Includes 14 Titles

Biometrics and Surveillance Technologies

Learn more about IGI Global Topic Collections.
In today's globalized society, privacy and security are paramount concerns in both the public and private sectors. This exciting book bundle includes 14 scholarly titles covering topics on continuous authentication, RFID technology, location-based services, spatiotemporal pattern analysis, wearable computing, gaze tracking, and much more. It is well suited for researchers and professionals interested in the practical application of biometric and surveillance technologies, as well as legal analysts and IT specialists interested in protecting the privacy of individuals and corporations.
Release date: November 1, 2011
ISBN13: 9781613504222|EISBN13: 9781613504215

Description

Individuals and corporations go to great lengths to ensure their privacy and security.

The Biometrics and Surveillance Technologies book bundle is a specialized reference compilation that supports research in security technologies. This premier package includes 14 scholarly titles focusing on continuous authentication, RFID technology, location-based services, spatiotemporal pattern analysis, wearable computing, and gaze tracking. These titles represent IGI Global's unique coverage of the impact and effective use of technology in privacy protection and threat detection.

Topics Covered

  • Biometrics
  • Information Security & Privacy
  • Sensor Technologies
  • Ubiquitous & Pervasive Computing

Books Included in this Collection

Gaze Interaction and Applications of Eye Tracking: Advances in Assistive Technologies
Päivi Majaranta (University of Tampere, Finland), Hirotaka Aoki (Tokyo Institute of Technology, Japan), Mick Donegan (The ACE Centre, UK), Dan Witzner Hansen (IT University of Copenhagen, Denmark), John Paulin Hansen (IT University of Copenhagen, Denmark), Aulikki Hyrskykari (University of Tampere, Finland), Kari-Jouko Räihä (University of Tampere, Finland). © 2012. 382 pages.
Recent advances in eye tracking technology will allow for a proliferation of new applications. Improvements in interactive methods using eye movement and gaze control could result in faster and more efficient human computer interfaces, benefitting users with and without disabilities. Gaze Interaction...
Continuous Authentication Using Biometrics: Data, Models, and Metrics
Issa Traore (University of Victoria, Canada), Ahmed Awad E. Ahmed (University of Victoria, Canada). © 2012. 294 pages.
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous...
Advances in Face Image Analysis: Techniques and Technologies
Yu-Jin Zhang (Tsinghua University, China). © 2011. 404 pages.
Video and image analysis of the human face provides a wealth of information about the individual, , including age, behavior, health and profession. With research continually being conducted into multiple applications of this field, a comprehensive and detailed volume of the new advancements of face...
Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection
Ali Serhan Koyuncugil (Capital Markets Board of Turkey, Turkey, and Baskent University, Turkey), Nermin Ozgulbas (Baskent University, Turkey). © 2011. 356 pages.
The modern world is fraught with risk, from natural disasters and terrorist attacks, to financial crises and pandemics. Assessing and planning for these risks can be done with a conventional human-based approach but this often requires large amounts of time and resources. Surveillance Technologies and...
Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices
Christina Akrivopoulou (Aristotle University of Thessaloniki, Greece), Athanasios Psygkas (Yale Law School, USA). © 2011. 402 pages.
In recent years, with rapidly advancing technology and a more globalized culture, the importance of privacy has become paramount. The legal protection of privacy against these new technological threats is a major discussion point in Europe as well as in the United States. Personal Data Privacy and...
Behavioral Biometrics for Human Identification: Intelligent Applications
Liang Wang (University of Bath, United Kingdom), Xin Geng (Southeast University, China). © 2010. 530 pages.
Automatic biometrics recognition techniques are becoming increasingly important in corporate and public security systems and have increased in methods due to rapid field development. Behavioral Biometrics for Human Identification: Intelligent Applications discusses classic behavioral biometrics as well...
Machine Learning for Human Motion Analysis: Theory and Practice
Liang Wang (University of Bath, United Kingdom), Li Cheng (TTO-Chicago, USA), Guoying Zhao (University of Oulu, Finland). © 2010. 318 pages.
With the ubiquitous presence of video data and its increasing importance in a wide range of real-world applications, it is becoming increasingly necessary to automatically analyze and interpret object motions from large quantities of footage. Machine Learning for Human Motion Analysis: Theory and...
Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice
Hai Jin (Huazhong University of Science and Technology, China), Wenbin Jiang (Huazhong University of Science and Technology, China). © 2010. 556 pages.
As wireless sensor networks (WSNs) appear in many promising applications by deployment over various geographical areas such as infrastructure protection, scientific exploration, military surveillance, and smart environments, it is essential for a resource to address their current advancements. The...
Movement-Aware Applications for Sustainable Mobility: Technologies and Approaches
Monica Wachowicz (Wageningen University of Research Centre for Geo-Information, The Netherlands). © 2010. 338 pages.
The ability to communicate with anyone at anytime, anywhere, necessitates a need to provide reliable, resilient, and sustainable applications to support the evolving uses of mobile technologies. Movement-Aware Applications for Sustainable Mobility: Technologies and Approaches focuses on the use of...
Auto-Identification and Ubiquitous Computing Applications
Judith Symonds (AUT University, New Zealand), John Ayoade (American University of Nigeria, Nigeria), David Parry (Auckland University of Technology, New Zealand). © 2009. 350 pages.
There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identification and Ubiquitous Computing Applications : RFID and Smart Technologies for Information Convergence reports on problems related to the primary use of...
Automated Face Analysis: Emerging Technologies and Research
Daijin Kim (Pohang University of Science & Technology, Korea), Jaewon Sung (LG Electronics, Korea). © 2009. 448 pages.
Since research on face recognition began in the 1960's, the field has rapidly widened to automated face analysis including face detection, facial gesture recognition, and facial expression recognition. Automated Face Analysis: Emerging Technologies and Research provides theoretical background to...
Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants
Katina Michael (University of Wollongong, Australia), M.G. Michael (University of Wollongong, Australia). © 2009. 544 pages.
Automatic identification has evolved to use techniques that can identify an object or subject without direct human intervention. Such devices include the bar code, magnetic-stripe, integrated circuit, and biometric and radio-frequency identification. Innovative Automatic Identification & Location-Based...
Localization Algorithms and Strategies for Wireless Sensor Networks: Monitoring and Surveillance Techniques for Target Tracking
Guoqiang Mao (University of Sydney, Australia), Baris Fidan (National ICT Australia and Australian National University, Australia). © 2009. 526 pages.
Wireless localization techniques are an area that has attracted interest from both industry and academia, with self-localization capability providing a highly desirable characteristic of wireless sensor networks. Localization Algorithms and Strategies for Wireless Sensor Networks encompasses the...
Biometric Image Discrimination Technologies: Computational Intelligence and its Applications Series
David Zhang (Hong Kong Polytechnic University, Hong Kong ), Xiao-Yuan Jing (ShenZhen Graduate School of Harbin Institute of Technology, China), Jian Yang (Hong Kong Polytechnic University, Hong Kong). © 2006. 358 pages.
Biometric Image Discrimination Technologies addresses highly relevant issues to many fundamental concerns of both researchers and practitioners of biometric image discrimination (BID) in biometric applications. This book describes the basic concepts necessary for a good understanding of BID and answers...