Research Developments in Biometrics and Video Processing Techniques


Book Description

"This book investigates advanced techniques in user identification and security, including retinal, facial, and finger print scans as well as signature and voice authentication models"--Provided by publisher.




Research Developments in Biometrics and Video Processing Techniques


Book Description

"This book investigates advanced techniques in user identification and security, including retinal, facial, and finger print scans as well as signature and voice authentication models"--




Image Retrieval and Analysis Using Text and Fuzzy Shape Features: Emerging Research and Opportunities


Book Description

Multimedia information retrieval focuses on the tools of processing and searching that are applicable to the content-based management of new multimedia documents. It has recently expanded to encompass newly devised techniques that will further its performance and growing importance. Image Retrieval and Analysis Using Text and Fuzzy Shape Features: Emerging Research and Opportunities is a critical scholarly resource that explores methods and strategies related to multimedia information retrieval systems. Featuring coverage on a broad range of topics including content-based image retrieval, text-based image retrieval, fuzzy object shape features, encoding, and indexing, this book is geared towards library science specialists, information technology specialists, and researchers seeking current information on the integration of new information retrieval technologies.




Research Developments in Computer Vision and Image Processing


Book Description

"This book brings together various research methodologies and trends in emerging areas of application of computer vision and image processing for those interested in the research developments of this rapidly growing field"--




The Biometric Computing


Book Description

"The Biometric Computing: Recognition & Registration" presents introduction of biometrics along with detailed analysis for identification and recognition methods. This book forms the required platform for understanding biometric computing and its implementation for securing target system. It also provides the comprehensive analysis on algorithms, architectures and interdisciplinary connection of biometric computing along with detailed case-studies for newborns and resolution spaces. The strength of this book is its unique approach starting with how biometric computing works to research paradigms and gradually moves towards its advancement. This book is divided into three parts that comprises basic fundamentals and definitions, algorithms and methodologies, and futuristic research and case studies. Features: A clear view to the fundamentals of Biometric Computing Identification and recognition approach for different human characteristics Different methodologies and algorithms for human identification using biometrics traits such as face, Iris, fingerprint, palm print, voiceprint etc. Interdisciplinary connection of biometric computing with the fields like deep neural network, artificial intelligence, Internet of Biometric Things, low resolution face recognition etc. This book is an edited volume by prominent invited researchers and practitioners around the globe in the field of biometrics, describes the fundamental and recent advancement in biometric recognition and registration. This book is a perfect research handbook for young practitioners who are intending to carry out their research in the field of Biometric Computing and will be used by industry professionals, graduate and researcher students in the field of computer science and engineering.




Handbook of Research on Emerging Developments in Data Privacy


Book Description

Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the legal aspects of identity protection, trust and security, and detection techniques, this comprehensive work is a valuable resource for any business, legal, or technology professional looking to improve information security within their organization.




Handbook of Research on Securing Cloud-Based Databases with Biometric Applications


Book Description

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.




Hybrid Soft Computing Approaches


Book Description

The book provides a platform for dealing with the flaws and failings of the soft computing paradigm through different manifestations. The different chapters highlight the necessity of the hybrid soft computing methodology in general with emphasis on several application perspectives in particular. Typical examples include (a) Study of Economic Load Dispatch by Various Hybrid Optimization Techniques, (b) An Application of Color Magnetic Resonance Brain Image Segmentation by Para Optimus LG Activation Function, (c) Hybrid Rough-PSO Approach in Remote Sensing Imagery Analysis, (d) A Study and Analysis of Hybrid Intelligent Techniques for Breast Cancer Detection using Breast Thermograms, and (e) Hybridization of 2D-3D Images for Human Face Recognition. The elaborate findings of the chapters enhance the exhibition of the hybrid soft computing paradigm in the field of intelligent computing.




Handbook of Research on Emerging Perspectives in Intelligent Pattern Recognition, Analysis, and Image Processing


Book Description

###############################################################################################################################################################################################################################################################




Handbook of Research on Threat Detection and Countermeasures in Network Security


Book Description

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.