نتایج جستجو برای: biometrics access control
تعداد نتایج: 1614058 فیلتر نتایج به سال:
This paper proposes an efficient fingerprint recognition algorithm combining phase-based image matching and feature-based matching. In our previous work, we have already proposed an efficient fingerprint recognition algorithm using Phase-Only Correlation (POC), and developed commercial fingerprint verification units for access control applications. The use of Fourier phase information of finger...
W ITH A very security-conscious society, biomet-rics-based authentication and identification have become one of the key technologies for many important applications. It is generally believed that biometrics can provide the necessary accuracy and reliability for applications, such as access control. Biometrics research and technology continue to mature rapidly, driven by pressing industrial and ...
We propose a new iris texture coding technique with optimal feature extraction, and design a secure remote (internet) access system using the proposed biometrics. The proposed iris coding method is based on Zak-Gabor coefficients sequence, and additionally uses an optimal selection of a subset of iris features. The secure access involves a communication scenario that employs a usual client-serv...
Cloud computing uses few resources to give customers complete distant services via the internet. Data privacy, security, and reliability are major issues with cloud computing. Security is biggest issue. This study discusses biometrics framework safe identity management method. paper security challenges reviews access approaches. It describes a novel fingerprint access-based authentication syste...
Purpose To identify and discuss the issues and success factors surrounding biometrics, especially in the context of user authentication and controls in the banking sector, using a case study. Design/methodology/approach The literature survey and analysis of the security models of the present information systems and biometric technologies in the banking sector provide the theoretical and practic...
Conventional access control systems are typically based on a single time instant authentication. However, for high-security environments, continuous user verification is needed in order to robustly prevent fraudulent or unauthorized access. The electrocardiogram (ECG) is an emerging biometric modality with the following characteristics: (i) it does not require liveliness verification, (ii) ther...
Electrocardiogram (ECG) signals sensed from mobile devices pertain the potential for biometric identity recognition applicable in remote access control systems where enhanced data security is demanding. In this study, we propose a new algorithm that consists of a two-stage classifier combining random forest and wavelet distance measure through a probabilistic threshold schema, to improve the ef...
one of the main requirements for providing software security is the enforcement of access control policies, which is sometimes referred to as the heart of security. the main purpose of access control policies is to protect resources of the system against unauthorized accesses. any error in the implementation of access control policies may lead to undesirable outcomes. hence, we should ensure th...
Biometrics is the study of automatically recognizing humans by means of inherently unique physical or behavioural characteristics. The human physical characteristics like fingerprints, face, hand geometry, voice, Signature, palm and iris are known as biometrics. These features are used to provide an authentication for computer based security systems. The existing computer security systems used ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید