Breakthroughs in Digital Biometrics and Forensics

دانلود کتاب Breakthroughs in Digital Biometrics and Forensics

54000 تومان موجود

کتاب پیشرفت در بیومتریک دیجیتال و پزشکی قانونی نسخه زبان اصلی

دانلود کتاب پیشرفت در بیومتریک دیجیتال و پزشکی قانونی بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 4


توضیحاتی در مورد کتاب Breakthroughs in Digital Biometrics and Forensics

نام کتاب : Breakthroughs in Digital Biometrics and Forensics
عنوان ترجمه شده به فارسی : پیشرفت در بیومتریک دیجیتال و پزشکی قانونی
سری :
نویسندگان : , ,
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 418 [419]
ISBN (شابک) : 3031107055 , 9783031107054
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 12 Mb



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.

توضیحاتی در مورد کتاب :


این کتاب بر روی طیف گسترده ای از پیشرفت های مرتبط با بیومتریک دیجیتال و پزشکی قانونی تمرکز دارد. نویسندگان مفاهیم، ​​تکنیک‌ها، روش‌ها، رویکردها و روندهای مورد نیاز متخصصان و مربیان امنیت سایبری را برای به روز نگه داشتن دانش بیومتریک و پزشکی قانونی خود معرفی می‌کنند. علاوه بر این، این کتاب نگاهی اجمالی به مسیرهای آینده که در آن تکنیک‌ها، سیاست‌ها، کاربردها و نظریه‌های بیومتریک و پزشکی قانونی هدایت می‌شوند، ارائه می‌کند. موضوعات شامل بیومتریک چندوجهی، بیومتریک نرم، بیومتریک موبایل، بیومتریک وسیله نقلیه، پزشکی قانونی خودرو، تأیید صحت محتوای دیجیتال، شناسایی افراد، بررسی جرایم سایبری مبتنی بر بیومتریک و موارد دیگر است. این کتاب مجموعه‌ای غنی از دست‌نوشته‌هایی است که با دقت انتخاب و بررسی شده‌اند که توسط کارشناسان مختلف بیومتریک دیجیتال و پزشکی قانونی در زمینه‌های ذکر شده نوشته شده و توسط محققان و متخصصان برجسته بیومتریک و پزشکی قانونی ویرایش شده است.

فهرست مطالب :


Preface Acknowledgments Contents About the Editors Part I Multimodal Biometrics Biometric Cryptography 1 Introduction 2 Iris Biometrics 2.1 Biometric Authentication 2.2 Iris Acquisition 2.3 Iris Pre-processing 2.4 Iris Feature Extraction 2.5 Error-Correcting Codes 3 Biometric Cryptography 3.1 Biometric Key Binding 3.1.1 Fuzzy Commitment 3.1.2 Fuzzy Vault 3.2 Biometric Key Generation 3.2.1 Secure Sketch and Fuzzy Extractor 3.2.2 Private Template Scheme 3.2.3 Quantization Scheme 3.3 Performance Evaluation 4 Experimental Results 4.1 Experimental System 4.2 Pre-processing and Feature Extraction 4.3 Public and Private Key Generation 4.3.1 Method 1: Quantization Scheme 4.3.2 Method 2: Fuzzy Extractors 4.3.3 Method 3: Private Scheme template 4.4 Dataset 4.5 Test Functions 4.5.1 Test 1: Quantization Scheme 4.5.2 Test 2: Fuzzy Extractor 4.5.3 Test 3: Private Template Scheme 4.6 Results 5 Conclusion References Multimodal Biometrics: For Authorisation and Authentication 1 Introduction 2 Shortcomings of Unimodal Biometrics 3 Biometric Solutions for Multimodal Security Solutions 4 Fingerprint Sensing 4.1 Fingerprint Sensors Technologies (How They Work) 4.2 How It Works 4.3 How Does Facial Recognition Work? 5 Performance of Biometrics 6 Multimodal Biometric Systems 7 Multimodal Biometric Systems Integration Scenarios 8 Multiple Classifier Systems (mcs) Pattern Recognition 9 Classification Fusion in Multimodal Biometric Systems 10 Multimodal Biometrics Fusion Levels 10.1 Pre-classification 10.2 Post-classification 11 Multimodal Biometrics: A Secure Process 11.1 The Case of a Multimodal Abis (Automated Biometric Identification System) 11.2 Use Case: How Multimodal Biometrics Aids in Digital Identity and Security (the Lebanese Passport) References Data Fusion in Multimodal Biometry 1 Introduction 2 Data Fusion in Multimodal Biometric Systems Design 2.1 Multimodal Biometric Systems: Design Issues 2.1.1 Types of Multimodal Biometric Systems: Architectures and Data Fusion Scenarios 2.1.2 Operation Modes for Multimodal Biometric Systems 2.2 Typical Methods for Data Fusion in Multimodal Systems Design 2.2.1 Pre-Classification (Pre-Mapping) Biometric Data Fusion 2.2.2 Middle-Mapping Biometric Data Fusion 2.2.3 Post-Classification (Post-Mapping) Biometric Data Fusion 2.2.4 Hybrid Biometric Data Fusion Methods. Case Studies for the Feature-Level Fusion 3 Conclusions References A Glass Case of Emotion: Identity, Motion Sensors, and Your Smartphone 1 Introduction 2 Identification and Authentication 2.1 User Identification 2.2 Authentication 2.3 Continuous Authentication 3 Behavioural Biometrics 4 Keystroke Dynamics 5 Identification Ethics 6 Accelerometers and Gyroscopes 6.1 Accelerometers 6.2 Gyroscopes 6.3 Combining Accelerometers and Gyroscopes 7 Identification and Authentication Utilising Keystroke Dynamic Inference 8 Summary References Part II Forensics Analysis and Cybercrime Investigation Digital Forensics Analysis in NVMe SSDs inside USB EnclosureAdapters 1 Introduction 2 Terminology 3 Related Work 4 Experimental Study 4.1 Experimental Setup 4.2 Specifics of SSDs 4.3 Methodology 4.3.1 Experiment Initiation 4.3.2 Case Scenario: TRIM ON from Windows 10 Operating System with the USB WriteBlocker 4.3.3 Case Scenario: TRIM OFF from Windows 10 Operating System with the USB WriteBlocker 5 Experimental Results Analysis 5.1 Samsung and Seagate TRIM ON Analysis 5.2 Samsung and Seagate TRIM OFF Analysis 5.3 Hash Value Analysis 6 Conclusion and Future Work References The Digital Forensic Approach to eDiscovery 1 Introduction 2 Importance of eDiscovery 3 eDiscovery and Digital Forensic 4 eDiscovery Versus Digital Forensics 5 Application of eDiscovery 5.1 Application of eDiscovery in the Healthcare Sector 5.2 Application of eDiscovery in a Corporation 5.3 Application of eDiscovery in Financial Services 5.4 Application of eDiscovery in Educational Institution 5.5 Artificial Intelligence (AI) and eDiscovery 5.6 How Has eDiscovery Helped in Digital Forensic Crime Investigation? 5.7 eDiscovery Tools for Digital Forensic 5.7.1 Logikcull: eDiscovery Tool 6 Conclusion References Handwriting Analysis: Applications in Person Identificationand Forensic 1 Introduction 2 Overview of a General Person Identification Framework 3 Related Works 3.1 Offline Methods 3.1.1 Traditional Methods 3.1.2 Deep Learning Methods 3.2 Online Methods 3.2.1 Traditional Methods 3.2.2 Deep Learning Methods 4 Metrics and Datasets 5 Discussions and Remarks 6 Conclusion References Developing a Scalpel and Foremost Graphical User Interface 1 Introduction 1.1 Motivation for Research 1.2 Research Objectives 2 Background 2.1 Why Use Linux for Computer Forensics 2.2 What Is Kali Linux 3 Related Work 4 Research Methodology 4.1 Design Strategy 4.2 Proof of Concept 4.3 Proof of Performance 5 Discussion and Analysis 5.1 Development and Design 5.1.1 Development Tools and Environment 5.1.2 Conceptual Test 5.1.3 GUI Design and Development 5.2 Data Recovery Results 5.2.1 File System Analysis 5.2.2 Clone Tool Analysis 5.2.3 CLI Analysis 5.3 Design Results 5.3.1 Usability and Functionality 5.3.2 Graphical Interface Versus Command Line 6 Conclusions 7 Limitations and Future Work References Windows Prefetch Forensics 1 Introduction 2 Related Work 3 Experimental Study and Analysis 3.1 Types of Prefetching 3.2 Prefetch Storage Location 3.3 Prefetch Naming Scheme 3.4 Prefetch Hash Algorithm Generation Steps 3.5 Configuration 3.6 Forensics Importance of Prefetch Files 3.7 Contents of Prefetch Files 3.8 Signature of Prefetch Files 3.9 Prefetch File Header 3.10 Operating System Version Based on Prefetch Files 3.11 File Information Details from Prefetch File 3.12 Forensics Information in Sections C, D, and F of Prefetch Files 3.12.1 Section C 3.12.2 Section D and Section F 3.13 Tools for Comparative Forensics Prefetch Analysis 4 Conclusion and Future Work References Part III Biometrics and Artificial Intelligence Biometrics and Artificial Intelligence: Attacks and Challenges 1 Introduction 2 Artificial Intelligence 2.1 Machine and Deep Learning 2.2 AI Models 2.3 Explainable Artificial Intelligence 2.4 Applications 3 Biometrics 4 AI and Biometrics 4.1 Model Configuration 4.2 Protocol Description 5 Attacks 5.1 Artificial Intelligence Attacks 5.2 Generative Adversarial Networks 5.3 Biometric Attacks 5.4 Protocol Attacks 6 Challenges 7 Conclusions References Effectiveness of Periocular Biometric Recognition Under Face Mask Restrictions 1 Introduction 2 Concepts 3 Related Work 4 Approach and Design 5 Implementation 6 Results 7 Conclusion References Ontology-Driven Artificial Intelligence in IoT Forensics 1 Introduction 2 The Emerging Domain of IoT Forensics 2.1 Current IoT Landscape 2.2 Challenges Specific to IoT Forensics 3 The Need for AI and Semantics in IoT Forensics 3.1 Machine Learning-Based Forensic Approaches 3.2 Semantics-Based Forensic Approaches 4 Conclusion References Deep Learning for Palmprint Detection and Alignment on Biometric Systems 1 Introduction 2 Proposed Approach 2.1 Object Detection 2.2 Image Alignment 2.3 Data Labelling 2.4 Model Training 3 Evaluation 3.1 Datasets 3.2 Criteria 3.3 Results 4 Conclusions References A Multifaceted Role of Biometrics in Online Security, Privacy, and Trustworthy Decision Making 1 Introduction 2 Literature Review on Biometric Security and Privacy 2.1 Unimodal and Multimodal Biometric Systems 2.2 Biometrics and Cybersecurity 2.3 Biometrics and Privacy 3 Deep Learning in Biometrics, Cybersecurity, and Privacy 3.1 Deep Learning Methods Overview 3.2 General Architecture of Biometrics System Based on Deep Learning 3.3 Deep Learning in Biometric De-identification and Privacy 4 Biometric Online Security and Cybersecurity 4.1 Role of Handwritten Authorship Recognition in Biometric Online Security 4.2 Role of Psychological and Emotional Characteristics in Biometric Online Security 4.3 Role of Human Aesthetics in Biometric Online Security 4.4 Role of Remote Authentication in Biometric Security 4.5 Role of Trustworthiness of Decision Making in Biometric Online Security 5 Applications and Open Problems 5.1 User Authentication and Access Control 5.2 Robotics 5.3 Medicine and Mental Health 5.4 Games and Virtual Worlds 5.5 Open Problems and Future Research 6 Conclusion References Part IV Ethical, Societal and Educational Implications of Biometrics and Forensics An Escape Game to Find the Owner of a Latent Fingerprint While Learning Biometry 1 Introduction 2 Background 3 Related Work 4 Cryptographic Contents to Play the Game 4.1 Introduction to Cryptography 4.2 Fingerprint Identification 5 Game Design for a Biometry Session 6 The Use of Other Biometric and Forensic Challenges 7 Experimental Results 8 Conclusions and Future Work References Flawed Biometric Rollouts in Emerging Economies: Evidence from Jamaica, Afghanistan, and Kenya 1 Introduction 2 Technodeterminism, Technocolonialism, and Biometrics 3 Case Studies of Biometric Contestation: Jamaica, Afghanistan, and Kenya 3.1 Jamaica and NIDS 3.2 Afghanistan and e-Tazkera 3.3 Kenya and Huduma Namba 4 Conclusion: Lean Governance and the Rise of Statizens References Reinforcing the Importance of Host Forensics for Customer Environments Hosted Using Amazon Web Services and Azure Public Cloud Platforms 1 Introduction 1.1 Security Monitoring 1.2 AWS Security Monitoring 1.3 Azure Security Monitoring 1.4 Third-Party Option 2 Academic Review 3 Capital One Case Study 3.1 Analysis 4 Back to the Fundamentals 4.1 Key Considerations 4.2 Live Forensics 4.3 Dead Forensics 4.3.1 Approach for AWS 4.3.2 Approach for Azure 5 Conclusion References Impact of Media Forensics and Deepfake in Society 1 Introduction 2 Creation of Fake Content 3 Model-Based Detection Techniques 3.1 A Sensor-Based and Model-Based Approach for a Single Class 3.2 Blind Techniques 3.3 Customized Features Using Supervised Methods 4 Approaches Based on Deep Learning 4.1 Training on One Class 4.2 Supervised CNNs Looking for Particular Clues 4.3 General Supervised CNNs 4.4 Discussion 5 Detection of Deepfakes 5.1 Face Modification on Video 5.2 GAN-Generated Images 6 Datasets 6.1 Printed and Scanned Dataset 6.2 Videos 6.3 Original Content 6.4 Video Conferencing 7 Counter-Forensics 7.1 Model for Counter-Forensics 8 Fusion 9 Conclusion 10 Open Issues References Index

توضیحاتی در مورد کتاب به زبان اصلی :


​This book focuses on a wide range of breakthroughs related to digital biometrics and forensics. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their biometrics and forensics knowledge. Furthermore, the book provides a glimpse of future directions where biometrics and forensics techniques, policies, applications, and theories are headed. Topics include multimodal biometrics, soft biometrics, mobile biometrics, vehicle biometrics, vehicle forensics, integrity verification of digital content, people identification, biometric-based cybercrime investigation, among others. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse digital biometrics and forensics experts in the listed fields and edited by prominent biometrics and forensics researchers and specialists.



پست ها تصادفی