Description |
1 online resource (495 pages) : illustrations |
Contents |
pt. 1 Biometric Template Protection -- ch. One Cancelable Biometrics and Data Separation Schemes / Kenta Takahashi -- ch. Two Minutiae-based Fingerprint Representations: Review, Privacy, Security and Cryptographic Realization / Bok-Min Goi -- ch. Three Palmprint Template Protection Technologies / Lu Leng -- pt. 2 Biometric Key and Encryption -- ch. Four Biometric Discretization for Template Protection and Cryptographic Key Generation / Meng-Hui Lim -- ch. Five De-Identifying Biometric Images by Decomposition and Mixing / Arun Ross -- pt. 3 Biometric System Analysis -- ch. Six BioPACE: Biometric-Protected Authentication Connection Establishment / Christoph Busch -- ch. Seven Privacy and Security Assessment of Biometric Systems / Christophe Rosenberger -- ch. Eight A Generalized Framework for Privacy and Security Assessment of Biometric Template Protection / Bian Yang -- pt. 4 Privacy-Enhanced Biometric Systems |
|
Ch. Nine Secure and Efficient Iris and Fingerprint Identification / Paolo Gasti -- ch. Ten Identification Over Outsourced Biometric Data / Alain Patey -- ch. Eleven A Collaborative Framework Design for Distributed Biometrics-based Authentication in the Cloud / Myung Ho Kim -- ch. Twelve Secure Two-Party Computation and Biometric Identification / Alain Patey -- pt. 5 Other Biometric Security Technologies -- ch. Thirteen Watermarked Biometrics / Mohammed Ahmad A. Alkhathami |
Summary |
Modern biometrics delivers an enhanced level of security by means of a ""proof of property"". The design and deployment of a biometric system, however, hide many pitfalls, which, when underestimated, can lead to major security weaknesses and privacy threats. Issues of concern include biometric identity theft and privacy invasion because of the strong connection between a user and his identity. This book showcases a collection of comprehensive references on the advances of biometric security technology. It compiles a total of fourteen articles, all contributed by thirty-two eminent researchers |
Bibliography |
Includes bibliographical references at the end of each chapters |
Notes |
English |
|
Online resource; title from PDF title page (ebrary, viewed February 18, 2015) |
Subject |
Biometric identification.
|
|
Security systems.
|
|
security systems.
|
|
Computer security.
|
|
Privacy & data protection.
|
|
Computer fraud & hacking.
|
|
NATURE -- Reference.
|
|
SCIENCE -- Life Sciences -- Biology.
|
|
SCIENCE -- Life Sciences -- General.
|
|
Security systems
|
|
Biometric identification
|
Form |
Electronic book
|
Author |
Ling Ngo, David Chek, editor
|
|
Jin Teoh, Andrew Beng, editor
|
|
Hu, Jiankun, editor
|
ISBN |
9781443874991 |
|
144387499X |
|
1322889546 |
|
9781322889542 |
|
1443871834 |
|
9781443871839 |
|