You are previewing Research Developments in Biometrics and Video Processing Techniques.
O'Reilly logo
Research Developments in Biometrics and Video Processing Techniques

Book Description

The advancement of security technologies has allowed information systems to store more crucial and sensitive data. With these advancements, organizations turn to physiological and behavioral methods of identification in order to guard against unwanted intrusion. Research Developments in Biometrics and Video Processing Techniques investigates advanced techniques in user identification and security, including retinal, facial, and finger print scans as well as signature and voice authentication models. Through its in-depth examination of computer vision applications and other biometric security technologies, this reference volume will provide researchers, engineers, developers, and students with insight into the latest research on enhanced security systems design and development.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  6. Preface
    1. SCHOLARLY VALUE, POTENTIAL CONTRIBUTION/IMPACT, AND PURPOSE
    2. POTENTIAL USES/INTENDED AUDIENCE
    3. ORGANIZATION OF THE BOOK
  7. Acknowledgment
  8. Section 1: Biometrics and Security Techniques
    1. Chapter 1: Thermal Human Face Recognition for Biometric Security System
      1. ABSTRACT
      2. INTRODUCTION
      3. FACE RECOGNITION
      4. CHARACTERISTIC OF THERMAL IMAGES
      5. THERMAL EMISSION
      6. CHOICE OF INFRARED BAND
      7. SOME OF THE ADVANTAGES OF THERMAL FACE RECOGNITION
      8. SOME CRITICAL OBSERVATION ON THERMAL PATTERN
      9. A BRIEF REVIEW OF LITERATURE ON THERMAL FACE RECOGNITION
      10. AN APPROACH FOR FACE RECOGNITION BASED ON THERMAL INFRARED IMAGES
      11. FUTURE RESEARCH DIRECTIONS
      12. CONCLUSION
      13. ACKNOWLEDGMENT
    2. Chapter 2: Multimodal Biometrics Recognition for Newborns
      1. ABSTRACT
      2. INTRODUCTION
      3. BIOMETRIC SYSTEM
      4. BIOMETRIC TRAITS
      5. LIMITATIONS OF UNIMODAL BIOMETRICS
      6. MULTI-BIOMETRIC
      7. MAJOR BENEFITS OF MULTI-BIOMETRICS
      8. WHY MULTIMODAL BIOMETRIC?
      9. MOTIVATION
      10. RELATED WORK
      11. RECOGNITION OF NEWBORN USING FACE AND SOFT BIOMETRIC DATA
      12. FRAME WORK FOR INTEGRATION OF FACE AND SOFT-BIOMETRIC INFORMATION
      13. RECOGNITION OF NEWBORN USING EAR AND SOFT BIOMETRIC
      14. FRAME WORK FOR FUSION OF EAR AND SOFT-BIOMETRIC INFORMATION
      15. RECOGNITION OF NEWBORN USING FACE AND EAR
      16. FUSION OF FACE AND EAR
      17. EXPERIMENTAL RESULTS
      18. CONCLUSION
      19. FUTURE RESEARCH DIRECTIONS
    3. Chapter 3: Biometric Authentication Based on Hand Vein Pattern
      1. ABSTRACT
      2. INTRODUCTION
      3. SYSTEM OVERVIEW AND RELATED WORK
      4. DYNAMIC ROI EXTRACTION
      5. IMAGE ENHANCEMENT AND VEIN PATTERN EXTRACTION
      6. FEATURE EXTRACTION
      7. MATCHING
      8. EXPERIMENTAL RESULTS AND DISCUSSION
      9. CONCLUSION AND FUTURE WORK
    4. Chapter 4: Securing Biometrics Using Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY AND AUTHENTICATION OF BIOMETRIC DATA
      4. INTRODUCTION TO FINGERPRINT IMAGES
      5. INTRODUCTION TO DIGITAL WATERMARKING
      6. INTRODUCTION TO PARTICLE SWARM OPTIMIZATION
      7. LITERATURE SURVEY
      8. PSO BASED WATERMARKING FOR SECURING FINGERPRINT IMAGES
      9. EXPERIMENTAL RESULTS AND ANALYSIS
      10. CONCLUSION
      11. FUTURE RESEARCH DIRECTIONS
  9. Section 2: Video Processing
    1. Chapter 5: Stereo Vision-Based Object Matching, Detection, and Tracking
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. STEREO VISION-BASED OBJECT MATCHING
      5. STEREO VISION-BASED OBJECT DETECTION
      6. STEREO VISION-BASED OBJECT TRACKING
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    2. Chapter 6: Feature-Based Affine Motion Estimation for Superresolution of a Region of Interest
      1. ABSTRACT
      2. INTRODUCTION
      3. PROPOSED POCS-BASED SR ALGORITHM OF AN ROI
      4. EXPERIMENTAL RESULTS AND DISCUSSIONS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    3. Chapter 7: Daubechies Complex Wavelet-Based Computer Vision Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. DAUBECHIES COMPLEX WAVELET TRANSFORM
      4. PROPERTIES OF DAUBECHIES COMPLEX WAVELET TRANSFORM
      5. MOVING OBJECT SEGMENTATION
      6. SHADOW DETECTION AND REMOVAL
      7. CONCLUSION
      8. FUTURE RESEARCH DIRECTIONS
    4. Chapter 8: Application of Computer Vision Techniques for Exploiting New Video Coding Mechanisms
      1. ABSTRACT
      2. INTRODUCTION
      3. COMPUTER VISION VS. VIDEO CODING
      4. ENABLING USER CONTENT CUSTOMIZATION AND AUGMENTATION
      5. CONTENT AUGMENTATION THROUGH HALLUCINATING APPROACHES
      6. CONCLUSION
      7. FUTURE DIRECTIONS FOR RESEARCH
    5. Chapter 9: Recognition of Humans and Their Activities for Video Surveillance
      1. ABSTRACT
      2. INTRODUCTION
      3. MOTIVATION FOR HUMAN ACTIVITY RECOGNITION
      4. LITERATURE REVIEW OF RECOGNITION ALGORITHMS
      5. MOTIVATION OF OUR APPROACH AND OTHER RELATED WORK
      6. CONCLUSION AND DISCUSSION
      7. FUTURE RESEARCH DIRECTIONS
    6. Chapter 10: Video Authentication
      1. ABSTRACT
      2. INTRODUCTION
      3. MOTIVATION BEHIND VIDEO AUTHENTICATION
      4. CHALLENGING SCENARIOS FOR VIDEO AUTHENTICATION
      5. VIDEO TAMPERING
      6. VIDEO TAMPERING ATTACKS
      7. OBJECT REMOVAL ATTACK
      8. OBJECT ADDITION ATTACK
      9. OBJECT MODIFICATION ATTACK
      10. FRAME ADDITION ATTACK
      11. FRAME REMOVAL ATTACK
      12. FRAME SHUFFLING ATTACK
      13. AUTHENTICATION TECHNIQUES
      14. CLASSIFICATION OF AUTHENTICATION TECHNIQUES
      15. INTELLIGENT TECHNIQUES
      16. OTHER AUTHENTICATION TECHNIQUES
      17. LIMITATIONS OF EXISTING VIDEO AUTHENTICATION TECHNIQUES
      18. PROPOSED METHODOLOGY
      19. SUPPORT VECTOR MACHINE
      20. PROPOSED VIDEO AUTHENTICATION ALGORITHM
      21. SVM LEARNING
      22. TAMPER DETECTION AND CLASSIFICATION
      23. EXPERIMENTAL RESULTS AND DISCUSSION
      24. RESULTS FOR FRAME REMOVAL ATTACK
      25. RESULTS FOR FRAME ADDITION ATTACK
      26. RESULTS FOR SPATIAL TAMPERING ATTACKS
      27. VALIDATION OF PROPOSED ALGORITHM
      28. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
  10. Compilation of References
  11. About the Contributors