|
|
1 | (40) |
|
Overview of Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture |
|
|
1 | (11) |
|
Overview of Adopting Biometric Technologies: Challenges and Solutions |
|
|
12 | (29) |
|
Chapter 2 Review of Biometrics |
|
|
41 | (49) |
|
Two Components of Biometric Technology - A Review of the Technical and Social Impacts |
|
|
41 | (2) |
|
|
43 | (9) |
|
The Technical Implications |
|
|
52 | (18) |
|
A Formal Definition of Biometrics |
|
|
52 | (3) |
|
The Difference Between Physiological and Behavioral-Based Biometrics |
|
|
55 | (3) |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
61 | (2) |
|
Understanding the Biometric Template |
|
|
63 | (1) |
|
The Mathematical Files of the Biometric Templates |
|
|
64 | (2) |
|
The Important Biometric Metrics and Key Performance Indicators |
|
|
66 | (4) |
|
The Major Market Applications of the Biometric Technologies |
|
|
70 | (8) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (2) |
|
A Technical Review of the Major Biometric Modalities |
|
|
78 | (12) |
|
Physical Biometrics -- Hand Geometry Recognition |
|
|
79 | (2) |
|
Physical Biometrics -- Vein Pattern Recognition |
|
|
81 | (1) |
|
Physical Biometrics -- Facial Recognition |
|
|
82 | (1) |
|
Physical Biometrics -- Voice Recognition |
|
|
83 | (1) |
|
Physical Biometrics -- Iris Recognition |
|
|
84 | (1) |
|
Physical Biometrics -- Fingerprint Recognition |
|
|
85 | (2) |
|
Behavioral Biometrics -- Signature Recognition |
|
|
87 | (1) |
|
Behavioral Biometrics -- Keystroke Recognition |
|
|
88 | (2) |
|
Chapter 3 Iris Recognition |
|
|
90 | (89) |
|
Physical and Behavioral Biometrics |
|
|
90 | (1) |
|
The Differences Between Physical Biometrics and Behavioral Biometrics |
|
|
90 | (2) |
|
The Eye: The Iris and the Retina |
|
|
92 | (1) |
|
|
92 | (8) |
|
The Physiology of the Retina |
|
|
94 | (1) |
|
The Process of Retinal Recognition |
|
|
95 | (2) |
|
The Advantages and Disadvantages of Retinal Recognition |
|
|
97 | (3) |
|
|
100 | (4) |
|
The Physiological Structure of the Iris |
|
|
101 | (3) |
|
How Iris Recognition Works: The Mathematical Algorithms |
|
|
104 | (24) |
|
The "Father" of Iris Recognition -- Dr. John Daugman |
|
|
104 | (2) |
|
The Theoretical Framework of Iris Recognition -- Tarawneh and Thunibat |
|
|
106 | (9) |
|
Reducing the Effects of Pupil Dilation and Constriction -- Proenca and Neves |
|
|
115 | (5) |
|
Reducing the Effects of Eyelids and Eyelashes -- Lin et al. and Zhou and Sun |
|
|
120 | (4) |
|
Reducing the Signal Noise in the Eye Image -- Shivani and Sharma |
|
|
124 | (4) |
|
The Applications of Iris Recognition |
|
|
128 | (25) |
|
Overview of the Major Applications |
|
|
129 | (2) |
|
Spoofing -- Print Attacks -- Gupta et al. |
|
|
131 | (8) |
|
Wireless Networks -- Ibrahim et al. |
|
|
139 | (8) |
|
Fuzzy Neural Networks -- Karthikeyan |
|
|
147 | (6) |
|
|
153 | (21) |
|
Introduction to Cryptography |
|
|
155 | (1) |
|
Message Scrambling and Descrambling |
|
|
156 | (1) |
|
Encryption and Decryption |
|
|
156 | (1) |
|
|
157 | (1) |
|
Symmetric Key Systems and Asymmetric Key Systems |
|
|
158 | (1) |
|
The Mathematical Algorithms with Symmetric Cryptography |
|
|
158 | (1) |
|
Asymmetric Key Cryptography |
|
|
159 | (1) |
|
Keys and Public Private Keys |
|
|
160 | (1) |
|
The Differences Between Asymmetric and Symmetric Cryptography |
|
|
161 | (1) |
|
The Mathematical Algorithms of Asymmetric Cryptography |
|
|
162 | (2) |
|
An Introduction to Biocryptography |
|
|
164 | (1) |
|
The Cipher Biometric Template |
|
|
165 | (1) |
|
|
166 | (1) |
|
A Review of How Biocryptography Can Be Used to Further Protect Iris Templates |
|
|
167 | (7) |
|
Case Study: "The Afghan Girl -- Sharbat Gula" |
|
|
174 | (5) |
|
Chapter 4 Facial Recognition |
|
|
179 | (90) |
|
Which One to Use? Iris Recognition or Facial Recognition? |
|
|
179 | (2) |
|
An Introduction to Facial Recognition |
|
|
181 | (5) |
|
Facial Recognition: How it Works |
|
|
182 | (2) |
|
Defining the Effectiveness of a Facial Recognition System |
|
|
184 | (2) |
|
The Techniques of Facial Recognition |
|
|
186 | (2) |
|
Facial Recognition: The Advantages and the Disadvantages |
|
|
188 | (2) |
|
An Overview of the Facial Recognition Methodologies |
|
|
190 | (1) |
|
The Various Approaches to Facial Recognition |
|
|
191 | (4) |
|
The Geometry-Based Approach |
|
|
191 | (1) |
|
The Template-Based Approach |
|
|
192 | (1) |
|
|
193 | (1) |
|
The Appearance/Model-Based Approach |
|
|
193 | (1) |
|
The Neural Network Approach |
|
|
194 | (1) |
|
The Statistical Algorithms of Facial Recognition |
|
|
195 | (11) |
|
An Overview of Facial Recognition Template Matching |
|
|
195 | (2) |
|
Principal Component Analysis |
|
|
197 | (5) |
|
Discrete Cosine Transform |
|
|
202 | (1) |
|
Linear Discriminant Analysis |
|
|
203 | (1) |
|
Locality-Preserving Projections |
|
|
203 | (1) |
|
|
204 | (1) |
|
Independent Component Analysis |
|
|
205 | (1) |
|
|
206 | (1) |
|
The Mathematical Algorithms |
|
|
206 | (11) |
|
|
207 | (6) |
|
|
213 | (2) |
|
Local Binary Pattern Histograms (LBPH) |
|
|
215 | (2) |
|
|
217 | (16) |
|
Neural Networks with Gabor Filters |
|
|
221 | (2) |
|
Neural Networks with Hidden Markov Models |
|
|
223 | (1) |
|
|
224 | (1) |
|
Convolutional Neural Networks |
|
|
225 | (8) |
|
The Applications of Facial Recognition |
|
|
233 | (25) |
|
The Use of a Facial Makeup-Detection System in Facial Recognition -- Chen et al. |
|
|
234 | (11) |
|
Thermal Face Recognition for Human-Robot Interactions -- Hermosilla et al. |
|
|
245 | (6) |
|
The Use of Facial Recognition in Forensics -- Ali et al. |
|
|
251 | (7) |
|
The Limitations of Facial Recognition |
|
|
258 | (6) |
|
|
259 | (1) |
|
|
260 | (2) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
Mathematical/Statistical Algorithmic Evaluations |
|
|
263 | (1) |
|
The Applications of Facial Recognition |
|
|
264 | (5) |
|
Case Study: Razko Security Adds Face Recognition Technology to Video Surveillance Systems |
|
|
265 | (4) |
|
Chapter 5 Final Conclusions |
|
|
269 | (24) |
Index |
|
293 | |