Showing 141 - 160 results of 285 for search '"biometrics"', query time: 0.08s Refine Results
  1. 141
    Published 2015
    Table of Contents: “…Algorithms -- Biometrics and Biometrics Applications -- Data analysis and Information Retrieval -- Modelling and Optimization -- Pattern Recognition and Image Processing -- Various Aspects of Computer Security -- Various Aspects of Computer Security.…”
    Connect to this title online
    Electronic eBook
  2. 142
    Published 2020
    Table of Contents: “…Part I -- Mobile-based Privacy & Security -- Shared Images and Camera Fingerprinting May Lead to Privacy Issues -- Presentation Attacks in Mobile and Continuous Behavioral Biometric Systems -- Personalized Data Minimization Assurance using Bluetooth Low Energy -- Part II -- Mobile-based Biometric Technologies -- On Designing a Forensic Toolkit for Rapid Detection of Factors that Impact Face Recognition Performance when Processing Large Scale Face Datasets -- Classification of Soft Biometric Traits when Matching Near-Infrared Long-range Face Images against their Visible Counterparts -- Quality and Match Performance Analysis of Band-Filtered Visible RGB Images -- Unconstrained Face Recognition using Cell Phone Devices: Faces in the Wild -- Face Detection in MWIR Spectrum -- Part III -- Mobile-based Active Authentication -- Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns -- Quickest Multiple User Active Authentication -- Iris Recognition on Mobile: Real-Time Feature Extraction and Matching in the Wild -- A Protocol for Decentralized Biometric-based Self-Sovereign Identity Ecosystem -- Towards Wider Adoption of Continuous Authentication on Mobile Devices.…”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  3. 143
    Published 2015
    Table of Contents: “…Biometrics -- Document image inspection -- Applications.…”
    Connect to this title online
    Electronic eBook
  4. 144
    Table of Contents: “…First Part: The Normal Brain -- Brief Review of Embryology -- Ultrasound Images of the Normal Brain -- Detailed Study of Certain Brain Structures -- Brain Biometrics -- Tips And Traps: Choosing the Right Route of Approach, Transvaginal Approach, Moving the Fetus, 3D Ultrasound -- Second Part: The Pathological Brain -- First Trimester Pathologies -- Second and Third Trimester Pathologies -- Third Part: Biometric Tables -- Conclusion.…”
    Connect to this title online
    Electronic eBook
  5. 145
    Published 2017
    Table of Contents: “…Document analysis -- Pattern analysis and machine learning -- Image analysis -- Biomedical image analysis -- Biometrics.…”
    Connect to this title online
    Electronic eBook
  6. 146
    Published 2017
    Table of Contents: “…Multimedia services -- Intelligent monitoring -- Audio-visual systems -- Biometric applications -- Experiments and deployments.…”
    Connect to this title online
    Electronic eBook
  7. 147
    Published 2017
    Table of Contents: “…Data and software security -- Privacy and confidentiality -- Mobile systems security -- Biometric authentication -- Privacy in social media.…”
    Connect to this title online
    Electronic eBook
  8. 148
    Published 2015
    Table of Contents: “…Applications -- 3D computer vision -- Computer graphics -- Segmentation.-Biometrics -- Pattern recognition -- Recognition -- Virtual reality.…”
    Connect to this title online
    Electronic eBook
  9. 149
    Published 2006
    Table of Contents: “…Strandburg -- RFID privacy : a technical primer for the non-technical reader / Ari Juels -- Geolocation and locational privacy : the "inside" story on geospatial tracking / Mark Monmonier -- Privacy inalienability and personal data chips / Paul M. Schwartz -- Biometrics : overview and applications / Ishwar K. Sethi -- Biometrics : applications, challenges and the future / Gang Wei and Dongge Li -- Constructing policy : the unsettled question of biometric technology and privacy / Lisa S. …”
    Conference Proceeding Book
  10. 150
    by Wright, Sewall, 1889-1988
    Published 1968
    Table of Contents: “…v. 1. Genetic and biometric foundations.--v. 2. The theory of gene frequencies.…”
    Book
  11. 151
    by Orduña, José
    Published 2016
    Table of Contents: “…Imaginary lines -- Martin y Yoli -- Biometrics -- La soledad de Octavio -- A civilized man -- Good moral character -- Ceremony -- Friendship Park, USA -- Passport to the new west -- Disappearing act -- Streamline.…”
    Book
  12. 152
    Table of Contents: “…Motivation -- Biological vision -- Operating conditions -- Image analysis -- Information fusion levels -- Image fusion methods -- Colorization methods -- Image fusion metrics -- Image fusion evaluation -- Fusion applications in biometrics -- Additional fusion applications.…”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  13. 153
    Published 2015
    Table of Contents: “…Introduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology.…”
    Connect to this title online
    Electronic eBook
  14. 154
    by Groot, Maaike
    Published 2016
    Table of Contents: “…Skeletal elements -- 3.4. Butchery -- 3.5. Biometrical analysis -- 4. Methods -- 4.1. Taphonomy -- 4.2. …”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  15. 155
    Published 2020
    Table of Contents: “…Microscopy for Forensic Investigations / Saeida Saadat, Gaurav Pandey, Maithri Tharmavaram -- Chromatographic Techniques for Forensic Investigations / Yogita Bhoj, Maithri Tharmavaram, Gaurav Pandey, Deepak Rawtani, Chaudhery Mustansar Hussain -- Hyphenated Techniques for Forensic Investigations / Riddhi Trivedi, Prajesh Prajapati -- Biometrics Technology for Forensic Science. Conventional and Emerging Biometrics Techniques in Forensic Investigations / Aayush Dey, Maithri Tharmavaram, Gaurav Pandey, Deepak Rawtani, Chaudhery Mustansar Hussain -- Sensors Technology for Forensic Science. …”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  16. 156
    Published 2023
    Table of Contents: “…Innovations in Border Security- beyond biometrics -- 8. Cross border collaboration to support innovation in security -- 9. …”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  17. 157
    by Kartalopoulos, Stamatios V.
    Published 2009
    Table of Contents: “…Introduction -- Mathematical foundations -- Ciphers and algorithms -- Cryptographic key distribution systems -- Chaotic cryptographic systems -- Communication security layer classifications -- Network security: wireless systems -- Network security: wired systems - Network security: optical systems -- Quantum networks -- Next generation optical network security -- Biometrics in communication networks.…”
    Book
  18. 158
    Published 2015
    Table of Contents: “…Computer vision with local binary pattern variants -- Visual object tracking challenge -- Computer vision + ontology applies cross-disciplinary technologies -- Visual perception of affordance and functional visual primitives for scene analysis -- Graphical models in computer vision -- Light fields for computer vision -- Computer vision for road scene understanding and autonomous driving -- Soft biometrics.…”
    Connect to this title online
    Electronic eBook
  19. 159
    by Duncan, Jane
    Published 2018
    Table of Contents: “…Resistance to surveillance after the Snowden disclosures -- The context of surveillance and social control in South Africa -- Lawful interception in South Africa -- State mass surveillance, tactical surveillance and hacking in South Africa -- Privacy, surveillance and population management: the turn to biometrics -- Stopping the spies: resisting unaccountable surveillance in South Africa -- Conclusion…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  20. 160
    by Anderson, Ross, 1956-
    Published 2008
    Table of Contents: “…-- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance.…”
    View Table of contents only
    Book