Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / Lisa Bock.
2020
TK7882.B56
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Linked e-resources
Details
Title
Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / Lisa Bock.
Author
ISBN
1839213213
9781839213212 (electronic bk.)
9781839213212 (electronic bk.)
Imprint
Birmingham : Packt Publishing, Limited, 2020.
Language
English
Description
1 online resource (369 pages)
Call Number
TK7882.B56
System Control No.
(OCoLC)1202454505
Summary
Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key Features Explore the next iteration of identity protection and overcome real-world challenges Understand different biometric use cases to deploy a large-scale biometric system Curated by renowned security ambassador and experienced author Lisa Bock Book Description Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies. What you will learn Review the advantages and disadvantages of biometric technology Understand the characteristics of an optimal biometric system Discover the uses of biometrics and where they are used Compare different types of errors and see how to tune your system Understand the benefits of multi-factor authentication Work with commonly used biometrics such as face, fingerprint, and iris Analyze a biometric system for usability and accuracy Address privacy concerns and get a glimpse of the future of biometrics Who this book is for Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone invo...
Note
Extracting the features.
Bibliography, etc. Note
Includes bibliographical references and index.
Formatted Contents Note
Cover
Title Page
Copyright and Credits
Dedication
About Packt
Contributors
Table of Contents
Preface
Section 1 -Understanding Biometric Authentication
Chapter 01: Exploring Biometric Technology
Describing biometric technology
Defining biometrics
Providing identification
Verifying authentication
Appreciating modern biometrics
Traveling back in time
Applying a unique attribute
Comparing biometric categories
Measuring physiological attributes
Observing behavioral biometrics
Summary
Questions
Further reading
Chapter 02: Biometrics and Mobile Devices
Securing fintech and other applications
Ensuring access control
Staying in compliance
Tokenizing credit card information
Designing optimal biometrics for mobile
Simplifying the user experience
Understanding haptics
Incorporating essential biometric technology
Capturing the image
Handling the biometric
Providing security and privacy
Summary
Questions
Further reading
Chapter 03: Recognizing Biometric Characteristics
Assessing the desired qualities of a biometric
Having uniqueness
Being universal
Staying permanent
Performing accurately
Ensuring collectability
Providing an acceptable biometric
Avoiding circumvention
Summarizing the operation of a biometric system
Initiating contact with the user interface
Obtaining the biometric identifier
Matching the pattern
Making a decision
Comparing application environments
Classifying different methods
Accepting various forms of input
Summary
Questions
Further reading
Chapter 04: Comparing Advantages and Modalities
Reviewing system approaches
Networking the biometric system
Operating in standalone mode
Integrating with other systems
Reviewing common modalities
Understanding system errors
Making a correct decision
Testing a biometric system
Using multi-factor authentication
Strengthening a standard login
Adding a biometric identifier
Recognizing the push for standards
Taking a closer look at biometrics
Developing biometric standards
Summary
Questions
Further reading
Section 2
Applying Biometric Technologies
Chapter 05: Implementing Fingerprint Technology
Exploring the evolution of fingerprint technology
Classifying fingers
Managing US fingerprints
Understanding fingerprint systems
Scanning the fingers
Digitizing the image
Storing the templates
Matching the patterns
Extracting the features
Finding fingerprints everywhere
Comparing benefits with drawbacks
Summary
Questions
Further reading
Chapter 06: Using Facial Recognition
Understanding facial features
Seeing someone's face
Studying faces over time
Moving through facial recognition
Acquiring the facial image
Capturing images using 2D or 3D
Overcoming challenges
Title Page
Copyright and Credits
Dedication
About Packt
Contributors
Table of Contents
Preface
Section 1 -Understanding Biometric Authentication
Chapter 01: Exploring Biometric Technology
Describing biometric technology
Defining biometrics
Providing identification
Verifying authentication
Appreciating modern biometrics
Traveling back in time
Applying a unique attribute
Comparing biometric categories
Measuring physiological attributes
Observing behavioral biometrics
Summary
Questions
Further reading
Chapter 02: Biometrics and Mobile Devices
Securing fintech and other applications
Ensuring access control
Staying in compliance
Tokenizing credit card information
Designing optimal biometrics for mobile
Simplifying the user experience
Understanding haptics
Incorporating essential biometric technology
Capturing the image
Handling the biometric
Providing security and privacy
Summary
Questions
Further reading
Chapter 03: Recognizing Biometric Characteristics
Assessing the desired qualities of a biometric
Having uniqueness
Being universal
Staying permanent
Performing accurately
Ensuring collectability
Providing an acceptable biometric
Avoiding circumvention
Summarizing the operation of a biometric system
Initiating contact with the user interface
Obtaining the biometric identifier
Matching the pattern
Making a decision
Comparing application environments
Classifying different methods
Accepting various forms of input
Summary
Questions
Further reading
Chapter 04: Comparing Advantages and Modalities
Reviewing system approaches
Networking the biometric system
Operating in standalone mode
Integrating with other systems
Reviewing common modalities
Understanding system errors
Making a correct decision
Testing a biometric system
Using multi-factor authentication
Strengthening a standard login
Adding a biometric identifier
Recognizing the push for standards
Taking a closer look at biometrics
Developing biometric standards
Summary
Questions
Further reading
Section 2
Applying Biometric Technologies
Chapter 05: Implementing Fingerprint Technology
Exploring the evolution of fingerprint technology
Classifying fingers
Managing US fingerprints
Understanding fingerprint systems
Scanning the fingers
Digitizing the image
Storing the templates
Matching the patterns
Extracting the features
Finding fingerprints everywhere
Comparing benefits with drawbacks
Summary
Questions
Further reading
Chapter 06: Using Facial Recognition
Understanding facial features
Seeing someone's face
Studying faces over time
Moving through facial recognition
Acquiring the facial image
Capturing images using 2D or 3D
Overcoming challenges
Source of Description
Print version record.
Available in Other Form
Print version: Bock, Lisa. Identity Management with Biometrics : Explore the Latest Innovative Solutions to Provide Secure Identification and Authentication. Birmingham : Packt Publishing, Limited, ©2020
Linked Resources
Record Appears in