Description
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these applications, which in turn have spurred active research in the field of biometric recognition. Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes such as lip print, fingerprint, face, iris, and voice. Biometric systems are based on the premise that many of the physical or behavioral attributes of humans can be uniquely associated with an individual. By capturing these attributes using appropriately designed sensors, representing them in a digital format, and comparing this recorded data against the data acquired from the same person at an earlier time instance, it is possible to automate the process of person recognition. Thus, biometric recognition can be viewed as a pattern recognition problem, where the machine learns the salient features (patterns) in the biometric attributes of an individual and robustly matches such patterns efficiently and effectively. �??Lip Print Biometrics Security�?? is providing security for the file transfer process in a distributed environment. Document transmission between the systems that are in the distributed environment is an unusual task. The same environment is also shared by the lot of members. So the system should ensure the security of the documents that are transferred. Different cryptographic techniques are used to secure the data. In the recent day�??s biometrics are used to recognize the users. This work combines the Lip print biometrics and cryptography to provide the security for the document transmission process in the distributed environment. Generally passwords and smart cards are used for the security systems. This system uses the lip prints for the security system. Password can be hacked by trial and error basis. But it is not possible to break the biometrics based security system. This textbook has been designed for undergraduate students and post graduate students who have introductory preparation in lip prints authentication, recognition, and personal identification. The book would also be useful to a wider audience, including developers of biometric applications, system integrators, and designers of security systems. Biometric recognition is a rapidly evolving field with an active research and development community that continues to generate new technological innovations and create progressively better biometric systems. Since this book emphasizes the fundamental concepts, we hope that it serves as a good starting point for readers with little prior knowledge about biometrics and as a useful reference for biometric experts and security system designers. This book has been designed for professionals composed of students, practitioners and researchers in biometrics, pattern recognition and computer security. It can be used as a primary textbook for an undergraduate biometrics class or as a secondary textbook for advanced-level students in computer science and electrical engineering. We hope that the concepts and ideas presented in this book will stimulate further research in this field even as biometric technology becomes an integral part of society in the 21st century.




