Palmprint Authentication is the first book to provide a comprehensive introduction to palmprint technologies. It reveals automatic biometric techniques for personal identification using palmprint, from the approach based on offline palmprint images, to the current state-of-the-art algorithm using online palmprint images. Palmprint Authentication provides the reader with a basic concept of Palmprint Authentication. It also includes an in-depth discussion of Palmprint Authentication technologies, a detailed description of Palmprint Authentication systems, and an up-to-date coverage of how these issues are developed. This book is suitable for different levels of readers: those who want to learn more about palmprint technology, and those who wish to understand, participate, and/or develop a palmprint authentication system. Palmprint Authentication is effectively a handbook for biometric research and development. Graduate students and researchers in computer science, electrical engineering, systems science, and information technology will all find it uniquely useful, not only as a reference book, but also as a text book. Researchers and practitioners in industry, and R&D laboratories working in the fields of security system design, biometrics, immigration, law enforcement, control, and pattern recognition will also benefit from this volume.
Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on `something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate the identity of a person for secure transaction processing. Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, very few books are exclusively devoted to such issues of automated biometrics. Automated Biometrics: Technologies and Systems systematically introduces the technologies and systems, and explores how to design the corresponding systems with in-depth discussion. The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security.
Data Management and Internet Computing for Image/Pattern Analysis focuses on the data management issues and Internet computing aspect of image processing and pattern recognition research. The book presents a comprehensive overview of the state of the art, providing detailed case studies that emphasize how image and pattern (IAP) data are distributed and exchanged on sequential and parallel machines, and how the data communication patterns in low- and higher-level IAP computing differ from general numerical computation, what problems they cause and what opportunities they provide. The studies also describe how the images and matrices should be stored, accessed and distributed on different types of machines connected to the Internet, and how Internet resource sharing and data transmission change traditional IAP computing. Data Management and Internet Computing for Image/Pattern Analysis is divided into three parts: the first part describes several software approaches to IAP computing, citing several representative data communication patterns and related algorithms; the second part introduces hardware and Internet resource sharing in which a wide range of computer architectures are described and memory management issues are discussed; and the third part presents applications ranging from image coding, restoration and progressive transmission. Data Management and Internet Computing for Image/Pattern Analysis is an excellent reference for researchers and may be used as a text for advanced courses in image processing and pattern recognition.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.