Skip to main content
Book cover

Biometric User Authentication for IT Security

From Fundamentals to Handwriting

  • Book
  • © 2006

Overview

  • Covers fundamentals in biometrics and user authentication
  • Other books in this area concentrate on passive schemes, whereas this book provides a comprehensive analysis of an active biometric technique: handwriting
  • Includes thorough discussion of attack scenarios
  • Details generation of cryptographic keys from handwriting

Part of the book series: Advances in Information Security (ADIS, volume 18)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (7 chapters)

  1. Fundamentals - Overview

  2. Handwriting Biometrics - Overview

Keywords

About this book

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.

Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.

Authors and Affiliations

  • Universität Magdeburg, Magdeburg, Germany

    Claus Vielhauer

Bibliographic Information

Publish with us