000 | 05586cam a22004815i 4500 | ||
---|---|---|---|
001 | 21768563 | ||
003 | OSt | ||
005 | 20240723095208.0 | ||
006 | m |o d | | ||
007 | cr ||||||||||| | ||
008 | 190101s2019 gw |||| o |||| 0|eng | ||
010 | _a 2019757997 | ||
020 | _a9789811952876 (Hbk) | ||
024 | 7 |
_a10.1007/978-3-319-92627-8 _2doi |
|
035 | _a(DE-He213)978-3-319-92627-8 | ||
040 |
_aDLC _beng _epn _erda _cIISERB |
||
072 | 7 |
_aCOM074000 _2bisacsh |
|
072 | 7 |
_aUYD _2bicssc |
|
072 | 7 |
_aUYD _2thema |
|
082 | 0 | 4 |
_a004.24 M331H3 _223 |
245 | 0 | 0 |
_aHandbook of Biometric Anti-Spoofing : _bPresentation Attack Detection _cedited by Sébastien Marcel, Mark S. Nixon, Julian Fierrez, Nicholas Evans. |
250 | _a3rd ed. | ||
260 |
_aSingapore: _bSpringer-Nature, _c2019. |
||
300 | _axix, 595 pages 140 illustrations. | ||
490 | 1 |
_aAdvances in Computer Vision and Pattern Recognition, _x2191-6586 |
|
505 | 0 | _aAn Introduction to Fingerprint Presentation Attack Detection -- A Study of Hand-Crafted and Naturally-Learned Features for Fingerprint Presentation Attack Detection -- Optical Coherence Tomography for Fingerprint Presentation Attack Detection -- Interoperability among Capture Devices for Fingerprint Presentation Attacks Detection -- Review of Fingerprint Presentation Attack Detection Competitions -- Introduction to Iris Presentation Attack Detection -- Application of Dynamic Features of the Pupil for Iris Presentation Attack Detection -- Review of Iris Presentation Attack Detection Competitions -- Introduction to Face Presentation Attack Detection -- Recent Advances in Face Presentation Attack Detection -- Recent Progress on Face Anti-Spoofing against 3D Mask Attack -- Challenges of Face Presentation Attack Detection in Real Scenarios -- Remote Blood Pulse Analysis for Face Presentation Attack Detection -- Review of Face Presentation Attack Detection Competitions -- Introduction to Voice Presentation Attack Detection and Recent Advances -- A Cross-Database Study of Voice Presentation Attack Detection -- Voice Presentation Attack Detection Using Convolutional Neural Networks -- An Introduction to Vein Presentation Attacks and Detection -- Presentation Attacks in Signature Biometrics: Types and Introduction to Attack Detection -- Evaluation Methodologies for Biometric Presentation Attack Detection -- A Legal Perspective on the Relevance of Biometric Presentation Attack Detection (PAD) for Payment Services Under PSDII and the GDPR -- Standards for Biometric Presentation Attack Detection. | |
520 | _aThis authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) - also known as Biometric Anti-Spoofing. Building on the success of the previous, pioneering edition, this thoroughly updated second edition has been considerably expanded to provide even greater coverage of PAD methods, spanning biometrics systems based on face, fingerprint, iris, voice, vein, and signature recognition. New material is also included on major PAD competitions, important databases for research, and on the impact of recent international legislation. Valuable insights are supplied by a selection of leading experts in the field, complete with results from reproducible research, supported by source code and further information available at an associated website. Topics and features: Reviews the latest developments in PAD for fingerprint biometrics, covering optical coherence tomography (OCT) technology, and issues of interoperability Examines methods for PAD in iris recognition systems, and the application of stimulated pupillary light reflex for this purpose Discusses advancements in PAD methods for face recognition-based biometrics, such as research on 3D facial masks and remote photoplethysmography (rPPG) Presents a survey of PAD for automatic speaker recognition (ASV), including the use of convolutional neural networks (CNNs), and an overview of relevant databases Describes the results yielded by key competitions on fingerprint liveness detection, iris liveness detection, and software-based face anti-spoofing Provides analyses of PAD in fingervein recognition, online handwritten signature verification, and in biometric technologies on mobile devices Includes coverage of international standards, the E.U. PSDII and GDPR directives, and on different perspectives on presentation attack evaluation This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics. | ||
650 | 0 |
_aBiometrics (Biology). _930650 |
|
650 | 0 |
_aComputer system failures. _930651 |
|
650 | 0 |
_aMathematical statistics. _930652 |
|
650 | 1 | 4 |
_aSystem Performance and Evaluation. _930653 |
650 | 2 | 4 |
_aBiometrics. _930654 |
650 | 2 | 4 |
_aProbability and Statistics in Computer Science. _930655 |
700 | 1 |
_aMarcel, Sébastien. _eeditor. _930656 |
|
700 | 1 |
_aFierrez, Julian. _eeditor. _930657 |
|
700 | 1 |
_aEvans, Nicholas.. _eeditor. _930658 |
|
776 | 0 | 8 |
_iPrint version: _tHandbook of biometric anti-spoofing. _z9783319926261 _w(DLC) 2018957636 |
776 | 0 | 8 |
_iPrinted edition: _z9783319926261 |
776 | 0 | 8 |
_iPrinted edition: _z9783319926285 |
830 | 0 |
_aAdvances in Computer Vision and Pattern Recognition, _930660 |
|
906 |
_a0 _bibc _corigres _du _encip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
999 |
_c10402 _d10402 |