology and Verification Systems;446
15.2.1;Social Aspects of Biometric Technologies and Verification Systems;454
15.2.2;Economic Aspects of Biometric Technologies;460
15.2.3;Optimal Identity;461
15.2.4;The Emergence of Standards;462
15.2.5;Costs and Benefits;463
15.2.6;Supply;466
15.2.7;State of the Market;466
15.2.8;Legal Aspects of Biometric Technologies;471
15.2.9;Technical Aspects of Biometric Technologies;476
15.2.10;Biometrics as a Way to Increase Privacy, Anonymity, and Security;481
15.2.11;Summary/Conclusion;486
15.2.12;References;486
16;Part 9: Biometric Solutions and Future Directions;488
16.1;Chapter 28. How Mapping-the-Body Technology Works;490
16.1.1;Tracking;494
16.1.2;Recognition;499
16.1.3;Performance;507
16.1.4;Biometric Verification of Anthropometric Data, Gait Signatures, Human Activities, and Human Movement Disorders;511
16.1.5;Summary/Conclusion;525
16.1.6;References;528
16.2;Chapter 29. Selecting Biometric Solutions;530
16.2.1;Choosing the Right Biometric Solution;540
16.2.2;Uses for Biometrics;547
16.2.3;Selecting a Biometric Technology Solution;549
16.2.4;The Future of Biometrics;552
16.2.5;Smart Card Biometric Technology Solutions;554
16.2.6;Biometrics—Secure Verification by Smart Card;560
16.2.7;RFID Biometric Solutions;562
16.2.8;Summary/Conclusion;567
16.2.9;References;568
16.3;Chapter 30. Biometric Benefits;570
16.3.1;The Benefits of Working Biometrics;570
16.3.2;How Well Do Biometrics Work?;579
16.3.3;The Future of Biometrics;586
16.3.4;Scenario on Biometrics in Everyday Life;592
16.3.5;Scenario on Biometrics in Business;596
16.3.6;Scenario on Biometrics in Health;598
16.3.7;Scenario on Biometrics at the Border;600
16.3.8;Concluding Remarks on Scenario Exercises;604
16.3.9;Summary/Conclusion;606
16.3.10;References;615
17;Glossary;616
18;Index;636



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.