Skip to content

Biometric Technologies and Verification Systems

Best in textbook rentals since 2012!

ISBN-10: 0750679670

ISBN-13: 9780750679671

Edition: 2006

Authors: John R. Vacca

List price: $83.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Biometric Technologies and Verification Systemsis organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. …    
Customers also bought

Book details

List price: $83.95
Copyright year: 2006
Publisher: Elsevier Science & Technology
Publication date: 4/23/2007
Binding: Paperback
Pages: 656
Size: 7.50" wide x 9.25" long x 0.95" tall
Weight: 2.442
Language: English

John R. Vacca is an information technology consultant and writer. The author of twenty-one books and more than 330 articles, his most recent titles includeInternet Security, VRML; Bringing Virtual Reality to the Internet, Official Netscape LiveWire Pro Book,andIntranet Security. John was also the configuration management specialist, computer specialist, and the computer security official for NASAs space station program (Freedom) and the Alpha until his early retirement from NASA in 1995.

Overview of Biometrics Technology and Verification Systems
What Is Biometrics?
Types of Biometrics Technology and Verification Systems
Biometrics Technology and Verification Systems Standards
How Biometrics Eye Analysis Technology Works
How Iris Pattern Recognition Works
How Retina Pattern Recognition Works
How Biometrics Facial Recognition Technology Works
How Video Face Recognition Works
How Facial Thermal Imaging in The Infrared Spectrum Works
How Biometrics Finger Scanning Analysis Technology Works
How Finger Image Capture Works
How Fingerscanning Verification and Recognition Works
How Biometrics Geometry Analysis Technology Works
How Hand Geometry Image Technology Works
How Finger Geometry Technology Works
How Biometrics Verification Technology Works
How Dynamic Signature Verification Technology Works
How Voice Recognition Technology Works
How Keystroke Dynamics Technology Works
How Palm Print Pattern Recognition Technology Works
How Vein Pattern Analysis Recognition Technology Works
How Ear Shape Analysis Technology Works
How Body Odor And/Or Scent Analysis and Other Advanced Technology Works
How DNA Measurement Technology Works
How Privacy Enhanced Biometrics Based Verification/Authentication Works
How Fingerprint Verification/Authentication Technology Works
Vulnerable Points of A Biometric Verification System
How Brute Force Attacks Work
How Data Hiding Technology Works
Image-Based Challenges/Response Methods
How Cancelable Biometrics Work
Large-Scale Implementation/Deployment of Biometrics Technologies and Verification Systems
Specialized Biometrics Enterprise Deployment
How to Implement Biometrics Technology and Verification Systems
Biometrics Solutions and Future Directions
How Mapping The Body Technology Works
Selecting Biometric Solutions
Biometric Benefits