menu
{ "item_title" : "Biometric Presentation Attack Detection", "item_author" : [" Amit Chatterjee "], "item_description" : "Biometrics use an individual's unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, and we are therefore at higher risk of spoofing attacks from fraudsters and hackers. This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader's understanding.Key Features: Consolidated approach includes most prevalent spoofing and anti-spoofing strategies. Includes both hardware and software-based approaches to anti-spoofing technologies Features Artificial Intelligence methods Reviews patents Accompanied by MATLAB and PYTHON codes ", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/0/75/035/200/0750352000_b.jpg", "price_data" : { "retail_price" : "190.00", "online_price" : "190.00", "our_price" : "190.00", "club_price" : "190.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Biometric Presentation Attack Detection|Amit Chatterjee

Biometric Presentation Attack Detection : Towards securing biometric authentication systems

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Biometrics use an individual's unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, and we are therefore at higher risk of spoofing attacks from fraudsters and hackers. This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader's understanding.

Key Features:

  • Consolidated approach includes most prevalent spoofing and anti-spoofing strategies.
  • Includes both hardware and software-based approaches to anti-spoofing technologies
  • Features Artificial Intelligence methods
  • Reviews patents
  • Accompanied by MATLAB and PYTHON codes

This item is Non-Returnable

Details

  • ISBN-13: 9780750352000
  • ISBN-10: 0750352000
  • Publisher: Institute of Physics Publishing
  • Publish Date: December 2023
  • Dimensions: 10 x 7 x 0.56 inches
  • Shipping Weight: 1.36 pounds
  • Page Count: 228

Related Categories

You May Also Like...

    1

BAM Customer Reviews