×







We sell 100% Genuine & New Books only!

Biometric User Authentication For It Security From Fundamentals To Handwriting (Hb) at Meripustak

Biometric User Authentication For It Security From Fundamentals To Handwriting (Hb) by Vielhauer, Springer

Books from same Author: Vielhauer

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Price: ₹ 13201.00/- [ 20.71% off ]

    Seller Price: ₹ 10467.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Vielhauer
    PublisherSpringer
    Edition1
    ISBN9780387261942
    Pages284
    BindingHard Back
    LanguageEnglish
    Publish YearJanuary 2006

    Description

    Springer Biometric User Authentication For It Security From Fundamentals To Handwriting (Hb) by Vielhauer

    Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.



    Book Successfully Added To Your Cart