نتایج جستجو برای: biometrics access control

تعداد نتایج: 1614058  

Journal: :Information 2023

Biometrics has become an important research issue in recent years, and the use of deep learning neural networks made it possible to develop more reliable efficient recognition systems. Palms have been identified as one most promising candidates among various biometrics due their unique features easy accessibility. However, traditional palm methods involve 3D point clouds, which can be complex d...

Journal: :IEEE Access 2022

The development of non-intrusive technologies to perform continuous health monitoring and enable automatic warnings is a challenging current issue. Behavioral biometrics such as speech, handwriting, gait can play crucial role. In fact, these signals convey several components: • one related the physical part which enables user make action...

Journal: :CoRR 2012
Sadeque Reza Khan

Over the years, access control systems have become more and more sophisticated and several security measures have been employed to combat the menace of insecurity of lives and property. This is done by preventing unauthorized entrance into buildings through entrance doors using conventional and electronic locks, discrete access code, and biometric methods such as the finger prints, thumb prints...

2015
S. Sheeba

Biometric technologies are automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioral characteristic. Biometrics technology is without doubt a more efficient way of authentication than the more common use of passwords, smart cards, or a combination of the two. Passwords also have expiration dates that require new assignment of passwords ...

2010
Christian Rathgeb Andreas Uhl

Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of controlling access. The increasing demand for high security applications has led to a growing interest in biometrics. As a result several two-factor authentication systems are designed to include biometric authentication. I...

2004
Anil K. Jain Arun Ross Salil Prabhakar

A wide variety of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user, and not anyone else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones...

2016
Suresh Kumar

Over the past decade the technological achievements have resulted in improved network services. Because of electronic transactions are executed in these days, the security of computer access is relying important. Existing security techniques can be strengthen by behavioral biometrics such as keystroke dynamics which makes use of the typing cadence of an individual effectively and cheaply. There...

2013
Neha Kudu Disha Suru Sunil Karamchandani

The main purpose of using biometrics is to avoid the risks related to password such as easy to find or Stoll. To make safe and authenticated access control it is true alternatives for passwords and identifiers. In contrast to existing methods, finger knuckle image authentication system employs a low resolution knuckle print images to achieve effective personal identification. In this paper, eff...

2009
Muhammad Salman Khan Juha Takkinen

This report is a detailed study of physical security methods available for protecting a data center. A preliminary analysis has been done on the data center located at the Department of Computer and Information Science (IDA) of Linköping University, Sweden. Various traditional methods for physical security are discussed in this report along with their implementation. The two appropriate solutio...

2015
Venkat Chandar Benjamin Fuller Joseph P. Campbell

1053-5888/15©2015IEEE B iometrics were originally developed for identification, such as for criminal investigations. More recently, biometrics have been also utilized for authentication. Most biometric authentication systems today match a user’s biometric reading against a stored reference template generated during enrollment. If the reading and the template are sufficiently close, the authenti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید