Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems


Book Description

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.




Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems


Book Description

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.




AI and Deep Learning in Biometric Security


Book Description

This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. This text highlights a showcase of cutting-edge research on the use of convolution neural networks, autoencoders, recurrent convolutional neural networks in face, hand, iris, gait, fingerprint, vein, and medical biometric traits. It also provides a step-by-step guide to understanding deep learning concepts for biometrics authentication approaches and presents an analysis of biometric images under various environmental conditions. This book is sure to catch the attention of scholars, researchers, practitioners, and technology aspirants who are willing to research in the field of AI and biometric security.




Information Processing and Security Systems


Book Description

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications.




First International Conference on Sustainable Technologies for Computational Intelligence


Book Description

This book gathers high-quality papers presented at the First International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2019), which was organized by Sri Balaji College of Engineering and Technology, Jaipur, Rajasthan, India, on March 29–30, 2019. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.




Artificial Intelligence: Methodology, Systems, and Applications


Book Description

This book constitutes the refereed proceedings of the 13th International Conference on Artificial Intelligence: Methodology, Systems, and Applications, AIMSA 2008, held in Varna, Bulgaria in September 2008. The 30 revised full papers presented together with the 10 posters were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on agents; natural language processing and text analysis; machine learning and information retrieval; knowledge representation and reasoning; constraints, heuristics and search; applications; posters.




Advances in Information Processing and Protection


Book Description

This book contains a selection of the best papers given at an international conference on advanced computer systems. The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. The book is organized into four topical areas: Artificial Intelligence; Computer Security and Safety; Image Analysis, Graphics and Biometrics; and Computer Simulation and Data Analysis.




Security and Privacy in Biometrics


Book Description

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization; describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards; reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity; provides guidance on best practices for the processing of biometric data within a legal framework.




MultiMedia Modeling


Book Description

The two-volume set LNCS 8935 and 8936 constitutes the thoroughly refereed proceedings of the 21st International Conference on Multimedia Modeling, MMM 2015, held in Sydney, Australia, in January 2015. The 49 revised regular papers, 24 poster presentations, were carefully reviewed and selected from 189 submissions. For the three special session, a total of 18 papers were accepted for MMM 2015. The three special sessions are Personal (Big) Data Modeling for Information Access and Retrieval, Social Geo-Media Analytics and Retrieval and Image or video processing, semantic analysis and understanding. In addition, 9 demonstrations and 9 video showcase papers were accepted for MMM 2015. The accepted contributions included in these two volumes represent the state-of-the-art in multimedia modeling research and cover a diverse range of topics including: Image and Video Processing, Multimedia encoding and streaming, applications of multimedia modelling and 3D and augmented reality.




Adaptive and Natural Computing Algorithms


Book Description

The two volume set LNCS 4431 and LNCS 4432 constitutes the refereed proceedings of the 8th International Conference on Adaptive and Natural Computing Algorithms, ICANNGA 2007, held in Warsaw, Poland, in April 2007. The 178 revised full papers presented were carefully reviewed and selected from a total of 474 submissions.