Handbook of Biometric Anti-Spoofing

Presentation Attack Detection

Nonfiction, Computers, Advanced Computing, Engineering, Computer Vision, Computer Hardware, General Computing
Cover of the book Handbook of Biometric Anti-Spoofing by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319926278
Publisher: Springer International Publishing Publication: January 1, 2019
Imprint: Springer Language: English
Author:
ISBN: 9783319926278
Publisher: Springer International Publishing
Publication: January 1, 2019
Imprint: Springer
Language: English

This authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) – also known as Biometric Anti-Spoofing. Building on the success of the previous, pioneering edition, this thoroughly updated second edition has been considerably expanded to provide even greater coverage of PAD methods, spanning biometrics systems based on face, fingerprint, iris, voice, vein, and signature recognition. New material is also included on major PAD competitions, important databases for research, and on the impact of recent international legislation. Valuable insights are supplied by a selection of leading experts in the field, complete with results from reproducible research, supported by source code and further information available at an associated website.

Topics and features: reviews the latest developments in PAD for fingerprint biometrics, covering optical coherence tomography (OCT) technology, and issues of interoperability; examines methods for PAD in iris recognition systems, and the application of stimulated pupillary light reflex for this purpose; discusses advancements in PAD methods for face recognition-based biometrics, such as research on 3D facial masks and remote photoplethysmography (rPPG); presents a survey of PAD for automatic speaker recognition (ASV), including the use of convolutional neural networks (CNNs), and an overview of relevant databases; describes the results yielded by key competitions on fingerprint liveness detection, iris liveness detection, and software-based face anti-spoofing; provides analyses of PAD in fingervein recognition, online handwritten signature verification, and in biometric technologies on mobile devicesincludes coverage of international standards, the E.U. PSDII and GDPR directives, and on different perspectives on presentation attack evaluation.

This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) – also known as Biometric Anti-Spoofing. Building on the success of the previous, pioneering edition, this thoroughly updated second edition has been considerably expanded to provide even greater coverage of PAD methods, spanning biometrics systems based on face, fingerprint, iris, voice, vein, and signature recognition. New material is also included on major PAD competitions, important databases for research, and on the impact of recent international legislation. Valuable insights are supplied by a selection of leading experts in the field, complete with results from reproducible research, supported by source code and further information available at an associated website.

Topics and features: reviews the latest developments in PAD for fingerprint biometrics, covering optical coherence tomography (OCT) technology, and issues of interoperability; examines methods for PAD in iris recognition systems, and the application of stimulated pupillary light reflex for this purpose; discusses advancements in PAD methods for face recognition-based biometrics, such as research on 3D facial masks and remote photoplethysmography (rPPG); presents a survey of PAD for automatic speaker recognition (ASV), including the use of convolutional neural networks (CNNs), and an overview of relevant databases; describes the results yielded by key competitions on fingerprint liveness detection, iris liveness detection, and software-based face anti-spoofing; provides analyses of PAD in fingervein recognition, online handwritten signature verification, and in biometric technologies on mobile devicesincludes coverage of international standards, the E.U. PSDII and GDPR directives, and on different perspectives on presentation attack evaluation.

This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics.

More books from Springer International Publishing

Cover of the book Meta-Analytic Structural Equation Modelling by
Cover of the book Elizabeth I in Writing by
Cover of the book The Biblical Covenant in Shakespeare by
Cover of the book Evolving Narratives of Hazard and Risk by
Cover of the book Intermediation and Representation in Latin America by
Cover of the book Renewable and Sustainable Materials in Green Technology by
Cover of the book Identity and Heritage by
Cover of the book Seismic Hydrocarbon Exploration by
Cover of the book Epigenetics and Neuroendocrinology by
Cover of the book Wireless Sensor Networks by
Cover of the book Design, User Experience, and Usability: Users, Contexts and Case Studies by
Cover of the book New Directions in the Ethics of Assisted Suicide and Euthanasia by
Cover of the book Photodynamic Therapy in Veterinary Medicine: From Basics to Clinical Practice by
Cover of the book Molecular Pathology of Breast Cancer by
Cover of the book Applied Computer Sciences in Engineering by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy