You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This comprehensive handbook addresses the sophisticated forensic threats and challenges that have arisen in the modern digital age, and reviews the new computing solutions that have been proposed to tackle them. These include identity-related scenarios which cannot be solved with traditional approaches, such as attacks on security systems and the identification of abnormal/dangerous behaviors from remote cameras. Features: provides an in-depth analysis of the state of the art, together with a broad review of the available technologies and their potential applications; discusses potential future developments in the adoption of advanced technologies for the automated or semi-automated analysis of forensic traces; presents a particular focus on the acquisition and processing of data from real-world forensic cases; offers an holistic perspective, integrating work from different research institutions and combining viewpoints from both biometric technologies and forensic science.
The third edition of this authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) – also known as Biometric Anti-Spoofing. Building on the success of the previous editions, this thoroughly updated third edition has been considerably revised to provide even greater coverage of PAD methods, spanning biometrics systems based on face, fingerprint, iris, voice, vein, and signature recognition. New material is also included on major PAD competitions, important databases for research, and on the impact of recent international legislation. Valuable insights are supplied by a selection of leading experts in the...
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.
Expert Bytes: Computer Expertise in Forensic Documents Players, Needs, Resources and Pitfallsintroduces computer scientists and forensic document examiners to the computer expertise of forensic documents and assists them with the design of research projects in this interdisciplinary field. This is not a textbook on how to perform the actua
This book constitutes the thoroughly refereed proceedings of the COST 2101 International Workshop, BIOID 2011, held in Brandenburg (Havel), Germany, in March 2011. The 25 revised full papers presented were carefully reviewed and selected from numerous submissions and are completed by an introduction on COST. The papers are organized in topical main sections on theory and systems, handwriting authentication, speaker authentication, face recognition, multibiometric authentication, and on biometrics and forensics.
Biometrics is a rapidly evolving field with applications ranging from accessing one’s computer to gaining entry into a country. The deployment of large-scale biometric systems in both commercial and government applications has increased public awareness of this technology. Recent years have seen significant growth in biometric research resulting in the development of innovative sensors, new algorithms, enhanced test methodologies and novel applications. This book addresses this void by inviting some of the prominent researchers in Biometrics to contribute chapters describing the fundamentals as well as the latest innovations in their respective areas of expertise.
The International Symposium on Distributed Computing and Artificial Intelligence 2012 (DCAI 2012) is a stimulating and productive forum where the scientific community can work towards future cooperation in Distributed Computing and Artificial Intelligence areas. This conference is a forum in which applications of innovative techniques for solving complex problems will be presented. Artificial intelligence is changing our society. Its application in distributed environments, such as the internet, electronic commerce, environment monitoring, mobile communications, wireless devices, distributed computing, to mention only a few, is continuously increasing, becoming an element of high added value...
This book constitutes the refereed proceedings of the 16th International Symposium on Methodologies for Intelligent Systems, ISMIS 2006. The book presents 81 revised papers together with 3 invited papers. Topical sections include active media human-computer interaction, computational intelligence, intelligent agent technology, intelligent information retrieval, intelligent information systems, knowledge representation and integration, knowledge discovery and data mining, logic for AI and logic programming, machine learning, text mining, and Web intelligence.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Computational Forensics, IWCF 2010, held in Tokyo, Japan in November 2010. The 16 revised full papers presented together with two invited keynote papers were carefully selected during two rounds of reviewing and revision. The papers cover a wide range of current topics in computational forensics including authentication, biometrics, document analysis, multimedia, forensic tool evaluation, character recognition, and forensic verification.
This book constitutes the refereed proceedings of the 6th International Workshop on Multiple Classifier Systems, MCS 2005, held in Seaside, CA, USA in June 2005. The 42 revised full papers presented were carefully reviewed and are organized in topical sections on boosting, combination methods, design of ensembles, performance analysis, and applications. They exemplify significant advances in the theory, algorithms, and applications of multiple classifier systems – bringing the different scientific communities together.