000 | 03508nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-031-49071-2 | ||
003 | DE-He213 | ||
005 | 20240423130317.0 | ||
007 | cr nn 008mamaa | ||
008 | 240109s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031490712 _9978-3-031-49071-2 |
||
024 | 7 |
_a10.1007/978-3-031-49071-2 _2doi |
|
050 | 4 | _aTK7882.B56 | |
072 | 7 |
_aUYQP _2bicssc |
|
072 | 7 |
_aCOM016000 _2bisacsh |
|
072 | 7 |
_aUYQP _2thema |
|
082 | 0 | 4 |
_a006.248 _223 |
100 | 1 |
_aSmith-Creasey, Max. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aContinuous Biometric Authentication Systems _h[electronic resource] : _bAn Overview / _cby Max Smith-Creasey. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2024. |
|
300 |
_aX, 118 p. 9 illus., 8 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5776 |
|
505 | 0 | _aIntroduction -- Traditional Authentication -- Continuous Authentication -- Biometrics for Continuous Authentication -- Considerations and Challenges -- Conclusion. | |
520 | _aThis book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges. This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable todevices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches. This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security. | ||
650 | 0 | _aBiometric identification. | |
650 | 0 | _aPattern recognition systems. | |
650 | 0 |
_aData protection _xLaw and legislation. |
|
650 | 1 | 4 | _aBiometrics. |
650 | 2 | 4 | _aAutomated Pattern Recognition. |
650 | 2 | 4 | _aPrivacy. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031490705 |
776 | 0 | 8 |
_iPrinted edition: _z9783031490729 |
830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5776 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-49071-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c187239 _d187239 |