In todayOCOs digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progressively complex. This has brought the spotlight on the importance of effective and efficient means of ascertaining an individualOCOs identity. Biometric technologies like fingerprint recognition, face recognition, iris recognition etc. have a long history of use in law enforcement applications and are now transitioning towards commercial applications like password replacements, ATM authentication and others.This unique book provides you with comprehensive coverage of commercially available biometric technologies, their underlying principles, operational challenges and benefits, and deployment considerations. It also offers a look at the future direction these technologies are taking. By focusing on factors that drive the practical implementation of biometric technologies, this book serves to bridge the gap between academic researchers and industry practitioners. This book focuses on design, development, and deployment issues related to biometric technologies, including operational challenges, integration strategies, technical evaluations of biometric systems, standardization and privacy preserving principles, and several open questions which need to be answered for successful deployments.qagainst other usersa#39; templates. They have an adverse impact on biometric systems, ... The resulting animal groups separate into four different quadrants of the zoo plot, as shown in Figure 2.6. Doddingtona#39;s zoo analysis uses genuine matchanbsp;...
|Title||:||Biometrics in Identity Management|
|Author||:||Shimon K. Modi|
|Publisher||:||Artech House - 2011|