| Foreword | p. xi |
| Preface | p. xiii |
| Biometrics Applications in an E-world | p. 1 |
| Biometrics Technologies | p. 1 |
| Biometrics Systems | p. 5 |
| Biometrics Applications | p. 7 |
| Organization of the Book | p. 12 |
| Achievements and Challenges in Fingerprint Recognition | p. 23 |
| Introduction | p. 23 |
| Fingerprint Recognition Issues | p. 24 |
| Applications | p. 27 |
| Fingerprint Recognition Methods and Algorithms | p. 32 |
| Discussion | p. 53 |
| Conclusions | p. 54 |
| Biometrics Electronic Purse | p. 59 |
| Introduction | p. 59 |
| Smart-Card Technology | p. 62 |
| Biometric Methodologies | p. 66 |
| Design of Biometrics Electronic Purse | p. 68 |
| Conclusions | p. 81 |
| Face Recognition and its Application | p. 83 |
| Introduction | p. 83 |
| Face as a Biometric | p. 84 |
| The Technology of Face Recognition | p. 87 |
| Privacy Issues | p. 89 |
| Application Domain | p. 90 |
| The IBM Face Recognition System | p. 93 |
| Conclusions | p. 95 |
| Personalize Mobile Access by Speaker Authentication | p. 99 |
| Introduction | p. 100 |
| Bilateral User Authentication Framework | p. 103 |
| Enabling Speaker Authentication Technologies | p. 106 |
| Simulations | p. 115 |
| Conclusions | p. 126 |
| Biometrics on the Internet: Security Application and Services | p. 131 |
| Introduction | p. 131 |
| Communications Networks and Internet | p. 132 |
| Biometrics | p. 139 |
| The Personal Identification Network: Biometrics Services via the Internet | p. 146 |
| Other Biometric Topics in Internet Applications | p. 162 |
| Conclusions and Future Trends | p. 163 |
| Forensic Identification Reporting Using Automatic Biometric Systems | p. 169 |
| Introduction | p. 169 |
| Biometric Systems and Classical Forensic Reporting | p. 171 |
| Bayesian Analysis of Forensic Evidence | p. 173 |
| Assessment of Forensic Biometric Systems | p. 175 |
| Case Study: Forensic Speaker Recognition | p. 175 |
| Conclusions | p. 183 |
| Signature Security System for E-commerce | p. 187 |
| Introduction | p. 188 |
| Literature Overview | p. 191 |
| A Typical On-Line Signature Verification System | p. 199 |
| Proposed On-Line Dynamic Signature Verification Applications | p. 209 |
| Conclusions | p. 214 |
| Web Guard: A Biometrics Identification System for Network Security | p. 217 |
| Introduction | p. 218 |
| Biometrics Data Warehouse | p. 221 |
| Dynamic Feature Selection | p. 224 |
| Hierarchical Search | p. 227 |
| Robust Classification via Fuzzy Neural Network | p. 227 |
| System Implementation | p. 230 |
| Experimental Results | p. 235 |
| Conclusions | p. 239 |
| Smart Card Application Based on Palmprint Identification | p. 243 |
| Introduction | p. 243 |
| On-line Palmprint Identification System | p. 246 |
| Smart Card Architecture | p. 253 |
| System Analysis and Applications | p. 257 |
| Conclusions | p. 260 |
| Secure Fingerprint Authentication | p. 263 |
| Introduction | p. 263 |
| Biometrics-Based Authentication Systems | p. 267 |
| Fingerprint Recognition | p. 270 |
| Techniques to Improve Security | p. 273 |
| Conclusions | p. 286 |
| From Biometrics Technology to Applications Regarding Face, Voice, Signature and Fingerprint Recognition Systems | p. 289 |
| Introduction | p. 289 |
| Automatic Speaker Recognition | p. 290 |
| Automatic Face Recognition | p. 296 |
| Minutiae-Based Fingerprint Recognition Systems | p. 304 |
| On-Line HMM-Based Signature Verification System | p. 312 |
| Multimodality in Biometric Systems | p. 322 |
| From Technology to Applications | p. 325 |
| Face Verification for Access Control | p. 339 |
| Introduction | p. 339 |
| Face Detection | p. 342 |
| Face Verification | p. 343 |
| Major Challenges | p. 359 |
| An Example Access Control System Based on Eigenface | p. 365 |
| Commercial Systems and Performance Evaluation | p. 368 |
| Summary and Conclusions | p. 370 |
| Voice Biometrics for Securing Your Web-Based Business | p. 377 |
| Introduction | p. 377 |
| Speaker Verification | p. 379 |
| Business Opportunities on the Web using Speaker Verification | p. 383 |
| SpeakEZ Web Authentication Service | p. 385 |
| Speaker Verification Performance | p. 389 |
| Summary | p. 392 |
| Ability to Verify: A Metric for System Performance in Real-World Comparative Biometric Testing | p. 393 |
| Introduction | p. 394 |
| Test Methodology | p. 395 |
| High-level Test Results | p. 398 |
| Ability to Verify (ATV) | p. 401 |
| Vendor-generated Test Results | p. 406 |
| Conclusions | p. 408 |
| Automated Authentication Using Hybrid Biometric System | p. 411 |
| The State of the Art | p. 412 |
| A Hybrid Biometric Person Authentication Prototype | p. 421 |
| Database, Tests and Results | p. 426 |
| Hybrid Biometric Applications | p. 432 |
| Conclusions | p. 439 |
| Index | p. 445 |
| Table of Contents provided by Ingram. All Rights Reserved. |