* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data * Gives security professionals specific guidelines, applications, and procedures for implementing a biometric security system in a LAN, WAN, or wireless infrastructure * Covers fingerprint identification, hand geometry, speaker recognition, face location, retina scanning, and multibiometrics * Companion Web site contains articles, papers, source code, and product guides... a person holding a transaction card, driverts license, national identification card, passport, visa, or other documents. ... Among the strengths for hand-scan geometry biometrics are ease of use, resistance to fraud, size of the template, and user ... Resistant to fraud a Short of casting a model of an enrolled personts hand and fingers, it would be difficult and time-consuming to submit a fake sample.
|Title||:||Implementing Biometric Security|
|Author||:||John Chirillo, Scott Blaul|
|Publisher||:||Wiley - 2003-05-09|