Suggested Topics within your search.
Suggested Topics within your search.
Computer science
58
Computer Science
56
Biometric identification
55
Biometry
48
Artificial intelligence
39
Artificial Intelligence (incl. Robotics)
31
Biometrics
30
Engineering
29
Computer security
28
Image Processing and Computer Vision
28
Image processing
28
Pattern Recognition
26
Pattern perception
26
Information Systems Applications (incl. Internet)
25
Technological innovations
25
Prevention
22
Signal, Image and Speech Processing
21
Computer graphics
20
National security
20
Security measures
18
Systems and Data Security
17
Terrorism
17
Identification
16
Government policy
15
Computational intelligence
14
Computers
13
Computational Intelligence
12
Computer Graphics
12
Computer networks
11
Social aspects
11
-
141Published 2015Table of Contents: “…Algorithms -- Biometrics and Biometrics Applications -- Data analysis and Information Retrieval -- Modelling and Optimization -- Pattern Recognition and Image Processing -- Various Aspects of Computer Security -- Various Aspects of Computer Security.…”
Connect to this title online
Electronic eBook -
142Published 2020Table of Contents: “…Part I -- Mobile-based Privacy & Security -- Shared Images and Camera Fingerprinting May Lead to Privacy Issues -- Presentation Attacks in Mobile and Continuous Behavioral Biometric Systems -- Personalized Data Minimization Assurance using Bluetooth Low Energy -- Part II -- Mobile-based Biometric Technologies -- On Designing a Forensic Toolkit for Rapid Detection of Factors that Impact Face Recognition Performance when Processing Large Scale Face Datasets -- Classification of Soft Biometric Traits when Matching Near-Infrared Long-range Face Images against their Visible Counterparts -- Quality and Match Performance Analysis of Band-Filtered Visible RGB Images -- Unconstrained Face Recognition using Cell Phone Devices: Faces in the Wild -- Face Detection in MWIR Spectrum -- Part III -- Mobile-based Active Authentication -- Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns -- Quickest Multiple User Active Authentication -- Iris Recognition on Mobile: Real-Time Feature Extraction and Matching in the Wild -- A Protocol for Decentralized Biometric-based Self-Sovereign Identity Ecosystem -- Towards Wider Adoption of Continuous Authentication on Mobile Devices.…”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
143Published 2015Table of Contents: “…Biometrics -- Document image inspection -- Applications.…”
Connect to this title online
Electronic eBook -
144Table of Contents: “…First Part: The Normal Brain -- Brief Review of Embryology -- Ultrasound Images of the Normal Brain -- Detailed Study of Certain Brain Structures -- Brain Biometrics -- Tips And Traps: Choosing the Right Route of Approach, Transvaginal Approach, Moving the Fetus, 3D Ultrasound -- Second Part: The Pathological Brain -- First Trimester Pathologies -- Second and Third Trimester Pathologies -- Third Part: Biometric Tables -- Conclusion.…”
Connect to this title online
Electronic eBook -
145Published 2017Table of Contents: “…Document analysis -- Pattern analysis and machine learning -- Image analysis -- Biomedical image analysis -- Biometrics.…”
Connect to this title online
Electronic eBook -
146Published 2017Table of Contents: “…Multimedia services -- Intelligent monitoring -- Audio-visual systems -- Biometric applications -- Experiments and deployments.…”
Connect to this title online
Electronic eBook -
147Published 2017Table of Contents: “…Data and software security -- Privacy and confidentiality -- Mobile systems security -- Biometric authentication -- Privacy in social media.…”
Connect to this title online
Electronic eBook -
148Published 2015Table of Contents: “…Applications -- 3D computer vision -- Computer graphics -- Segmentation.-Biometrics -- Pattern recognition -- Recognition -- Virtual reality.…”
Connect to this title online
Electronic eBook -
149Published 2006Table of Contents: “…Strandburg -- RFID privacy : a technical primer for the non-technical reader / Ari Juels -- Geolocation and locational privacy : the "inside" story on geospatial tracking / Mark Monmonier -- Privacy inalienability and personal data chips / Paul M. Schwartz -- Biometrics : overview and applications / Ishwar K. Sethi -- Biometrics : applications, challenges and the future / Gang Wei and Dongge Li -- Constructing policy : the unsettled question of biometric technology and privacy / Lisa S. …”
Conference Proceeding Book -
150by Wright, Sewall, 1889-1988Table of Contents: “…v. 1. Genetic and biometric foundations.--v. 2. The theory of gene frequencies.…”
Published 1968
Book -
151by Orduña, JoséTable of Contents: “…Imaginary lines -- Martin y Yoli -- Biometrics -- La soledad de Octavio -- A civilized man -- Good moral character -- Ceremony -- Friendship Park, USA -- Passport to the new west -- Disappearing act -- Streamline.…”
Published 2016
Book -
152by Zheng, Yufeng (Associate professor), Blasch, Erik, Liu, Zheng (Professor of engineering)Table of Contents: “…Motivation -- Biological vision -- Operating conditions -- Image analysis -- Information fusion levels -- Image fusion methods -- Colorization methods -- Image fusion metrics -- Image fusion evaluation -- Fusion applications in biometrics -- Additional fusion applications.…”
Published 2018
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
153Published 2015Table of Contents: “…Introduction -- Watermarking for Image Authentication -- Perceptual image hashing technique for image authentication in WMSNs -- A Review of Approximate Message Authentication Codes -- Fuzzy Image Authentication with Error Localization and Correction -- Robustness of Biometrics by Image Processing Technology.…”
Connect to this title online
Electronic eBook -
154by Groot, MaaikeTable of Contents: “…Skeletal elements -- 3.4. Butchery -- 3.5. Biometrical analysis -- 4. Methods -- 4.1. Taphonomy -- 4.2. …”
Published 2016
Connect to this title online (unlimited users allowed)
Electronic eBook -
155Published 2020Table of Contents: “…Microscopy for Forensic Investigations / Saeida Saadat, Gaurav Pandey, Maithri Tharmavaram -- Chromatographic Techniques for Forensic Investigations / Yogita Bhoj, Maithri Tharmavaram, Gaurav Pandey, Deepak Rawtani, Chaudhery Mustansar Hussain -- Hyphenated Techniques for Forensic Investigations / Riddhi Trivedi, Prajesh Prajapati -- Biometrics Technology for Forensic Science. Conventional and Emerging Biometrics Techniques in Forensic Investigations / Aayush Dey, Maithri Tharmavaram, Gaurav Pandey, Deepak Rawtani, Chaudhery Mustansar Hussain -- Sensors Technology for Forensic Science. …”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
156Published 2023Table of Contents: “…Innovations in Border Security- beyond biometrics -- 8. Cross border collaboration to support innovation in security -- 9. …”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
157by Kartalopoulos, Stamatios V.Table of Contents: “…Introduction -- Mathematical foundations -- Ciphers and algorithms -- Cryptographic key distribution systems -- Chaotic cryptographic systems -- Communication security layer classifications -- Network security: wireless systems -- Network security: wired systems - Network security: optical systems -- Quantum networks -- Next generation optical network security -- Biometrics in communication networks.…”
Published 2009
Book -
158Published 2015Table of Contents: “…Computer vision with local binary pattern variants -- Visual object tracking challenge -- Computer vision + ontology applies cross-disciplinary technologies -- Visual perception of affordance and functional visual primitives for scene analysis -- Graphical models in computer vision -- Light fields for computer vision -- Computer vision for road scene understanding and autonomous driving -- Soft biometrics.…”
Connect to this title online
Electronic eBook -
159by Duncan, JaneTable of Contents: “…Resistance to surveillance after the Snowden disclosures -- The context of surveillance and social control in South Africa -- Lawful interception in South Africa -- State mass surveillance, tactical surveillance and hacking in South Africa -- Privacy, surveillance and population management: the turn to biometrics -- Stopping the spies: resisting unaccountable surveillance in South Africa -- Conclusion…”
Published 2018
Connect to this title online (unlimited users allowed)
Electronic eBook -
160by Anderson, Ross, 1956-Table of Contents: “…-- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance.…”
Published 2008
View Table of contents only
Book