Forgery Quality and Its Implications for Behavioral Biometric Security
نویسندگان
چکیده
منابع مشابه
Behavioral and Physical Biometric Characteristics Modeling Used for Its Security Improvement
Biometric technologies rely on specific biometric characteristics that are used for recognition. The particular characteristic for a given situation can be described through a serious of descriptive parameters including ease of collecting, permanence, measurably, acceptability, deceptiveness, universality, uniqueness, sample cost, system cost, database size, as well as environmental factors. By...
متن کاملEpigenetics and its implications for behavioral neuroendocrinology.
Individuals vary in their sociosexual behaviors and reactivity. How the organism interacts with the environment to produce this variation has been a focus in psychology since its inception as a scientific discipline. There is now no question that cumulative experiences throughout life history interact with genetic predispositions to shape the individual's behavior. Recent evidence suggests that...
متن کاملSecurity for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both privacy protection and user convenience. From a security point of view, biometric authentication offers the possibility to establish physical presence and unequivocal identification. However from a privacy point of view, t...
متن کاملconstruction and validation of translation metacognitive strategy questionnaire and its application to translation quality
like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...
Biometric security for mobile computing
Data and computing resource security has become an integral element in the fabric of information systems. Cryptography has formed a foundation for conventional security theoretical frameworks and applications.However, cryptography is based on either knowledge (i.e., what you know) or possession (i.e., what you have). This is a built-in weakness in traditional authentication approaches, as the t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics)
سال: 2007
ISSN: 1083-4419
DOI: 10.1109/tsmcb.2007.903539