Biometric Security and Privacy
Home > Computing and Information Technology > Computer security > Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era(Signal Processing for Security Technologies)
Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era(Signal Processing for Security Technologies)

Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era(Signal Processing for Security Technologies)


     0     
5
4
3
2
1



Available


X
About the Book

This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.

Table of Contents:
Introduction.- Part I – New Methods in Biometrics.- Deep Biometrics: A Robust Approach to Biometrics in Big Data Issues.- Multimodal Biometric Fusion via Ensemble Learning.- Fuzzy Logic for Precise Biometric Systems.- Hierarchical Biometric Verification with Sparse Features.- Dynamic Programming for Biometric Verification.- Part II – New Advances in Various Biometric Technologies.- Paleographic Handwriting Analysis for Author Identification.- Palmprints versus Fingerprints: Rivals or Friends?.- A Survey on Soft Biometrics for Forensic Analysis.- Robust Biometric Verification with Low Quality Data.- Streamed Biometric Verification for Big Data Challenge.- Privacy-Protected Biometric Verification for Security Applications.- Part III – New Applications using Biometrics.- Biometric Key Generation using Fuzzy Extractor for Mobile Banking.- Securing Electronic Medical Records Using Biometric Authentication.- Body Biometrics from MRI Images for Medicine Advice.- Identify Invisible Persons in Social Network.- From Memory to Human Recognition in Cognitive Robots.

About the Author :
Richard Jiang is a Lecturer in the department of Computer Science and Digital Technologies, Northumbria University, Newcastle upon Tyne, UK. He received his PhD in Computer Science from Queen’s University Belfast, Belfast, UK, in July 2008. After his PhD study, he has been working in Brunel Univ., Loughborough Univ., Swansea Univ., Univ. of Bath and Univ. of Sheffield. His research interests mainly reside in the fields of Artificial Intelligence, Man-Machine Interaction, Visual Forensics, and Biomedical Image Analysis. His research has been funded by EPSRC, BBSRC, TSB, EU FP, and industry funds, and he has authored and coauthored more than 40 publications. Danny Crookes was appointed to the Chair of Computer Engineering in 1993 at Queens University Belfast, and was Head of Computer Science from 1993 to 2002. He is Director of Research for Speech, Image and Vision Systems at the Institute for Electronics, Communications and Information Technology (ECIT) at Queens University Belfast. His current research interests include the use of novel architectures (especially GPUs) for high-performance image processing. He has applied expertise in language design, optimizing compilers and software generators, plus software tools for hardware description and architecture generation, to the goal of developing high level software tools to enable rapid development of real-time video processing systems. He is currently involved in projects in automatic shoeprint recognition (ESPRC), speech separation and enhancement (EPSRC) and processing of 4D confocal microscopy imagery (sponsored by INI and Andor Technologies). He has published over 200 scientific papers in journals and international conferences, and has presented tutorials on parallel image processing at several international conferences. Ahmed Bouridane received the M.Phil. degree in electrical engineering (VLSI design for signal processing) from the University of Newcastle-Upon-Tyne, U.K., in 1988, and the Ph.D. degree in electrical engineering (computer vision) from the University of Nottingham, U.K., in 1992. From 1992 to 1994, he worked as a Research Developer in telesurveillance and access control applications. In 1994, he joined Queen’s University Belfast, Belfast, U.K., initially as Lecturer in computer architecture and image processing and then as a Reader in computer science. He became a Professor in Image Engineering and Security at Northumbria University at Newcastle (U.K.) in 2009. His research interests are in imaging for forensics and security, biometrics, homeland security, image/video watermarking and cryptography. He has authored and co-authored more than 200 publications. Somaya Al-Maadeed received her PhD in computer science from Nottingham University, UK in 2004. Following her PhD, she works as an assistant professor (Qatar University), where she did research in the areas of biometrics and computer vision and image processing. She is a senior member of IEEE. Dr. Sumaya is leading the Computer Vision and Image Processing group at Qatar University. She has more than six years working experience in the Biometric and Forensic Lab at Ministry of Interior. Azeddine Beghdadi is Full Professor at the University of Paris 13 (Institut Galilée) Sorbonne Paris Cite and the director of L2TI laboratory. He received Maitrise in Physics and Diplôme d’Etudes Approfondies in Optics and Signal Processing from University Orsay-Paris XI and the PhD in Physics (Specialism: Optics and Signal Processing) from University Paris 6. He published over than 240 international refereed scientific papers. He is a founding member of the L2TI laboratory. His research interests include image quality enhancement and assessment, image and video compression, bio-inspired models for image analysis and processing, and physics-based image analysis. He is the founder and Co-Chair of the European Workshop on Visual Information Processing (EUVIP). He served as conference chair and technical chair of many international conferences. He also served as session organizer and a member of the organizing and technical committees for many IEEE conferences. Dr Beghdadi is a member of the editorial board of Signal Processing (Elsevier) and member of the editorial board of the Scientific World Journal Signal Processing (Hindawi Publisher). Dr Beghdadi is a Senior member of IEEE EURASIP member and member of the IEEE-MMTC.


Best Sellers


Product Details
  • ISBN-13: 9783319473000
  • Publisher: Springer International Publishing AG
  • Publisher Imprint: Springer International Publishing AG
  • Height: 235 mm
  • No of Pages: 424
  • Returnable: Y
  • Sub Title: Opportunities & Challenges in The Big Data Era
  • Width: 155 mm
  • ISBN-10: 331947300X
  • Publisher Date: 27 Dec 2016
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Series Title: Signal Processing for Security Technologies
  • Weight: 7686 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era(Signal Processing for Security Technologies)
Springer International Publishing AG -
Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era(Signal Processing for Security Technologies)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era(Signal Processing for Security Technologies)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!