Torrent details for "Das R. Biometric Technology and Authentication. Biocryptography.…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
27.8 MB
Info Hash:
165A8FF9456483AB6679B249A119BFA4522D8936
Added By:
Added:
June 19, 2025, 1:04 p.m.
Stats:
|
(Last updated: June 19, 2025, 1:05 p.m.)
| File | Size |
|---|---|
| ['Das R. Biometric Technology and Authentication. Biocryptography...2ed 2025.pdf'] | 0 bytes |
Name
DL
Uploader
Size
S/L
Added
-
13.2 MB
[10
/
3]
2024-02-18
| Uploaded by indexFroggy | Size 13.2 MB | Health [ 10 /3 ] | Added 2024-02-18 |
-
11.6 MB
[31
/
2]
2024-10-18
| Uploaded by indexFroggy | Size 11.6 MB | Health [ 31 /2 ] | Added 2024-10-18 |
-
27.8 MB
[41
/
12]
2025-06-19
| Uploaded by andryold1 | Size 27.8 MB | Health [ 41 /12 ] | Added 2025-06-19 |
NOTE
SOURCE: Das R. Biometric Technology and Authentication. Biocryptography...2ed 2025
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Textbook in PDF format This book is an update to the first edition of this book. Some of the updates include newer images and an extensive review as to how both AWS and Microsoft Azure can be used to host a biometrics in the cloud infrastructure, which will be a hot topic going into 2025 and beyond. Finally, the last chapter of this book previews some of the latest trends for biometric technology going into 2025 and beyond. Facial recognition is one of those biometric technologies which most people can associate with. For example, we all have a face, and just like the fingerprint, the face has been used to verify and identify criminals and wanted suspects, as well as terrorists. Probably one of the best examples of facial identification is the photos at the post office, as well as those facial images which are on the wanted portion of the major law enforcement websites. Facial recognition systems of today focus upon on those parts of the face which are not as easily prone to the hurdles just described. These regions of the face include the following The ridges between the eyebrows; The cheekbones; The mouth edges; The distances between the eyes; The width of the nose; The contour and the profile of the jawline; The chin. Preface Introduction to biometrics Physical and behavioral biometrics Biometric project management Biocryptography Biometrics in the cloud
×


