Overview
- Includes new biometric applications to help secure security features in computer systems, passports, identity cards, credit cards and entry to government departments
- Proposes the first biometric measures regarding information based on a national ID card or centralized passport database system
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (6 chapters)
Keywords
About this book
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identify theft and other security issues, society will have to compromise between security and personal freedoms.
Securing Biometrics Applications investigates and identifies key impacts of biometric security applications, while discovering opportunities and challenges presented by the biometric technologies available.
Authors and Affiliations
Bibliographic Information
Book Title: Securing Biometrics Applications
Authors: Charles A. Shoniregun, Stephen Crosier
DOI: https://doi.org/10.1007/978-0-387-69933-2
Publisher: Springer New York, NY
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag US 2008
Hardcover ISBN: 978-0-387-69932-5Published: 05 December 2007
Softcover ISBN: 978-1-4419-4350-7Published: 04 November 2010
eBook ISBN: 978-0-387-69933-2Published: 06 March 2008
Edition Number: 1
Number of Pages: XVIII, 190
Number of Illustrations: 40 b/w illustrations
Topics: Pattern Recognition, Biometrics, Image Processing and Computer Vision, Cryptology, Data Structures and Information Theory, User Interfaces and Human Computer Interaction