89,95 €
89,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
45 °P sammeln
89,95 €
89,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
45 °P sammeln
Als Download kaufen
89,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
45 °P sammeln
Jetzt verschenken
89,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
45 °P sammeln
  • Format: ePub

Biometrics use an individual's unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, from high security authentication to access to your laptop or phone. With the deployment of biometric systems in different environments such as laptops, mobile phones, airports, e-commerce, and others, users are also gradually getting accustomed with their use in everyday life, and the security weaknesses of these systems are also recognized by fraudsters and hackers. The use of fake biometric traits is…mehr

Produktbeschreibung
Biometrics use an individual's unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, from high security authentication to access to your laptop or phone. With the deployment of biometric systems in different environments such as laptops, mobile phones, airports, e-commerce, and others, users are also gradually getting accustomed with their use in everyday life, and the security weaknesses of these systems are also recognized by fraudsters and hackers. The use of fake biometric traits is commonly termed presentation attacks or spoofing, and unless the security system is equipped with a spoofing detection ability, fake biometric traits can be easily presented to gain illegitimate access. Hence, a secure biometrics system should be able to detect spoofing attacks.

This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader's understanding.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, D ausgeliefert werden.

Autorenporträt
Amit Chatterjee has several years of research experience of working on developing various anti-spoof biometric sensors using optical techniques and has published around 40 Journal and international conference papers and has filed 7 patents.