Biometrics: Concepts, Methodologies, Tools, and Applications
Biometrics: Concepts, Methodologies, Tools, and Applications
Editor: Information Resources Management Association
Publication Year: 2016
Publisher: IGI Global
Single-User Purchase Price:
$2200.00

Unlimited-User Purchase Price:
$3300.00
ISBN: 978-1-5225-0983-7
Category: Technology & Engineering - Technology
Image Count:
732
Book Status: Available
Table of Contents
Biometrics: Concepts, Methodologies, Tools, and Applications is a multi-volume publication highlighting critical topics related to access control, user identification, and surveillance technologies. Featuring emergent research on the issues and challenges in security and privacy, various forms of user authentication, biometric applications to image processing and computer vision, and security applications within the field, this publication is an ideal reference source for researchers, engineers, technology developers, students, and security specialists.
Table of Contents
- Editor-in-Chief
- Associate Editors
- Editorial Advisory Board
- Preface
- Section 1: Fundamental Concepts and Theories
- Chapter 1: Biometric
- ABSTRACT
- BIOMETRICS AND ITS WORK PROCESS
- WHY BIOMETRIC IS SECURE?
- COLLABORATION AND COMBINATION OF CLOUD AND BIOMETRICS
- BIOMETRIC AS AN AUTHENTICATION TO CLOUD SECURITY
- TONGUE AS BIOMETRIC VISUALIZES
- VOICEPRINT BIOMETRIC
- BIOMETRIC INFRASTRUCTURE IN CLOUD
- CHALLENGES AND OBSTACLE
- STANDARDS AND RECOMMENDATIONS
- ADVANTAGES AND DISADVANTAGES OF BIOMETRIC IN CLOUD
- DEPLOYMENT POSSIBILITIES AND EXISTING SOLUTIONS
- CASE STUDIES
- CREDIT CARD ENDORSEMENT USING BIOMETRICS IN CLOUD COMPUTING
- BIOMETRIC ATTENDANCE MANAGEMENT SYSTEM: IMPLEMENTATION ON CLOUD ENVIRONMENT
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 2: Impulse Noise Filtering
- ABSTRACT
- 1. INTRODUCTION
- 2. VARIANTS OF IMPULSE NOISE
- 3. MEDIAN FILTER AS A TOOL OF IMPULSE NOISE REMOVAL
- 4. RECENT TRENDS TOWARDS THE ELIMINATION OF IMPULSE NOISE
- 5. COMPARATIVE ANALYSIS AMONGST DIFFERENT APPROACHES
- 6. FUTURE RESEARCH DIRECTIONS
- 7. CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 3: ECG-Based Biometrics
- ABSTRACT
- INTRODUCTION
- PREVIOUS WORKS
- THE ECG WAVE
- BIOMETRICS
- ECG BIOMETRIC
- FEATURE EXTRACTION FOR ECG BIOMETRIC
- ECG BIOMETRIC FOR CLOUD
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 4: Antimicrobial Consumption and Multidrug Resistant Organisms in Intensive Care Units
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- MECHANISMS OF BACTERIAL RESISTANCE AND GENE DISSEMINATION
- MECHANISMS OF GENE DISSEMINATION
- THE RELATIONSHIP BETWEEN ANTIMICROBIAL CONSUMPTION AND RESISTANCE TO ANTIMICROBIAL THERAPY
- THE ANATOMICAL THERAPEUTIC CHEMICAL CLASSIFICATION (ATC) SYSTEM AND DEFINED DAILY DOSE (DDD)
- FUTURE RESEARCH DIRECTIONS
- WAY FORWARD AND RECOMMENDATION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 5: Biometrics and Data Protection
- ABSTRACT
- INTRODUCTION
- BIOMETRICS
- BIOMETRICS AND DATA PROTECTION
- JURISPRUDENCE FROM THE ECJ
- BIOMETRIC DATA IN THE EMPLOYMENT RELATIONSHIP: ARTICLE 18 OF THE PORTUGUESE LABOUR CODE
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 6: Biomedical Image Processing and Analysis
- ABSTRACT
- INTRODUCTION
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 7: Watermark Embedding for Multiscale Error Diffused Halftone Images by Adopting Visual Cryptography
- ABSTRACT
- 1. INTRODUCTION
- 2. METHODOLOGY
- 3. RESULTS AND DISCUSSION
- 4. CONCLUSION
- REFERENCES
- Chapter 8: Image Mining
- ABSTRACT
- INTRODUCTION
- IMAGE MINING
- CONTENT BASED IMAGE RETRIEVAL
- CONCLUSION AND FUTURE RESEARCH DIRECTIONS
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 9: Swarm Intelligence for Automatic Video Image Contrast Adjustment
- ABSTRACT
- 1. INTRODUCTION
- 2. LITERATURE REVIEW
- 3. CONTRAST ADJUSTMENT
- 4. ARTIFICAL BEE COLONY ALGORITHM
- 5. TEST FUNCTIONS FOR OPTIMIZATION PROBLEMS
- 6. PROPOSED ALGORITHM FOR CONTRAST ADJUSTMENT
- 7. RESULTS AND DISCUSSION
- 8. CONCLUSION
- REFERENCES
- Chapter 10: Biometric Authentication for Cloud Computing
- ABSTRACT
- 1. SECURITY ISSUES IN CLOUD COMPUTING
- 2. HANDLING LARGE SCALE BIOMETRIC DATA USING CLOUD COMPUTING
- 3. REMOTE AUTHENTICATION SCHEMES FOR ENHANCING CLOUD SECURITY
- 4. ORGANIZATIONS PROVIDING CLOUD BASED BIOMETRIC SERVICES
- 5. ISSUES IN INTEGRATING BIOMETRICS WITH CLOUD PLATFORM
- 6. CONCLUSION AND FUTURE SCOPE
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 11: Medical Image Mining Using Fuzzy Connectedness Image Segmentation
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- MAIN FOCUS OF THE CHAPTER
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 12: Computational Intelligence-Based Cell Nuclei Segmentation from Pap Smear Images
- ABSTRACT
- INTRODUCTION
- REVIEW ON EXISTING SEGMENTATION METHODS FOR NUCLEI SEGMENTATION
- THRESHOLD BASED SEGMENTATION
- PAP SMEAR IMAGE SEGMENTATION
- EXPERIMENTAL RESULTS AND DISCUSSION
- SUMMARY
- REFERENCES
- Chapter 13: Learning Algorithms for Anomaly Detection from Images
- ABSTRACT
- 1. INTRODUCTION
- 2. MATHEMATICAL BACKGROUND AND BENCHMARK ALGORITHMS
- 3. PROPOSED ADAPTIVE ALGORITHMS
- 4. EXPERIMENTAL SETUP
- 5. EXPERIMENTAL RESULTS
- 6. CONCLUSION AND FUTURE DIRECTIONS
- REFERENCES
- Chapter 14: A Computational Model for Texture Analysis in Images with Fractional Differential Filter for Texture Detection
- ABSTRACT
- 1. INTRODUCTION
- 2. METHODOLOGY
- 3. THE MODEL PROPOSED FOR TEXTURE ANALYSIS IN IMAGES
- 4. EFFICACY MEASUREMENT BY TEXTURE CLASSIFICATION
- 5. RESULTS AND DISCUSSION
- 6. CONCLUSION
- REFERENCES
- Chapter 15: Biometrics in Cloud Computing
- ABSTRACT
- INTRODUCTION
- BIOMETRIC SERVICE
- BIOMETRIC TECHNIQUES
- OPERATION IN BIOMERIC SYSTEM
- CLOUD ARCHITECTURE
- BIOMETRIC RECOGNITION SYSTEM IN CLOUD
- INTEGRATING BIOMETRIC IN CLOUD
- CASE STUDY
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 16: Theoretical Methods of Images Processing in Optoelectronic Systems
- ABSTRACT
- 1. PURPOSE AND METHODS OF IMPROVING OPTOELECTRONIC SYSTEMS
- 2. FORMATION OF IMAGES IN OPTOELECTRONIC SYSTEMS
- 3. STATISTICAL PROPERTIES OF SIGNALS IN OPTOELECTRONIC SYSTEMS
- 4. IMAGE PROCESSING IN OPTOELECTRONIC SYSTEMS
- 5. CONCLUSION
- REFERENCES
- Chapter 17: Cellular Automata Algorithms for Digital Image Processing
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- TESTING AND RESULTS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Section 2: Tools and Technologies
- Chapter 18: Image Data Mining Based on Wavelet Transform for Visualization of the Unique Characteristics of Image Data
- ABSTRACT
- 1. INTRODUCTION
- 2. A RATIONALE OF IMAGE DATA MINING
- 3. WAVELET TRANSFORM BASED IMAGE DATA MINING
- 4. ANNOTATING THE IMAGE UNIQUE FEATURE MINING AND VISUALIZATION
- 5. CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 19: Online Spatial HIV/AIDS Surveillance and Monitoring System for Nigeria
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- METHODS
- IMPLEMENTATION OF THE DSMS
- DISCUSSION
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 20: Before Smart Phones and Social Media
- ABSTRACT
- INTRODUCTION
- USER-GENERATED IMAGES
- CAMERA PHONES
- IMPLICATIONS OF CAMERA PHONES ON VISUAL DOCUMENTATION
- CAMERA PHONES, SURVEILLANCE, AND SOUSVEILLANCE
- SOUSVEILLANCE: EMPOWERING INDIVIDUALS?
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 21: Image and Video Restoration and Enhancement via Sparse Representation
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- IMAGE/VIDEO DENOISING VIA SPARSE REPRESENTATION
- IMAGE/VIDEO SUPER-RESOLUTION VIA SPARSE REPRESENTATION
- COMPARATIVE STUDIES AND EVALUATION RESULTS
- CONCLUSION AND FUTURE RESEARCH DIRECTIONS
- REFERENCES
- Chapter 22: Technology Studies and the Sociological Debate on Monitoring of Social Interactions
- ABSTRACT
- INTRODUCTION
- SOCIOLOGICAL STUDIES OF TECHNOLOGY
- SOCIAL NETWORKS AND TECHNOLOGIES OF COMMUNICATION
- SOCIAL INTERACTIONS AND HUMAN-TECHNOLOGIES RELATIONS
- TECHNOLOGIES OF SURVEILLANCE AND SOCIETAL CONTROL
- FINAL REMARKS
- REFERENCES
- Chapter 23: Web and Mobile Phone Based Rabies Surveillance System for Humans and Animals in Kilosa District, Tanzania
- ABSTRACT
- BACKGROUND INFORMATION
- METHODOLOGY
- RESULTS AND DISCUSSION
- CONCLUSION
- REFERENCES
- Chapter 24: Cloud-Based Infiltration Detection System for Military Purposes
- ABSTRACT
- INTRODUCTION
- LITERATURE SURVEY ON RELATED RESEARCH
- NECESSITY OF CLOUD-BASED INFILTRATION DETECTION SYSTEM
- TYPES OF CLOUD STORAGE SYSTEMS
- THE PROPOSED FRAMEWORK
- PROCESS OF VIDEO CONTENT ANALYSIS
- OBJECT SEGMENTATION
- OBJECT CLASSIFICATION
- OBJECT TRACKING
- HUMAN ACTIVITY RECOGNITION
- NORMAL AND ABNORMAL ACTIVITY RECOGNITION
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- Chapter 25: A Novel Fuzzy Logic Classifier for Classification and Quality Measurement of Apple Fruit
- ABSTRACT
- 1. INTRODUCTION
- 2. LITERATURE SURVEY
- 3. SYSTEM ARCHITECTURE
- 4. PROPOSED ALGORITHM OF SYSTEM
- 5. FUZZY AS A CLASSIFIER
- 6. RESULT AND DISCUSSION
- 7. CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 26: 3D Imaging Systems for Agricultural Applications
- ABSTRACT
- INTRODUCTION
- 3D USE FOR CROP CHARACTERIZATION
- 3D USE FOR ROOT PHENOTYPING
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 27: Retrieval of Multimedia Information Using Content-Based Image Retrieval (CBIR) Techniques
- ABSTRACT
- INTRODUCTION
- LITERATURE REVIEWS
- MAIN FOCUS OF THE CHAPTER
- FEATURE EXTRACTION OR VISUAL CONTENTS
- MULTIDIMENSIONAL INDEXING
- RETRIEVAL METHOD
- IMAGE RETRIEVAL (IR)
- SEMANTIC GAP
- SENSORY GAP
- QUERY TECHNIQUES FOR CBIR
- IMAGE RETRIEVAL SYSTEM
- APPLICATIONS OF CONTENT-BASED IMAGE RETRIEVAL:
- PERFORMANCE EVALUATION
- FUTURE RESEARCH DIRECTIONS
- CHALLENGES OF CONTENT-BASED IMAGE RETRIEVAL SYSTEM
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 28: SSIM-Based Distortion Estimation for Optimized Video Transmission over Inherently Noisy Channels
- ABSTRACT
- 1. INTRODUCTION
- 2. PROPOSED DISTORTION METRICS
- 3. EXPERIMENTAL RESULTS
- 4. CONCLUSION
- REFERENCES
- Chapter 29: On Visual Information Retrieval Using Multiresolution Techniques for Web Usage Mining Applications
- ABSTRACT
- INTRODUCTION
- CONCLUSION AND FUTURE SCOPE
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 30: An Interactive Tool for Visualizing and Analyzing Spatio-Temporal Data
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- METHODOLOGY
- ANALYSIS AND RESULTS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 31: Mobile GPU Computing Based Filter Bank Convolution for Three-Dimensional Wavelet Transform
- ABSTRACT
- 1. INTRODUCTION
- 2. METHODS
- 3. COMPUTATIONAL RESULTS
- 4. DISCUSSION
- 5. CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 32: Cell Phone Image-Based Plant Disease Classification
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- PATTERN RECOGNITION PIPELINE FOR PLANT DISEASE CLASSIFICATION
- CLASSIFICATION OF WHEAT DISEASE SYMPTOMS
- CLASSIFICATION OF SUGAR BEET DISEASE SYMPTOMS
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 33: iCellFusion
- ABSTRACT
- INTRODUCTION
- METHODS
- RESULTS AND DISCUSSION
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Section 3: Utilization and Application
- Chapter 34: Multiple Description Coding for Multipath Video Streaming
- ABSTRACT
- INTRODUCTION
- MULTIPLE DESCRIPTION VIDEO CODING: A REVIEW
- MD ARCHITECTURES FOR VIDEO ENCODING
- MULTIPLE DESCRIPTION VIDEO STREAMING
- MULTIPLE DESCRIPTION FOR ADVANCED VIDEO CODING
- STREAMING PERFORMANCE OVER LOSSY NETWORKS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 35: Metamorphic Relations Based Test Oracles for Image Processing Applications
- ABSTRACT
- 1. INTRODUCTION
- 2. OVERVIEW
- 4. APPROACH
- 5. IMPLEMENTATION AND EVALUATION
- 6. CONCLUSION
- REFERENCES
- Chapter 36: Application of Fuzzy Logic and Fuzzy Optimization Techniques in Medical Image Processing
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- FUZZY LOGIC AND OPTIMIZATION METHOD
- FUZZY OPTIMIZATION MODEL (FOP)
- FUZZY OPTIMIZATION PROBLEM
- FUZZY OPTIMAL SOLUTION ACHIEVED BY GENETIC ALGORITHM
- FUZZY LOGIC IN IMAGE PROCESSING
- FUZZY PENALTY BASED OPTIMIZATION
- CURRENT APPLICATIONS OF FUZZY LOGIC
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 37: 3D Image Acquisition and Analysis of Range Face Images for Registration and Recognition
- ABSTRACT
- INTRODUCTION
- 3D IMAGE ACQUISITION TECHNIQUES
- FILE FORMATS OF 3D IMAGES
- VISUALIZATION 3D FACE IMAGE
- 3D MESH VIEWING TECHNIQUE
- ANALYSIS OF 3D FACE IMAGES FROM RANGE IMAGE
- HISTOGRAM EQUALIZATION
- CONTRAST STRETCHING
- LITERATURE SURVEY AND DIFFERENT METHODOLOGIES
- LANDMARK DETECTION AND REGISTRATION OF 3D FACE IMAGES
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 38: Wavelet Transform-Based Soft Computational Techniques and Applications in Medical Imaging
- ABSTRACT
- 1. INTRODUCTION
- 2. WAVELET TRANSFORM
- 3. ARTIFICIAL NEURAL NETWORK
- 4. WAVELET NEURAL NETWORK
- 5. APPLICATIONS IN MEDICAL IMAGING
- 6. CONCLUSION
- REFERENCES
- Chapter 39: Using Grid Computing and Satellite Remote Sensing in Evapotranspiration Estimation
- ABSTRACT
- INTRODUCTION
- A CASE STUDY
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 40: Fast Medical Image Segmentation Using Energy-Based Method
- ABSTRACT
- INTRODUCTION
- MAIN FOCUS OF CHAPTER
- SUMMARY
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 41: Wavelet-Based Recognition of Handwritten Characters Using Artificial Neural Network
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- METHODOLOGY OF THE PROPOSED HCR SYSTEM
- PREPROCESSING AND FEATURE EXTRACTION
- CLASSIFICATION AND RECOGNITION
- EXPERIMENTAL RESULTS
- CONCLUSION
- REFERENCES
- Chapter 42: Color Features and Color Spaces Applications to the Automatic Image Annotation
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- COLOR FEATURES
- COLOR SPACES
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION AND DISCUSSION
- NOMENCLATURE
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 43: Wavelets with Application in Image Compression
- ABSTRACT
- INTRODUCTION
- PRELIMINARIES
- BACKGROUND
- SCALING AND WAVELET FUNCTIONS
- WAVELET TRANSFORM ALGORITHM FOR DIGITAL IMAGE
- IMAGE COMPRESSION
- APPLICATION OF WAVELETS IN IMAGE COMPRESSION
- SOME MATLAB COMMANDS AND USER DEFINED FUNCTIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 44: Study of Noise Removal Techniques for Digital Images
- ABSTRACT
- INTRODUCTION
- TYPES OF IMAGE
- IMAGE FILE FORMATS
- TYPES OF NOISE
- IMAGE DENOISING SCHEMES
- PERFORMANCE MEASURES
- IMPLEMENTATION OF VARIOUS DENOISING ALGORITHMS
- RELATED WORKS
- DISCUSSION
- DIRECTIONS FOR FUTURE RESEARCH
- REFERENCES
- Chapter 45: Dynamical Analysis of Drug Efficacy and Mechanism of Action Using GFP Reporters
- ABSTRACT
- INTRODUCTION
- EXPERIMENTAL APPARATUS
- RESULTS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 46: Application of Biomedical Image Processing in Blood Cell Counting Using Hough Transform
- ABSTRACT
- INTRODUCTION
- RELATED WORK AND MOTIVATION
- BLOOD CELLS
- HOUGH TRANSFORM
- METHODOLOGY
- SEGMENTATION OF BLOOD CELL IMAGES USING HOUGH TRANSFORM
- COUNTING
- RESULTS AND DISCUSSION
- CONCLUSION
- REFERENCES
- Chapter 47: A Hybrid Scheme for Breast Cancer Detection Using Intuitionistic Fuzzy Rough Set Technique
- ABSTRACT
- 1. INTRODUCTION
- 2. FOUNDATION OF ROUGH SET
- 3. INTUITIONISTIC FUZZY SET
- 4. PROPOSED DESIGN OF HYBRID SCHEME
- 5. RESULT ANALYSIS AND DISCUSSION
- 6. FURTHER RESEARCH DIRECTIONS
- 7. CONCLUSION
- REFERENCES
- Section 4: Organizational and Social Implications
- Chapter 48: Comparative Analysis of Efficient Platforms
- ABSTRACT
- 1. INTRODUCTION
- 2. RELATED WORK
- 3. ANALYSIS OF PLATFORMS AND COMPUTING TECHNOLOGIES
- 4. COMPARATIVE ANALYSIS OF PROGRAMMING LANGUAGES AND LIBRARIES
- 5. COMPARISON OF TECHNIQUES AND ALGORITHMS FOR DATA PARALLELISM
- 6. DISCUSSION
- REFERENCES
- Chapter 49: Image Quality Assessment and Outliers Filtering in an Image-Based Animal Supervision System
- ABSTRACT
- 1. INTRODUCTION
- 2. MATERIAL AND METHOD
- 3. PREPROCESSING
- 4. COMMON-CAUSE CLUSTERING AND R.V. DEFINITION
- 5. FFR AND RTQS BY NAIVE STRUCTURE
- 6. RESULTS
- 7. DISCUSSION
- REFERENCES
- Chapter 50: Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing
- ABSTRACT
- INTRODUCTION
- DEVELOPMENT OF BIOMETRIC TECHNOLOGY
- COMBINING BIOMETRICS AND CLOUD COMPUTING
- VULNERABILITIES IN BIOMETRIC SECURITY SYSTEMS
- NEW DEVELOPMENTS
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 51: E-Government, E-Surveillance, and Ethical Issues from Malaysian Perspective
- ABSTRACT
- INTRODUCTION
- CONCEPT OF SURVEILLANCE
- E-GOVERNMENT AND E-SURVEILLANCE IN MALAYSIA
- ETHICAL ISSUES RELATED TO E-SURVEILLANCE
- MALAYSIAN LAWS AND POLICIES THAT GOVERN E-GOVERNMENT AND DIGITAL PRIVACY
- A CONCEPTUAL FRAMEWORK
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 52: A Survey and Surveillance Issues in Smart Homes Environment for Assistive Living
- ABSTRACT
- INTRODUCTION
- A LIGHT COMPARISON ON SURVEILLANCE SYSTEMS
- 3. DATASETS
- BACKGROUND SUBTRACTION
- TRACKING
- DISCUSSION
- 7. CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 53: Reconciling the Needs for National Security and Citizen Privacy in an Age of Surveillance
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- HISTORICAL OVERVIEW OF SURVEILLANCE IN THE U.S.
- THE SURVEILLANCE SOCIETY AND DIGITAL COMMUNICATION
- FRAMEWORKS FOR INTERPRETATION
- CONCLUSION
- REFERENCES
- Chapter 54: Video Surveillance
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- PRIVACY AND LEGISLATION
- MODEL AND TAXONOMY OF VIDEO SURVEILLANCE
- RECOMMENDATIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 55: The E-Government Surveillance in the United States
- ABSTRACT
- INTRODUCTION
- EVOLUTION OF WIRETAPPING LEGISLATION IN THE UNITED STATES
- PUBLIC OPINION OF U.S. GOVERNMENT SURVEILLANCE
- RIGHT WING AUTHORITARIANISM
- PERSONAL INFORMATION PRIVACY
- EMPIRICAL MODEL: DATA AND METHODS
- FINDINGS AND DISCUSSION
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 56: Dataveillance in the Workplace
- ABSTRACT
- INTRODUCTION
- A SHIFTING CONTEXT
- PRIVACY AND SURVEILLANCE
- THE EMPLOYER PERSPECTIVE
- SURVEILLANCE: MANAGEMENTS MOTIVATION
- AN ETHICAL PARADOX: ORGANISATIONAL JUSTICE, TRUST, AND RISK
- A CODE OF ETHICS FOR WORKPLACE SURVEILLANCE
- LEGAL PROTECTIONS: THE ROLE OF PRIVACY LEGISLATION
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Section 5: Critical Issues
- Chapter 57: Biometric Security
- ABSTRACT
- INTRODUCTION
- BACKGROUND OF BIOMETRIC SECURITY
- FOCUS OF THE CHAPTER
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 58: Who “Screens” Security?
- ABSTRACT
- INTRODUCTION
- PART 1 – UNREAL PLACES/REAL FEARS: SCIENCE FICTION DYSTOPIAS AND SURVEILLANCE
- PART II – “BIG BROTHER WATCHING”: PARANOID POLITICS IN A REAL SURVEILLANCE CULTURE
- CODA – “I LIKE TO WATCH”: SURVEILLANCE IN A CULTURE OF VIEWERS
- REFERENCES
- Chapter 59: YouTube
- ABSTRACT
- INTRODUCTION
- AUDIENCE THEORY AND AUDIENCE COMMODIFICATION
- SURVEILLANCE
- POWER
- POWER AND MICHEL FOUCAULT
- MONETIZING THE MESSAGE
- THE NEW YOUTUBE
- THE BROADCAST TELEVISION ADVERTISING MODEL IN YOUTUBE
- WHAT’S HAPPENING IN YOUTUBE MONETIZATION TODAY?
- FUTURE TRENDS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 60: On Piloting Web-Based Rabies Surveillance System for Humans and Animals
- ABSTRACT
- INTRODUCTION
- SITUATION ANALYSIS
- RABIES SURVEILLANCE SYSTEMS
- IMPORTANCE OF RABIES SURVEILLANCE SYSTEM
- THE APPLICATION OF ICT IN RABIES SURVEILLANCE
- PILOTING WEB BASED RABIES SURVEILLANCE SYSTEM IN KILOSA DISTRICT
- REQUIREMENTS FOR DEVELOPMENT OF ICT BASED RABIES SURVEILLANCE SYSTEM
- REQUIREMENT ANALYSIS
- SYSTEM DESIGN
- SYSTEM IMPLEMENTATION
- DESCRIPTION OF USER INTERFACE AND THE SYSTEM IN GENERAL
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 61: Intelligence-Based Adaptive Digital Watermarking for Images in Wavelet Transform Domain
- ABSTRACT
- INTRODUCTION
- BASICS OF DIGITAL WATERMARKING
- DIGITAL WATERMARKING SCHEMES IN TRANSFORM DOMAIN
- COMPUTATIONAL INTELLIGENCE AND WATERMARKING SCHEMES
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 62: Cloud Security
- ABSTRACT
- INTRODUCTION
- PROBLEM IDENTIFICATION
- CLOUD COMPUTING PARADIGM
- BIOMETRICS SECURITY ARCHITECTURES
- RESEARCH ISSUES
- NEW DEVELOPMENT
- PERFORMANCE ASSESSMENT
- FUTURE DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 63: Dataveillance and Information Privacy Concerns
- ABSTRACT
- INTRODUCTION
- INFORMATION PRIVACY
- SURVEILLANCE: AN EMPLOYEE PERSPECTIVE
- MONITORING EMPLOYEES’ HEALTH AND PRIVACY
- SURVEILLANCE: A MANAGEMENT PERSPECTIVE
- ORGANIZATIONAL JUSTICE AND WORKPLACE SURVEILLANCE
- WORKPLACE SURVEILLANCE ETHICS
- THE ROLE OF PRIVACY LEGISLATION
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 64: Hybrid Data Mining Approach for Image Segmentation Based Classification
- ABSTRACT
- 1. INTRODUCTION
- 2. RELATED WORK
- 3. PROPOSED METHODOLOGY
- 4. IMPLEMENTATION
- 5. RESULTS AND DISCUSSION
- 6. CONCLUSION
- REFERENCES
- Chapter 65: Privacy vs. Security
- ABSTRACT
- INTRODUCTION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 66: Veillance
- ABSTRACT
- INTRODUCTION: SURVEILLANCE
- SOUSVEILLANCE
- VEILLANCE INTEGRITY AND VEILLANCE HYPOCRISY
- THE VEILLANCE CONTRACT ANALOGY: RECIPROCAL RECORDING RIGHTS
- DEFINING SUR/SOUSVEILLANCE
- DATAVEILLANCE
- UBERVEILLANCE
- FROM CROWD VEILLANCE TO CLOUD VEILLANCE: GOOVERNANCE OF THE GOOLAG, OR GAOLBROKEN GOOGLASS?
- UNTERVEILLANCE
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Section 6: Emerging Trends
- Chapter 67: Improving the Security of Digital Images in Hadamard Transform Domain Using Digital Watermarking
- ABSTRACT
- INTRODUCTION
- REVIEW OF VISIBLE WATERMARKING SCHEMES
- REVIEW OF INVISIBLE WATERMARKING SCHEMES
- BACKGROUND
- DISCRETE HADAMARD TRANSFORM BASED WATERMARKING SCHEMES
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 68: Smart Surveillance Systems
- ABSTRACT
- INTRODUCTION
- RELATED WORK
- ASPECTS OF SENSOR AND OPERATOR SURVEILLANCE SYSTEMS
- CASE AIS-SYSTEM
- CONCLUSION
- FUTURE RESEARCH DIRECTIONS
- REFERENCES
- KEY TERMS AND DEFINITIONS
- APPENDIX
- Chapter 69: Intuitionistic Fuzzy Filters for Noise Removal in Images
- ABSTRACT
- 1. INTRODUCTION
- 2. INTUITIONISTIC FUZZY OPERATORS
- 3. IF FILTERS IN IMAGE PROCESSING
- 4. PROPOSED ALGORITHM
- 5. RESULTS AND DISCUSSION
- 6. CONCLUSION
- REFERENCES
- Chapter 70: Adding Context Information to Video Analysis for Surveillance Applications
- ABSTRACT
- INTRODUCTION
- BACKGROUND ON CONTEXT-BASED REASONING FOR SURVEILLANCE VIDEO ANALYSIS
- CONTEXTUAL INFORMATION EXTRACTION APPROACHES
- USE CASES FOR SCENE UNDERSTANDING
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 71: Medical Image Enhancement Using Edge Information-Based Methods
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- DIFFERENTIAL HYPERBOLIC TANGENT (DHBT) FILTER BASED ENHANCEMENT
- EDGE ENHANCEMENT OF X-RAY IMAGE BY HAAR FILTERS
- ENHANCEMENT OF VASCULATURE IN OPTIC DISC REGION
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 72: Wheelchair Controlled by Hands Gestures Recognition
- ABSTRACT
- INTRODUCTION
- THE STARTING POINT: NATURAL USER INTERFACES
- SMART WHEELCHAIRS: STATE OF THE ART
- COLOR SPACES
- SYSTEM DESCRIPTION
- DISCUSSION
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- ACKNOWLEGMENT
- REFERENCES
- Chapter 73: Improving Multimodality Image Fusion through Integrate AFL and Wavelet Transform
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- MAIN FOCUS OF THE CHAPTER
- SOLUTIONS AND RECOMMENDATIONS
- FUZZY SET THEORY AND FUZZY LOGIC
- SOLUTION AND RECOMMENDATION
- FUTURE RESEARCH DIRECTION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 74: Digital Forensics
- ABSTRACT
- 1. INTRODUCTION
- 2. DIGITAL CONTENT PROTECTION AND DIGITAL FORENSICS
- 3. DIGITAL IMAGE FORGERY AND FORENSICS
- 4. IMAGE SOURCE IDENTIFICATION
- 5. CONCLUSION AND FUTURE WORK
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 75: Improving the Efficiency of Color Image Segmentation Using an Enhanced Clustering Methodology
- ABSTRACT
- 1. INTRODUCTION
- 2. PERFORMANCE MEASURES
- 3. RELATED WORKS
- 4. IMAGE SEGMENTATION USING DIFFERENT CLUSTERING METHODS
- 5. PROPOSED CLUSTERING METHOD FOR IMAGE SEGMENTATION
- 6. EXPERIMENTAL RESULTS
- 7. CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- APPENDIX
- Chapter 76: A New Swarm Intelligence Technique of Artificial Haemostasis System for Suspicious Person Detection with Visual Result Mining
- ABSTRACT
- INTRODUCTION AND BACKGROUND
- REVIEW OF LITERATURE
- ARTIFICIAL HAEMOSTASIS SYSTEM (AHS) FOR SUSPICIOUS PERSON DETECTION
- EXPERIMENTATION
- CONCLUSION
- FUTURE WORKS
- REFERENCES
- Chapter 77: Advances in Biometrics for Secure Human Authentication System
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS