Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security and Privacy in Biometrics
Security and Privacy in Biometrics

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and...

Behavioral Biometrics For Human Identification: Intelligent Applications (Premier Reference Source)
Behavioral Biometrics For Human Identification: Intelligent Applications (Premier Reference Source)
Automatic biometrics recognition techniques are becoming increasingly important in corporate and public security systems and have increased in methods due to rapid field development. Behavioral Biometrics for Human Identification: Intelligent Applications discusses classic behavioral biometrics as well as collects the latest...
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
This is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic...
Human Recognition at a Distance in Video (Advances in Pattern Recognition)
Human Recognition at a Distance in Video (Advances in Pattern Recognition)

Most biometric systems employed for human recognition require physical contact with, or close proximity to, a cooperative subject. Far more challenging is the ability to reliably recognize individuals at a distance, when viewed from an arbitrary angle under real-world environmental conditions. Gait and face data are the two biometrics that...

Independent Component Analysis of Edge Information for Face Recognition (SpringerBriefs in Applied Sciences and Technology)
Independent Component Analysis of Edge Information for Face Recognition (SpringerBriefs in Applied Sciences and Technology)

The book presents research work on face recognition using edge information as features for face recognition with ICA algorithms. The independent components are extracted from edge information. These independent components are used with classifiers to match the facial images for recognition purpose. In their study, authors have explored Canny...

Emerging Trends in ICT Security (Emerging Trends in Computer Science and Applied Computing)
Emerging Trends in ICT Security (Emerging Trends in Computer Science and Applied Computing)

Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many...

   
   
unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy