Skip to product information
1 of 1

Biometric Presentation Attack Detection

Regular price £99.00
Sale price £99.00 Regular price £99.00
Sale Sold out
This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and lim...
Read More
  • Format:
  • 21 December 2023
View Product Details

Biometrics use an individual’s unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, and we are therefore at higher risk of spoofing attacks from fraudsters and hackers. This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader’s understanding.

Key Features:

  • Consolidated approach includes most prevalent spoofing and anti-spoofing strategies.
  • Includes both hardware and software-based approaches to anti-spoofing technologies
  • Features Artificial Intelligence methods
  • Reviews patents
  • Accompanied by MATLAB and PYTHON codes
files/i.png Icon
Price: £99.00
Pages: 220
Publisher: Institute of Physics Publishing
Imprint: Institute of Physics Publishing
Series: IOP ebooks
Publication Date: 21 December 2023
ISBN: 9780750352024
Format: eBook
BISACs:

COMPUTERS / Security / General, Computer security, TECHNOLOGY & ENGINEERING / Sensors, COMPUTERS / Human-Computer Interaction, Human–computer interaction, Sensors

REVIEWS Icon

Preface

Acknowledgements

Author biography

List of acronyms

1 Biometrics

2 Presentation attack detection in biometrics

3 Fringe projection–based secure biometrics

4 Biometric presentation attack detection using speckle metrology

5 Presentation attack detection using fringe projection and biospeckle analysis

6 Presentation attack detection using optical coherence tomography

7 Thermography-based presentation attack detection

8 Miscellaneous

9 Patents: basics and selected descriptions

10 Preliminary experiments and research ideas