Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)

Buy
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional knowledge-
based or token-based personal identification or verification systems are tedious,
time-consuming, inefficient and expensive.

Knowledge-based approaches use “something that you know” (such as passwords
and personal identification numbers) for personal identification; token-based
approaches, on the other hand, use “something that you have” (such as passports or
credit cards) for the same purpose. Tokens (e.g., credit cards) are time-consuming and
expensive to replace. Passwords (e.g., for computer login and e-mail accounts) are hard
to remember. A company may spend $14 to $28 (U.S.) on handling a password reset, and
about 19% of help-desk calls are related to the password reset problem. This may
suggest that the traditional knowledge-based password protection is unsatisfactory.
Since these approaches are not based on any inherent attribute of an individual in the
identification process, they are unable to differentiate between an authorized person
and an impostor who fraudulently acquires the “token” or “knowledge” of the authorized
person. These shortcomings have led to biometrics identification or verification
systems becoming the focus of the research community in recent years.

Biometrics, which refers to automatic recognition of people based on their distinctive
anatomical (e.g., face, fingerprint, iris, etc.) and behavioral (e.g., online/off-line
signature, voice, gait, etc.) characteristics, is a hot topic nowadays, since there is a
growing need for secure transaction processing using reliable methods. Biometricsbased
authentication can overcome some of the limitations of the traditional automatic
personal identification technologies, but still, new algorithms and solutions are required.
(HTML tags aren't allowed.)

Inside Microsoft® Visual Studio® .NET 2003
Inside Microsoft® Visual Studio® .NET 2003

Learn how to put all the built-in power of Microsoft® Visual Studio® .NET 2003 to work with this comprehensive, in-depth programming guide. It drills down into the internal workings of Visual Studio .NET to help you get the most out of its features, editors, and project-management capabilities. You'll see how to...

Practice Makes Perfect English Sentence Builder (Practice Makes Perfect Series)
Practice Makes Perfect English Sentence Builder (Practice Makes Perfect Series)

Practice Makes Perfect helps you put your English vocabulary and grammar skills together!

You may have all the vocabulary down pat and every grammar point nailed--but without the skill of knowing how to put these elements together, communicating in your second language would be nearly impossible. Practice Makes Perfect:...

Raspberry Pi Projects For Dummies
Raspberry Pi Projects For Dummies

Join the Raspberry revolution with these fun and easy Piprojects

The Raspberry Pi has opened up a whole new world of innovationfor everyone from hardware hackers and programmers to students,hobbyists, engineers, and beyond. Featuring a variety of hands-onprojects, this easy-to-understand guide walks you through everystep of...


The Design of Approximation Algorithms
The Design of Approximation Algorithms

Discrete optimization problems are everywhere, from traditional operations research planning problems, such as scheduling, facility location, and network design; to computer science problems in databases; to advertising issues in viral marketing. Yet most such problems are NP-hard. Thus unless P = NP, there are no efficient algorithms to find...

The Philosophical Journey: An Interactive Approach
The Philosophical Journey: An Interactive Approach

The Philosophical Journey: An Interactive Approach, 7e is a text with readings that enhances comprehension of philosophical study by encouraging students to ponder, explore, and actively participate in the learning process. Philosophy becomes a personal journey for students through Lawhead’s unique pedagogy that...

Server Load Balancing
Server Load Balancing
This book is meant to be a resource for anyone involved in the design, production, overseeing, or troubleshooting of a site that employs server load balancing (SLB). Managers and other high-level people can use this book to improve their understanding of the overall technology. Engineers and site architects can use this book to give insight into...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy