It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-028.mrc:131386100:27646
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-028.mrc:131386100:27646?format=raw

LEADER: 27646cam a2200829 i 4500
001 13726080
005 20220604224418.0
006 m o d
007 cr cn|||||||||
008 170922s2017 enka ob 001 0 eng d
035 $a(OCoLC)on1004552347
035 $a(NNC)13726080
040 $aIDEBK$beng$erda$epn$cIDEBK$dN$T$dUIU$dOCLCF$dMERUC$dUAB$dYDX$dOCLCQ$dIDEBK$dKNOVL$dSTF$dOCLCQ$dEZ9$dINT$dOTZ$dOCLCQ$dWYU$dG3B$dOCLCQ$dIGB$dCUV$dCEF$dUKAHL$dOCLCQ$dUX1$dAGLDB$dVLB$dOCLCQ$dOCLCO$dOCLCQ$dOCLCO
019 $a1005965653$a1036294010$a1057434299$a1097098184$a1151924711$a1162916558$a1182856345$a1193149516
020 $a1785611690$q(electronic bk.)
020 $a9781785611698$q(electronic bk.)
020 $a9781523112319$q(electronic bk.)
020 $a152311231X$q(electronic bk.)
020 $z1785611682
020 $z9781785611681
035 $a(OCoLC)1004552347$z(OCoLC)1005965653$z(OCoLC)1036294010$z(OCoLC)1057434299$z(OCoLC)1097098184$z(OCoLC)1151924711$z(OCoLC)1162916558$z(OCoLC)1182856345$z(OCoLC)1193149516
037 $a1035693$bMIL
050 4 $aTK7882.B56$bI75 2017eb
072 7 $aCOM$x000000$2bisacsh
072 7 $aB0100$2inspec
072 7 $aB6135$2inspec
072 7 $aC0000$2inspec
072 7 $aC0230$2inspec
072 7 $aC5260B$2inspec
072 7 $aC6130S$2inspec
082 04 $a006.4$223
049 $aZCUA
245 00 $aIris and periocular biometric recognition /$cedited by Christian Rathgeb and Christoph Busch.
264 1 $aLondon, UK :$bThe Institution of Engineering and Technology,$c2017.
300 $a1 online resource :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
490 1 $aIET Security Series ;$v05
490 1 $aIET Book Series on Advances in Biometrics
588 0 $aOnline resource; title from PDF title page (viewed on February 28, 2019).
504 $aIncludes bibliographical references at the end of each chapters and index.
520 $aThe book reviews developments in the following fields: periocular biometrics; robust iris image segmentation; iris image quality metrics; iris biometric indexing; biometric recognition; best periocular region identification; presentation attack resistant robust biometric ocular system; soft biometric classification; gender classification; near infrared iris images; age predictive biometrics; contact lens detection; software attacks; privacy protection; forensics; iris biometric template protection; privacy-preserving distance computation; IrisCodes; iris sensor identification; iris image matching; embedded systems; and mobile iris recognition.
505 00 $gMachine generated contents note:$g1.$tFundamentals in iris recognition --$g1.1.$tIntroduction /$rChristoph Busch /$rChristian Rathgeb --$g1.2.$tIris recognition processing chain /$rChristoph Busch /$rChristian Rathgeb --$g1.2.1.$tImage acquisition /$rChristoph Busch /$rChristian Rathgeb --$g1.2.2.$tPre-processing /$rChristoph Busch /$rChristian Rathgeb --$g1.2.3.$tFeature extraction /$rChristoph Busch /$rChristian Rathgeb --$g1.2.4.$tComparison /$rChristoph Busch /$rChristian Rathgeb --$g1.3.$tStatus quo in research and industry /$rChristoph Busch /$rChristian Rathgeb --$g1.3.1.$tDatabases, competitions and software /$rChristoph Busch /$rChristian Rathgeb --$g1.3.2.$tStandardization and deployments /$rChristoph Busch /$rChristian Rathgeb --$g1.4.$tChallenges in iris recognition /$rChristoph Busch /$rChristian Rathgeb --$g1.4.1.$tVisible wavelength and unconstrained conditions /$rChristoph Busch /$rChristian Rathgeb --$g1.4.2.$tSecurity and privacy protection /$rChristoph Busch /$rChristian Rathgeb --$g1.4.3.$tCross-sensor and cross-spectral recognition /$rChristoph Busch /$rChristian Rathgeb --$g1.4.4.$tSoft biometrics and template ageing /$rChristoph Busch /$rChristian Rathgeb --$g1.4.5.$tLarge-scale identification and iris biometric fusion /$rChristoph Busch /$rChristian Rathgeb --$g1.5.$tSummary /$rChristoph Busch /$rChristian Rathgeb --$tReferences /$rChristoph Busch /$rChristian Rathgeb --$g2.$toverview of periocular biometrics /$rChristoph Busch /$rChristian Rathgeb --$g2.1.$tAcquisition of periocular images /$rJosef Bigun /$rFernando Alonso-Fernandez --$g2.2.$tDetection of the periocular region /$rJosef Bigun /$rFernando Alonso-Fernandez --$g2.3.$tFeature encoding and comparison /$rJosef Bigun /$rFernando Alonso-Fernandez --$g2.4.$tHuman performance evaluation /$rJosef Bigun /$rFernando Alonso-Fernandez --$g2.5.$tComparison of periocular with other modalities /$rJosef Bigun /$rFernando Alonso-Fernandez --$g2.6.$tOther tasks using features from the periocular region /$rJosef Bigun /$rFernando Alonso-Fernandez --$g2.7.$tSummary and future trends in periocular research /$rJosef Bigun /$rFernando Alonso-Fernandez --$tAcknowledgments /$rJosef Bigun /$rFernando Alonso-Fernandez --$tReferences /$rJosef Bigun /$rFernando Alonso-Fernandez --$g3.$tRobust iris image segmentation /$rJosef Bigun /$rFernando Alonso-Fernandez --$g3.1.$tIntroduction /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.1.1.$tSegmentation accuracy /$rPeter Wild /$rHeinz Hofbauer /$rJames Ferryman /$rAndreas Uhl --$g3.1.2.$tIris segmentation quality /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.2.$tAdvances in iris segmentation /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.2.1.$tFrom circular models to active contours /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.2.2.$tNear infrared vs. visible range segmentation /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.2.3.$tLearning-based techniques /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.2.4.$tSegmentation fusion /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.3.$tExperiments /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.3.1.$tIndividual NIR vs. VIS performance /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.3.2.$tImpact of tuning /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.3.3.$tCombinations of segmentation performance /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g3.4.$tConclusion and future work /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$tReferences /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g4.$tIris image quality metrics with veto power and nonlinear importance tailoring /$rPeter Wild /$rAndreas Uhl /$rJames Ferryman /$rHeinz Hofbauer --$g4.1.$tIntroduction /$rCathryn Downing /$rJohn Daugman --$g4.1.1.$tRelated work /$rCathryn Downing /$rJohn Daugman --$g4.2.$tNormalisation of individual quality measures /$rCathryn Downing /$rJohn Daugman --$g4.3.$tEffectiveness of multiplying quality factors /$rCathryn Downing /$rJohn Daugman --$g4.4.$tImportance tailoring /$rCathryn Downing /$rJohn Daugman --$g4.5.$tError reject curves /$rCathryn Downing /$rJohn Daugman --$g4.6.$tDiscipline in punishment /$rCathryn Downing /$rJohn Daugman --$g4.7.$tPredictive value of the quality pseudonorm /$rCathryn Downing /$rJohn Daugman --$g4.8.$tTesting and adoption into an ISO/IEC quality standard /$rCathryn Downing /$rJohn Daugman --$g4.9.$tpossible criticism of the method /$rCathryn Downing /$rJohn Daugman --$tAcknowledgement /$rCathryn Downing /$rJohn Daugman --$tReferences /$rCathryn Downing /$rJohn Daugman --$g5.$tIris biometric indexing /$rCathryn Downing /$rJohn Daugman --$g5.1.$tIntroduction /$rJodo C. Neves /$rHugo Proenca --$g5.2.$tState of the art /$rJodo C. Neves /$rHugo Proenca --$g5.3.$tIndexing/retrieving poorly separated data /$rJodo C. Neves /$rHugo Proenca --$g5.3.1.$tIndexing /$rJodo C. Neves /$rHugo Proenca --$g5.3.2.$tRetrieval /$rJodo C. Neves /$rHugo Proenca --$g5.3.3.$tTime complexity /$rJodo C. Neves /$rHugo Proenca --$g5.4.$tPerformance comparison /$rJodo C. Neves /$rHugo Proenca --$g5.4.1.$tSynthetic IrisCodes /$rJodo C. Neves /$rHugo Proenca --$g5.4.2.$tWell separated near infra-red data /$rJodo C. Neves /$rHugo Proenca --$g5.4.3.$tPoorly separated visible wavelength data /$rJodo C. Neves /$rHugo Proenca --$g5.5.$tConclusions /$rJodo C. Neves /$rHugo Proenca --$tAcknowledgment /$rJodo C. Neves /$rHugo Proenca --$tReferences /$rJodo C. Neves /$rHugo Proenca --$g6.$tIdentifying the best periocular region for biometric recognition /$rJodo C. Neves /$rHugo Proenca --$g6.1.$tIntroduction /$rB. VK. Vijaya Kumar /$rJonathon M. Smereka --$g6.2.$tExperimental setup /$rB. VK. Vijaya Kumar /$rJonathon M. Smereka --$g6.3.$tResults /$rB. VK. Vijaya Kumar /$rJonathon M. Smereka --$g6.4.$tSummary /$rB. VK. Vijaya Kumar /$rJonathon M. Smereka --$tReferences /$rB. VK. Vijaya Kumar /$rJonathon M. Smereka --$g7.$tLight field cameras for presentation attack resistant robust biometric ocular system /$rB. VK. Vijaya Kumar /$rJonathon M. Smereka --$g7.1.$tIntroduction /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.2.$tLight-field imaging /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.3.$tScheme for iris and periocular verification /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.3.1.$tIris verification /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.3.2.$tPeriocular verification /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.3.3.$tCombining iris and periocular characteristics /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.3.4.$tDatabase, experiments and results /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.4.$tPresentation attack resistant ocular biometrics in visible spectrum /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.4.1.$tPAD algorithm employing the depth images from LFC /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.4.2.$tVisible spectrum iris recognition system /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.4.3.$tPresentation attack database /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.4.4.$tPerformance evaluation protocol /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.4.5.$tExperiments and results /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g7.5.$tConclusion /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$tReferences /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B. Raja --$g8.$tGender classification from near infrared iris images /$rRaghavendra Ramachandra /$rChristoph Busch /$rKiran B.
505 00 $rRaja --$g8.1.$tIntroduction /$rJuan Tapia --$g8.2.$tAnatomy structure of the eye /$rJuan Tapia --$g8.3.$tFeature extraction /$rJuan Tapia --$g8.4.$tState of the art /$rJuan Tapia --$g8.5.$tDatabases /$rJuan Tapia --$g8.5.1.$tBioSecure multimodal database /$rJuan Tapia --$g8.5.2.$tGender from iris dataset (ND-GFI) /$rJuan Tapia --$g8.6.$tFeature selection /$rJuan Tapia --$g8.7.$tResearch trends and challenges /$rJuan Tapia --$g8.7.1.$tSegmentation /$rJuan Tapia --$g8.7.2.$tAccuracy /$rJuan Tapia --$g8.7.3.$tFragile bits /$rJuan Tapia --$g8.7.4.$tSensors /$rJuan Tapia --$g8.7.5.$tMakeup /$rJuan Tapia --$g8.8.$tConcluding remarks /$rJuan Tapia --$tAcknowledgments /$rJuan Tapia --$tReferences /$rJuan Tapia --$g9.$tPeriocular-based soft biometric classification /$rJuan Tapia --$g9.1.$tIntroduction /$rDamon L. Woodard /$rKalaivani Sundararajan /$rNicole Tobias /$rJamie Lyle --$g9.2.$tApproach /$rDamon L. Woodard /$rJamie Lyle /$rNicole Tobias /$rKalaivani Sundararajan --$g9.2.1.$tData /$rNicole Tobias /$rKalaivani Sundararajan /$rDamon L. Woodard /$rJamie Lyle --$g9.2.2.$tPreprocessing /$rDamon L. Woodard /$rJamie Lyle /$rNicole Tobias /$rKalaivani Sundararajan --$g9.2.3.$tFeature representations /$rDamon L. Woodard /$rKalaivani Sundararajan /$rNicole Tobias /$rJamie Lyle --$g9.2.4.$tClassification /$rDamon L. Woodard /$rKalaivani Sundararajan /$rJamie Lyle /$rNicole Tobias --$g9.3.$tExperiment results /$rDamon L. Woodard /$rNicole Tobias /$rKalaivani Sundararajan /$rJamie Lyle --$g9.3.1.$tExperiment protocol /$rDamon L. Woodard /$rKalaivani Sundararajan /$rJamie Lyle /$rNicole Tobias --$g9.3.2.$tGender classification /$rDamon L. Woodard /$rKalaivani Sundararajan /$rNicole Tobias /$rJamie Lyle --$g9.3.3.$tEthnicity classification /$rDamon L. Woodard /$rKalaivani Sundararajan /$rJamie Lyle /$rNicole Tobias.
505 00 $gNote continued:$g9.3.4.$tGender and ethnicity classification /$rNicole Tobias /$rKalaivani Sundararajan /$rDamon L. Woodard /$rJamie Lyle --$g9.4.$tSummary /$rNicole Tobias /$rJamie Lyle /$rDamon L. Woodard /$rKalaivani Sundararajan --$tReferences /$rDamon L. Woodard /$rKalaivani Sundararajan /$rNicole Tobias /$rJamie Lyle --$g10.$tAge predictive biometrics: predicting age from iris characteristics /$rDamon L.
505 00 $rWoodard /$rKalaivani Sundararajan /$rNicole Tobias /$rJamie Lyle --$g10.1.$tIntroduction /$rMarjory Da Costa-Abreu /$rMeryem Erbilek /$rMichael Fairhurst --$g10.2.$tBackground discussion and related studies /$rMarjory Da Costa-Abreu /$rMichael Fairhurst /$rMeryem Erbilek --$g10.3.$tPredicting age in diverse scenarios /$rMichael Fairhurst /$rMarjory Da Costa-Abreu /$rMeryem Erbilek --$g10.4.$tExperimental infrastructure for iris-based predictive biometrics /$rMarjory Da Costa-Abreu /$rMeryem Erbilek /$rMichael Fairhurst --$g10.5.$tExperimental analysis of individual classification systems for iris-based predictive biometrics /$rMarjory Da Costa-Abreu /$rMichael Fairhurst /$rMeryem Erbilek --$g10.6.$tExperimental analysis of iris-based multiclassifier systems /$rMarjory Da Costa-Abreu /$rMichael Fairhurst /$rMeryem Erbilek --$g10.7.$tExperimental analysis of multiagent intelligent systems for iris-based predictive biometrics /$rMarjory Da Costa-Abreu /$rMichael Fairhurst /$rMeryem Erbilek --$g10.8.$tDiscussion /$rMarjory Da Costa-Abreu /$rMichael Fairhurst /$rMeryem Erbilek --$g10.9.$tExperimental analysis of multimodal iris-based predictive systems /$rMichael Fairhurst /$rMarjory Da Costa-Abreu /$rMeryem Erbilek --$g10.10.$tFinal remarks /$rMarjory Da Costa-Abreu /$rMichael Fairhurst /$rMeryem Erbilek --$tReferences /$rMarjory Da Costa-Abreu /$rMeryem Erbilek /$rMichael Fairhurst --$g11.$tPresentation attack detection in iris recognition /$rMarjory Da Costa-Abreu /$rMeryem Erbilek /$rMichael Fairhurst --$g11.1.$tIntroduction /$rMarta Gomez-Barrero /$rJavier Galbally --$g11.2.$tPresentation attacks in iris recognition /$rMarta Gomez-Barrero /$rJavier Galbally --$g11.3.$tPresentation attack detection in iris recognition /$rMarta Gomez-Barrero /$rJavier Galbally --$g11.3.1.$tSensor-level approaches /$rMarta Gomez-Barrero /$rJavier Galbally --$g11.3.2.$tFeature-level approaches /$rMarta Gomez-Barrero /$rJavier Galbally --$g11.4.$tEvaluation of presentation attack detection methods /$rMarta Gomez-Barrero /$rJavier Galbally --$g11.5.$tConclusion /$rMarta Gomez-Barrero /$rJavier Galbally --$tReferences /$rMarta Gomez-Barrero /$rJavier Galbally --$g12.$tContact lens detection in iris images /$rMarta Gomez-Barrero /$rJavier Galbally --$g12.1.$tIntroduction /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.2.$tLiterature review on contact lens detection /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.2.1.$tTextured contact lens detection /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.2.2.$tClassification of contact lens type /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.3.$tCase study: generalised software-based textured contact lens detection /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.3.1.$tPre-processing /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.3.2.$tTexture description /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.3.3.$tExperimental analysis /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.4.$tDiscussion /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.4.1.$tFurther work on generalised textured contact lens detection /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.4.2.$trole of pre-processing in contact lens detection /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g12.4.3.$tOn the evaluation of contact lens detection algorithms /$rMatti Pietikiiinen /$rAbdenour Hadid /$rJukka Komulainen --$g12.5.$tConclusions /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$tAcknowledgement /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$tReferences /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g13.$tSoftware attacks on iris recognition systems /$rJukka Komulainen /$rMatti Pietikiiinen /$rAbdenour Hadid --$g13.1.$tIntroduction /$rMarta Gomez-Barrero /$rJavier Galbally --$g13.2.$tHill-climbing based attacks /$rJavier Galbally /$rMarta Gomez-Barrero --$g13.3.$tSynthetic iris generation /$rJavier Galbally /$rMarta Gomez-Barrero --$g13.3.1.$tFalse acceptance attacks based on fully synthetic iris /$rJavier Galbally /$rMarta Gomez-Barrero --$g13.3.2.$tInverse biometrics attacks /$rJavier Galbally /$rMarta Gomez-Barrero --$g13.4.$tSoftware attacks on biometric template protection schemes /$rJavier Galbally /$rMarta Gomez-Barrero --$g13.4.1.$tStolen key-inversion attacks /$rJavier Galbally /$rMarta Gomez-Barrero --$g13.4.2.$tAttacks via record multiplicity /$rJavier Galbally /$rMarta Gomez-Barrero --$g13.5.$tCountermeasures to software attacks /$rJavier Galbally /$rMarta Gomez-Barrero --$g13.6.$tConclusions /$rJavier Galbally /$rMarta Gomez-Barrero --$tReferences /$rJavier Galbally /$rMarta Gomez-Barrero --$g14.$tIris biometric template protection /$rJavier Galbally /$rMarta Gomez-Barrero --$g14.1.$tIntroduction /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.2.$tIris template protection schemes /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.2.1.$tIris-biometric cryptosystems /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.2.2.$tCancelable iris biometrics /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.3.$tImplementation of iris template protection schemes /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.3.1.$tIris fuzzy vault /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.3.2.$tBin-combo for iris-codes /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.4.$tExperimental evaluations /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.4.1.$tPerformance evaluation /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.4.2.$tDiscussion /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g14.5.$tSummary and research directions /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$tReferences /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g15.$tPrivacy-preserving distance computation for IrisCodes /$rChristian Rathgeb /$rChristoph Busch /$rJohannes Wagner --$g15.1.$tIntroduction /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.2.$tSecure distance computation in the semi-honest model /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.2.1.$tOblivious transfer /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.2.2.$tYao's garbled circuits /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.2.3.$tGSHADE in the semi-honest model /$rJulien Bringer /$rHerve Chabanne /$rConstance Morel --$g15.2.4.$tPrivacy-preserving distance computation for IrisCodes in the semi-honest model /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.3.$tSecure distance computation in the malicious model /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.3.1.$tYao's garbled circuits in the malicious setting /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.3.2.$tGSHADE in the malicious setting /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.3.3.$tPrivacy-preserving distance computation for IrisCodes in the malicious model /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.4.$tApplication to other iris representations /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g15.5.$tConclusion /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$tAcknowledgments /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$tReferences /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g16.$tIdentifying iris sensors from iris images /$rJulien Bringer /$rConstance Morel /$rHerve Chabanne --$g16.1.$tTechniques for sensor identification/dataset classification /$rLuca Debiasi /$rAndreas Uhl /$rChristof Kauba --$g16.1.1.$tPRNU-based sensor identification (PSI) /$rLuca Debiasi /$rAndreas Uhl /$rChristof Kauba --$g16.1.2.$tIris texture classification (ITC) /$rLuca.
505 00 $rDebiasi /$rAndreas Uhl /$rChristof Kauba --$g16.2.$tDatasets /$rLuca Debiasi /$rAndreas Uhl /$rChristof Kauba --$g16.3.$tExperimental setup /$rLuca Debiasi /$rAndreas Uhl /$rChristof Kauba --$g16.4.$tExperimental results /$rLuca Debiasi /$rAndreas Uhl /$rChristof Kauba --$g16.5.$tPractical discussion /$rLuca Debiasi /$rAndreas Uhl /$rChristof Kauba --$g16.6.$tConclusion /$rLuca Debiasi /$rAndreas Uhl /$rChristof Kauba --$tReferences /$rLuca Debiasi /$rAndreas Uhl /$rChristof Kauba --$g17.$tMatching iris images against face images using a joint dictionary-based sparse representation scheme /$rChristof Kauba /$rLuca Debiasi /$rAndreas Uhl --$g17.1.$tIntroduction /$rArun Ross /$rRaghavender Jillela --$g17.2.$tDatabase /$rArun Ross /$rRaghavender Jillela --$g17.2.1.$tChallenges /$rArun Ross /$rRaghavender Jillela --$g17.3.$tOutline of experiments /$rArun Ross /$rRaghavender Jillela --$g17.4.$tIris recognition /$rArun Ross /$rRaghavender Jillela --$g17.4.1.$tOpen source algorithm /$rArun Ross /$rRaghavender Jillela --$g17.4.2.$tCommercial algorithm /$rArun Ross /$rRaghavender Jillela --$g17.5.$tOcular recognition /$rArun Ross /$rRaghavender Jillela --$g17.5.1.$tBaseline-local binary patterns /$rRaghavender Jillela /$rArun Ross --$g17.5.2.$tNormalized gradient correlation /$rArun Ross /$rRaghavender Jillela --$g17.6.$tOcular matching using joint dictionary approach /$rArun Ross /$rRaghavender Jillela.
505 00 $gNote continued:$g17.6.1.$tSparse representation framework /$rArun Ross /$rRaghavender Jillela --$g17.6.2.$tJoint dictionary approach /$rArun Ross /$rRaghavender Jillela --$g17.6.3.$tDictionary learning and matching /$rArun Ross /$rRaghavender Jillela --$g17.7.$tComputational details /$rArun Ross /$rRaghavender Jillela --$g17.8.$tScore-level fusion /$rArun Ross /$rRaghavender Jillela --$g17.9.$tSummary /$rArun Ross /$rRaghavender Jillela --$tReferences /$rArun Ross /$rRaghavender Jillela --$g18.$tIris biometrics for embedded systems /$rArun Ross /$rRaghavender Jillela --$g18.1.$tIntroduction to embedded systems /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.2.$tDesign strategies for developing embedded systems /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.2.1.$tGeneral architecture of an embedded system /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.2.2.$tArchitecture alternatives /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.3.$tBiometric requirements for embedded systems /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.3.1.$tFunctional requirements /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.3.2.$tSecurity requirements /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.4.$tIris biometrics analysis for embedded systems /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.4.1.$tData capture /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.4.2.$tPreprocessing /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.4.3.$tFeature extraction /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.4.4.$tComparison /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.5.$tExisting implementations /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.5.1.$tCustom hardware-FPGA /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.5.2.$tSoftware implementations /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g18.6.$tConclusions /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$tReferences /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g19.$tMobile iris recognition /$rRaul Sanchez-Reillo /$rJudith Liu-Jimene --$g19.1.$tBackground /$rTakashi Shinzaki /$rAkira Yonenaga --$g19.2.$tMobile iris authentication /$rTakashi Shinzaki /$rAkira Yonenaga --$g19.3.$tTechnologies for the future /$rTakashi Shinzaki /$rAkira Yonenaga --$g19.4.$tSummary /$rTakashi Shinzaki /$rAkira Yonenaga --$tReferences /$rTakashi Shinzaki /$rAkira Yonenaga --$g20.$tFuture trends in iris recognition: an industry perspective /$rTakashi Shinzaki /$rAkira Yonenaga --$g20.1.$tCustomer requirements /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.1.1.$tRobustness /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.1.2.$tPerformance /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.1.3.$tUsability /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.1.4.$tChoosing a modality /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.2.$tDevelopment process /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.2.1.$tBias and variability /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.2.2.$tParameter optimisation /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.2.3.$tEvaluation and tools /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.3.$tFuture trends and challenges /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.3.1.$tSensor-related trends /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.3.2.$tPresentation attack detection /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.3.3.$tDeep learning /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.3.4.$tStandards /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$g20.4.$tSummary /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$tAcknowledgement /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim --$tReferences /$rDaniel Hartung /$rGunther Mull /$rSven Utcke /$rJi-Young Lim.
650 0 $aBiometric identification.
650 6 $aIdentification biométrique.
650 7 $aCOMPUTERS$xGeneral.$2bisacsh
650 7 $aBiometric identification.$2fast$0(OCoLC)fst00832607
650 7 $aage issues.$2inspect
650 7 $aauthorisation.$2inspect
650 7 $adata privacy.$2inspect
650 7 $adigital forensics.$2inspect
650 7 $aembedded systems.$2inspect
650 7 $agender issues.$2inspect
650 7 $aimage classification.$2inspect
650 7 $aimage matching.$2inspect
650 7 $aimage segmentation.$2inspect
650 7 $ainfrared imaging.$2inspect
650 7 $airis recognition.$2inspect
655 4 $aElectronic books.
700 1 $aRathgeb, Christian,$eeditor.
700 1 $aBusch, Christoph,$eeditor.
776 08 $iPrint version:$tIris and periocular biometric recognition.$dStevenage, UNKNOWN : The Institution of Engineering and Technology, 2017$z9781785611681$z1785611682
830 0 $aIET security series ;$v5.
830 0 $aIET book series on advances in biometrics.
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio13726080$zACADEMIC - Biochemistry, Biology & Biotechnology
852 8 $blweb$hEBOOKS