PSU Libraries

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
No image available for this title
Bookmark Share

Biometric presentation attack detection :towards securing biometric authentication systems /

Chatterjee, Amit - Personal Name; Institute of Physics (Great Britain), - Personal Name;

"Version: 20231101"--Title page verso.Includes bibliographical references.1. Biometrics -- 1.1. Introduction -- 1.2. Types of biometrics -- 1.3. Applications -- 1.4. Biometrics authentication architecture -- 1.5. ISO standards -- 1.6. Databases2. Presentation attack detection in biometrics -- 2.1. Introduction -- 2.2. Historical survey -- 2.3. Types of presentation attacks -- 2.4. Preparation of spoofed specimen -- 2.5. Existing PA detection technologies -- 2.6. International Organization for Standardization (ISO)/International -- 2.7. Databases3. Fringe projection-based secure biometrics -- 3.1. Introduction -- 3.2. Theory -- 3.3. Processing strategy -- 3.4. Experiments and results -- 3.5. Discussion4. Biometric presentation attack detection using speckle metrology -- 4.1. Introduction -- 4.2. Theory -- 4.3. Processing strategy -- 4.4. Experimental and results -- 4.5. Discussion5. Presentation attack detection using fringe projection and biospeckle analysis -- 5.1. Introduction -- 5.2. Processing strategies -- 5.3. Experimental descriptions and results -- 5.4. Discussion6. Presentation attack detection using optical coherence tomography -- 6.1. Introduction -- 6.2. Theory -- 6.3. Experimental descriptions and results -- 6.4. Discussion7. Thermography-based presentation attack detection -- 7.1. Introduction -- 7.2. Theory -- 7.3. Experiments and results -- 7.4. Discussion8. Miscellaneous -- 8.1. Introduction -- 8.2. Topography-based techniques -- 8.3. Internal property-based techniques -- 8.4. Hybrid techniques9. Patents : basics and selected descriptions -- 9.1. Introduction -- 9.2. Patent process flow -- 9.3. Criteria for patent grant -- 9.4. Selected patents for biometric presentation attack detection -- 9.5. Patentability--an example10. Preliminary experiments and research ideas -- 10.1. Introduction -- 10.2. Fringe projection -- 10.3. Speckle metrology -- 10.4. Speckle projection -- 10.5. Multiwavelength analysis -- 10.6. Extreme attacks.Biometrics use an individual's unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, and we are therefore at higher risk of spoofing attacks from fraudsters and hackers. This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader's understanding.Academic and industrial R&D engineers and scientists.Also available in print.Mode of access: World Wide Web.System requirements: Adobe Acrobat Reader, EPUB reader, or Kindle reader.Amit Chatterjee has several years of research experience of working on developing various anti-spoof biometric sensors using optical techniques and has published around 40 Journal and international conference papers and has filed 7 patents.Title from PDF title page (viewed on January 4, 2024).


Availability

No copy data

Detail Information
Series Title
-
Call Number
-
Publisher
: .,
Collation
1 online resource (various pagings) :illustrations (some color).
Language
English
ISBN/ISSN
9780750352024
Classification
006.2/48
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Biometric identification.
Intrusion detection systems (Computer security)
Computer security.
COMPUTERS / Security / General.
Specific Detail Info
-
Statement of Responsibility
Amit Chatterjee.
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

PSU Libraries
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2026 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?