Preface |
|
xi | |
|
|
1 | (14) |
|
|
4 | (3) |
|
1.2 Biometrics System Design |
|
|
7 | (1) |
|
|
8 | (5) |
|
|
13 | (2) |
|
|
15 | (20) |
|
2.1 Cognitive Neurosciences |
|
|
16 | (3) |
|
|
19 | (7) |
|
|
26 | (4) |
|
|
30 | (5) |
|
3 Modeling and Prediction |
|
|
35 | (18) |
|
|
37 | (3) |
|
|
40 | (3) |
|
|
43 | (1) |
|
3.4 Structural Risk Minimization |
|
|
44 | (4) |
|
|
48 | (2) |
|
3.6 Generative and Discriminative Methods |
|
|
50 | (3) |
|
|
53 | (12) |
|
|
53 | (3) |
|
|
56 | (2) |
|
|
58 | (7) |
|
|
65 | (32) |
|
|
65 | (3) |
|
|
68 | (4) |
|
|
72 | (2) |
|
|
74 | (6) |
|
|
80 | (5) |
|
|
85 | (6) |
|
|
91 | (3) |
|
|
94 | (3) |
|
|
97 | (24) |
|
|
97 | (2) |
|
6.2 Verification and Identification |
|
|
99 | (3) |
|
|
102 | (5) |
|
6.4 Watch List and Surveillance |
|
|
107 | (3) |
|
|
110 | (5) |
|
|
115 | (1) |
|
|
116 | (2) |
|
|
118 | (3) |
|
|
121 | (34) |
|
|
121 | (4) |
|
|
125 | (3) |
|
|
128 | (2) |
|
7.4 Active Learning and Evidence Accumulation |
|
|
130 | (5) |
|
7.5 Video Break Detection and Key Frame Extraction |
|
|
135 | (2) |
|
7.6 Pose Detection and Manifolds |
|
|
137 | (6) |
|
7.7 Tracking and Recognition from Video |
|
|
143 | (7) |
|
7.8 Spatio-Temporal Subspace Analysis Using 3D ICA |
|
|
150 | (5) |
|
|
155 | (14) |
|
|
156 | (3) |
|
8.2 Analysis by Synthesis |
|
|
159 | (1) |
|
|
160 | (2) |
|
8.4 Modeling and Recognition |
|
|
162 | (7) |
|
|
169 | (22) |
|
|
169 | (2) |
|
|
171 | (3) |
|
|
174 | (3) |
|
|
177 | (2) |
|
9.5 Multimodal Sensory Integration |
|
|
179 | (2) |
|
|
181 | (1) |
|
9.7 Boosting and Strangeness |
|
|
182 | (9) |
10 Denial and Deception |
|
191 | (22) |
|
|
192 | (1) |
|
|
193 | (2) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (2) |
|
10.6 Adaptive and Robust Correlation Filters |
|
|
199 | (9) |
|
10.7 Associative, Distributed and Holographic Memories |
|
|
208 | (5) |
11 Augmented Cognition |
|
213 | (10) |
|
|
214 | (1) |
|
|
215 | (3) |
|
|
218 | (5) |
12 Performance Evaluation |
|
223 | (20) |
|
|
223 | (6) |
|
|
229 | (2) |
|
|
231 | (2) |
|
12.4 Comparative Assessment |
|
|
233 | (3) |
|
|
236 | (4) |
|
|
240 | (3) |
13 Error Analysis |
|
243 | (18) |
|
13.1 Confidence Intervals |
|
|
244 | (4) |
|
13.2 Prevalence and Fallacies |
|
|
248 | (3) |
|
13.3 Pattern Specific Error Inhomogeneities |
|
|
251 | (4) |
|
13.4 Large Scale Biometric Evaluations |
|
|
255 | (6) |
14 Security and Privacy |
|
261 | (14) |
|
14.1 Diversity and Uniqueness |
|
|
264 | (2) |
|
14.2 Regeneration of Face Images from Biometric Templates |
|
|
266 | (1) |
|
|
267 | (1) |
|
14.4 Steganography and Digital Watermarking |
|
|
268 | (2) |
|
|
270 | (3) |
|
|
273 | (2) |
15 e-Science and Computing |
|
275 | (8) |
16 Epilogue |
|
283 | (6) |
References |
|
289 | (34) |
Index |
|
323 | |