Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Identity Management with Biometrics

You're reading from   Identity Management with Biometrics Explore the latest innovative solutions to provide secure identification and authentication

Arrow left icon
Product type Paperback
Published in Oct 2020
Publisher Packt
ISBN-13 9781838988388
Length 368 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Lisa Bock Lisa Bock
Author Profile Icon Lisa Bock
Lisa Bock
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Section 1 –Understanding Biometric Authentication
2. Chapter 1: Exploring Biometric Technology FREE CHAPTER 3. Chapter 2: Biometrics and Mobile Devices 4. Chapter 3: Recognizing Biometric Characteristics 5. Chapter 4: Comparing Advantages and Modalities 6. Section 2 – Applying Biometric Technologies
7. Chapter 5: Implementing Fingerprint Technology 8. Chapter 6: Using Facial Recognition 9. Chapter 7: Learning Iris Recognition 10. Chapter 8: Using Voice Recognition 11. Chapter 9: Considering Alternate Biometrics 12. Section 3 – Deploying a Large-Scale Biometric System
13. Chapter 10: Selecting the Right Biometric 14. Chapter 11: Integrating the Biometric System 15. Chapter 12: Testing and System Deployment 16. Chapter 13: Discovering Practical Biometric Applications 17. Chapter 14: Addressing Privacy Concerns 18. Assessments 19. Other Books You May Enjoy

What this book covers

Chapter 1, Exploring Biometric Technology, covers the concept of biometrics and the methods available to provide identification and authentication. We'll compare physiological versus behavioral biometrics, and examine common biometrics such as fingerprint, facial, iris, and voice recognition.

Chapter 2, Biometrics and Mobile Devices, teaches you the real-world applications of biometrics in mobile devices. This chapter covers the various biometric methods used in Fintech, such as voice and facial recognition, to enable authentication and payment processing.

Chapter 3, Recognizing Biometric Characteristics, outlines the desired qualities of a biometric, including uniqueness, performance, distinctiveness, and permanence, and reviews the general operation of biometric technology in various environments.

Chapter 4, Comparing Advantages and Modalities, explains the many types of biometric systems, along with their advantages/disadvantages. It describes the different types of biometrics systems, system errors, multimodal usage, and practical examples of different applications.

Chapter 5, Implementing Fingerprint Technology, provides a basic understanding of the evolution of fingerprint technology. We'll cover feature extraction and minutiae along with the different types of fingerprint systems in use today.

Chapter 6, Using Facial Recognition, provides an overview of the process of acquiring facial images using two-dimensional (2D) and three-dimensional (3D) sensors, and covers how systems extract the features along with how facial recognition is used today.

Chapter 7, Learning Iris Recognition, outlines the unique nature of the iris along with the structure of the eye. We'll step through capturing and sensing iris images, to matching templates and preventing spoofing, and will examine some of the applications for iris recognition.

Chapter 8, Using Voice Recognition, first reviews the evolution of two related technologies: voice recognition and speech recognition. We'll then step through the process of enrolling and matching and discuss the various ways we can use voice recognition.

Chapter 9, Considering Alternate Biometrics, outlines several lesser-known biometrics such as gait recognition and deoxyribonucleic acid (DNA). We'll cover an overview of keyboard dynamics and signature verification, along with using tattoos, scars, and ear biometrics.

Chapter 10, Selecting the Right Biometric, begins with an overview of the System Development Life Cycle and the requirements process for a biometric system. We'll also cover the factors that need to be considered when selecting a system, including usability, accuracy, speed, and efficiency.

Chapter 11, Integrating the Biometric System, moves through network and implementation considerations, compression methods, and securing biometric data, along with business continuity, disaster recovery, and integrating with the directory.

Chapter 12, Testing and System Deployment, stresses the importance of testing the system, and some of the tasks that the team will need to complete prior to deployment, such as providing education and awareness, enrolling the users, and tuning the decision process.

Chapter 13, Discovering Practical Biometric Applications, covers the use of biometrics in law enforcement and forensics. You'll see how we can use biometrics for large venues; to control access to assets, buildings, and systems; and some other novel uses of biometrics.

Chapter 14, Addressing Privacy Concerns, compares privacy laws in the US and Europe, and covers biometrics and the US' Fifth Amendment. We'll see the importance of biometric standards, and take a glimpse into the future of biometrics.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime