Get Free Shipping on orders over $79
Biometric Authentication : International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002 Proceedings - Anil K. Jain

Biometric Authentication

International ECCV 2002 Workshop Copenhagen, Denmark, June 1, 2002 Proceedings

By: Anil K. Jain, Massimo Tistarelli, Josef Bigun

eText | 6 August 2003 | Edition Number 1

At a Glance

eText


$84.99

or 4 interest-free payments of $21.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.
Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral characteristics. It associates an individual with a previously determined identity based on that individual s appearance or behavior. Because many physiological or behavioral characteristics (biometric indicators) are distinctive to each person, biometric identifiers are inherently more reliable and more capable than knowledge-based (e.g., password) and token-based (e.g., a key) techniques in differentiating between an authorized person and a fraudulent impostor. For this reason, more and more organizations are looking to automated identity authentication systems to improve customer satisfaction, security, and operating efficiency as well as to save critical resources. Biometric authentication is a challenging pattern recognition problem; it involves more than just template matching. The intrinsic nature of biometric data must be carefully studied, analyzed, and its properties taken into account in developing suitable representation and matching algorithms. The intrinsic variability of data with time and environmental conditions, the social acceptability and invasiveness of acquisition devices, and the facility with which the data can be counterfeited must be considered in the choice of a biometric indicator for a given application. In order to deploy a biometric authentication system, one must consider its reliability, accuracy, applicability, and efficiency. Eventually, it may be necessary to combine several biometric indicators (multimodal-biometrics) to cope with the drawbacks of the individual biometric indicators.
on
Desktop
Tablet
Mobile

More in Computer Vision

Mastering Invideo AI - Robert Keyser

eBOOK

Mastering Chat GPT - Robert Keyser

eBOOK

Everyday AI - Guenter Schamel

eBOOK

$7.99

A I(M) Here to Stay - Jonathon Wetzel

eBOOK