Advanced Biometric Technologies


Book Description

The methods for human identity authentication based on biometrics - the physiological and behavioural characteristics of a person have been evolving continuously and seen significant improvement in performance and robustness over the last few years. However, most of the systems reported perform well in controlled operating scenarios, and their performance deteriorates significantly under real world operating conditions, and far from satisfactory in terms of robustness and accuracy, vulnerability to fraud and forgery, and use of acceptable and appropriate authentication protocols. To address some challenges, and the requirements of new and emerging applications, and for seamless diffusion of biometrics in society, there is a need for development of novel paradigms and protocols, and improved algorithms and authentication techniques. This book volume on "Advanced Biometric Technologies" is dedicated to the work being pursued by researchers around the world in this area, and includes some of the recent findings and their applications to address the challenges and emerging requirements for biometric based identity authentication systems. The book consists of 18 Chapters and is divided into four sections namely novel approaches, advanced algorithms, emerging applications and the multimodal fusion. The book was reviewed by editors Dr. Girija Chetty and Dr. Jucheng Yang We deeply appreciate the efforts of our guest editors: Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers.




Information Fusion


Book Description

In the big data era, increasing information can be extracted from the same source object or scene. For instance, a person can be verified based on their fingerprint, palm print, or iris information, and a given image can be represented by various types of features, including its texture, color, shape, etc. These multiple types of data extracted from a single object are called multi-view, multi-modal or multi-feature data. Many works have demonstrated that the utilization of all available information at multiple abstraction levels (measurements, features, decisions) helps to obtain more complex, reliable and accurate information and to maximize performance in a range of applications. This book provides an overview of information fusion technologies, state-of-the-art techniques and their applications. It covers a variety of essential information fusion methods based on different techniques, including sparse/collaborative representation, kernel strategy, Bayesian models, metric learning, weight/classifier methods, and deep learning. The typical applications of these proposed fusion approaches are also presented, including image classification, domain adaptation, disease detection, image restoration, etc. This book will benefit all researchers, professionals and graduate students in the fields of computer vision, pattern recognition, biometrics applications, etc. Furthermore, it offers a valuable resource for interdisciplinary research.




Handbook of Digital Face Manipulation and Detection


Book Description

This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.




Advances and Applications of DSmT for Information Fusion. Collected Works, Volume 4


Book Description

The fourth volume on Advances and Applications of Dezert-Smarandache Theory (DSmT) for information fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics. The contributions have been published or presented after disseminating the third volume (2009, http://fs.gallup.unm.edu/DSmT-book3.pdf) in international conferences, seminars, workshops and journals.




Transactions on Computational Science XXXII


Book Description

This, the 32nd issue of the Transactions on Computational Science, focusses on cybersecurity and biometrics. The eight detailed papers cover the following topics: Multimodal Warnings for Distracted Smartphone Users on the Move; EEG-Based Mental Workload and Stress Monitoring of Crew Members in a Maritime Virtual Simulator; Detecting Web Defacement and Enabling Web-Content Regeneration; Software as a Weapon in the Context of (Inter)national Security; Multi-user Architecture and Multi-player Games; An Adaptive Discrete Wavelet Transform Based Face Recognition Approach; Synthesizing Images of Imagined Faces Based on Relevance Feedback; and Neurofeedback Training to Enhance the Focused Attention of Elite Rifle Shooters.




Biometrics


Book Description

Edited by a panel of experts, this book fills a gap in the existing literature by comprehensively covering system, processing, and application aspects of biometrics, based on a wide variety of biometric traits. The book provides an extensive survey of biometrics theory, methods,and applications, making it an indispensable source of information for researchers, security experts, policy makers, engineers, practitioners, and graduate students. The book's wide and in-depth coverage of biometrics enables readers to build a strong, fundamental understanding of theory and methods, and provides a foundation for solutions to many of today’s most interesting and challenging biometric problems. Biometric traits covered: Face, Fingerprint, Iris, Gait, Hand Geometry, Signature, Electrocardiogram (ECG), Electroencephalogram (EEG), physiological biometrics. Theory, Methods and Applications covered: Multilinear Discriminant Analysis, Neural Networks for biometrics, classifier design, biometric fusion, Event-Related Potentials, person-specific characteristic feature selection, image and video-based face, recognition/verification, near-infrared face recognition, elastic graph matching, super-resolution of facial images, multimodal solutions, 3D approaches to biometrics, facial aging models for recognition, information theory approaches to biometrics, biologically-inspired methods, biometric encryption, decision-making support in biometric systems, privacy in biometrics.




The Proceedings of the 5th International Conference on Energy Storage and Intelligent Vehicles (ICEIV 2022)


Book Description

This book includes original, peer-reviewed research papers from the 5th International Conference on Energy Storage and Intelligent Vehicles (ICEIV 2022), held online, from December 3 to December 4, 2022. The topics covered include but are not limited to energy storage, power and energy systems, electrified/intelligent transportation, batteries and management, and power electronics. The papers share the latest findings in energy storage and intelligent vehicles, making the book a valuable asset for researchers, engineers, university students, etc.




Face Biometrics for Personal Identification


Book Description

This book provides ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions in the biometrics field. It offers students and software engineers a thorough understanding of how some core low-level building blocks of a multi-biometric system are implemented. While this book covers a range of biometric traits, its main emphasis is placed on multi-sensory and multi-modal face biometrics algorithms and systems.




Wireless Networks and Computational Intelligence


Book Description

This book constitutes the refereed proceedings of the 6th International Conference on Information Processing, ICIP 2012, held in Bangalore, India, in August 2012. The 75 revised full papers presented were carefully reviewed and selected from 380 submissions. The papers are organized in topical sections on wireless networks; image processing; pattern recognition and classification; computer architecture and distributed computing; software engineering, information technology and optimization techniques; data mining techniques; computer networks and network security.




Digital-Forensics and Watermarking


Book Description

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.