Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Identity Management with Biometrics
  • Table Of Contents Toc
Identity Management with Biometrics

Identity Management with Biometrics

By : Lisa Bock
4.8 (10)
close
close
Identity Management with Biometrics

Identity Management with Biometrics

4.8 (10)
By: Lisa Bock

Overview of this book

Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you’ll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You’ll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You’ll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you’ll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies.
Table of Contents (20 chapters)
close
close
1
Section 1 –Understanding Biometric Authentication
6
Section 2 – Applying Biometric Technologies
12
Section 3 – Deploying a Large-Scale Biometric System

Chapter 7: Learning Iris Recognition

When we gaze into someone’s eyes, we can sense a lot about how they may be feeling. The eyes can reflect if someone is worried or if they are truly happy. But there is more to the human eye. Within the eye is the iris, or the colored part of the eye, which is responsible for allowing light to reach the retina. And each of our irises is unique, which makes the iris an optimal biometric.

In this chapter, we’ll start by taking a closer look at the structure of the iris, and outline some of the main functions. We’ll discover the many markings in an iris, such as ridges, crypts, stripes, and freckles, which provide its uniqueness. We’ll then cover the structure of the eye and what is captured when using iris recognition. We’ll step through methods to sense and capture iris images, looking at imaging techniques and learning how the eye is normalized. You’ll gain a better understanding of how template matching...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Identity Management with Biometrics
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon