Author: | Ravindra Das | ISBN: | 9780429946363 |
Publisher: | Taylor and Francis | Publication: | July 4, 2018 |
Imprint: | Routledge | Language: | English |
Author: | Ravindra Das |
ISBN: | 9780429946363 |
Publisher: | Taylor and Francis |
Publication: | July 4, 2018 |
Imprint: | Routledge |
Language: | English |
The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities.
Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Chapters 3 and 4 conclude with case studies to provide further application review.
This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics.
The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities.
Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Chapters 3 and 4 conclude with case studies to provide further application review.
This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics.