Wiley.com
Print this page Share

Behavioral Biometrics: A Remote Access Approach

ISBN: 978-0-470-51883-0
Hardcover
250 pages
November 2008
List Price: US $161.25
Government Price: US $92.76
Enter Quantity:   Buy
Behavioral Biometrics: A Remote Access Approach (0470518839) cover image

1. Introduction to Behavioral Biometrics.

1.1 Introduction.

1.2 Types of Behavioral Biometrics.

1.3 The Biometric Process.

1.4 Validation Issues.

1.5 Relevant Databases.

1.6 International Standards.

1.7 Conclusions.

1.8 Research Topics.

2. Voice Identification.

2.1 Introduction.

2.2 Case Studies in Speaker-Dependent Voice Recognition.

2.3 Standards.

2.4 Conclusions.

2.5 Research Topics.

3. Signature Verification.

3.1 Introduction.

3.2 Off-Line Signature Verification.

3.3 Online Signature Verification.

3.4 Signature Verification Standards.

3.5 Conclusions.

3.6 Research Topics.

4. Keystroke Dynamics..

4.1 Introduction.

4.2 Attribute Selection Process.

4.3 The Enrollment Process.

4.4 Generation of the Reference Profile.

4.5 Case Studies.

4.6 Standards.

4.7 Conclusions.

4.8 Research Topics.

5. Graphical-Based Authentication Methods..

5.1 Introduction to the Graphical Authentication Approach.

5.2 Recognition-Based Techniques.

5.3 Recall-Based Techniques.

5.4 Multi-Image Graphical Password Systems.

5.5 Conclusions.

5.6 Research Topics.

6. Mouse Dynamics..

6.1 Introduction.

6.2 Case Studies.

6.3 Conclusion.

6.4 Research Topics.

7. Multimodal Biometric Systems.

7.1 Introduction to Multimodal Biometrics.

7.2 Fusion Framework Approaches.

7.3 Case Studies.

7.4 Continuous Verification.

7.5 Standards.

7.6 Conclusions.

7.7 Research Topics.

8. The Future of Behavioral Biometrics.

8.1 Introduction to the Future of Biometrics.

8.2 Software-Only Approach.

8.3 Software plus Hardware Approach.

8.4 Conclusions.

8.5 Research Topics.

Appendix.

A. Gait Analysis.

B. The History of the Keyboard.

C. Cognitive Aspects of Human–Computer Interaction.

I. Power Law of Practice.

II. Fitts’ Law.

III. Accot–Zhai Steering Law.

IV. Hick’s Law.

References.

Index.

Preface (Second Edition).

Preface (First Edition).

Acknowledgments.

Introduction.

1. Fundamentals.

1.1 Radio Channel Characteristics.

1.2 Multi-Carrier Transmission.

1.3 Spread Spectrum Techniques.

1.4 Multi-Carrier Spread Spectrum.

1.5 References.

2. MC-CDMA and MC-DS-CDMA.

2.1 MC-CDMA.

2.2 MC-DS-CDMA.

2.3 References.

3. Hybrid Multiple Access Schemes.

3.1 Introduction.

3.2 Multi-Carrier FDMA.

3.3 Multi-Carrier TDMA .

3.4 Ultra Wide Band Systems.

3.5 Comparison of Hybrid Multiple Access Schemes.

3.6 References.

4. Implementation Issues.

4.1 Multi-Carrier Modulation and Demodulation.

4.2 Synchronization.

4.3 Channel Estimation.

4.4 Channel Coding and Decoding.

4.5 Signal Constellation, Mapping, De-Mapping, and Equalization.

4.6 Adaptive Techniques in Multi-Carrier Transmission.

4.7 RF Issues.

4.8 References.

5. Applications.

5.1 Introduction.

5.2 3GPP Long Term Evolution (LTE).

5.3 WiMAX.

5.4 Future Mobile Communications Concepts and Field Trials.

5.5 Wireless Local Area Networks.

5.6 Interaction Channel for DVB-T: DVB-RCT.

6. Additional Techniques for Capacity and Flexibility Enhancement.

6.1 Introduction.

6.2 MIMO Overview.

6.3 Diversity Techniques for Multi-Carrier Transmission.

6.4 Spatial Pre-Coding for Multi-Carrier transmission.

6.5 Software-Defined Radio.

References.

Definitions, Abbreviations, and Symbols.

Definitions.

Abbreviations.

Symbols.

Index.

Related Titles

General Computer Engineering

by Michael W. Berry (Editor), Jacob Kogan (Editor)
by Robert Spence
by Francis Cottet, Joëlle Delacroix, Claude Kaiser, Zoubir Z. Mammeri
by Dr. Muhammad Sarfraz
Back to Top