نتایج جستجو برای: biometric component

تعداد نتایج: 626358  

2017
Srikanta Pal Michael Blumenstein Umapada Pal

The use of biometric technologies for human identity verification is growing rapidly in civilized society and showing its advancement towards the usability of biometrics for security. Off-line signature verification is considered as a behavioral characteristic based biometric trait in the field of security and the prevention of fraud. So, offline signatures are extensively used as a means of pe...

2006
Hong-Wei Sun Kwok-Yan Lam Ming Gu Jia-Guang Sun

With the emerging trend of incorporating biometrics information in e-financial and e-government systems arisen from international efforts in anti-money laundering and counter-terrorism, biometric identification is gaining increasing importance as a component in information security applications. Recently, fingercode has been demonstrated to be an effective fingerprint biometric scheme, which ca...

2005
Bill Spence

Biometrics is a process of identifying a person by their unique and measurable human characteristics. A person’s biometric characteristic can be the size and shape of a hand, the ridge and valley pattern of a fingerprint, the frequency of voice or iris characteristics of the eye. No longer are these devices found only in James Bond movies and Star Trek reruns. They are used on the front door of...

Journal: :EURASIP J. Adv. Sig. Proc. 2009
Chun Chen Raymond N. J. Veldhuis Tom A. M. Kevenaar Anton H. M. Akkermans

Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature component...

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

2012
Zahid Akhtar Shabbeer Ahmad Momin

A biometric system is essentially a pattern recognition system being used in adversarial environment. Since, biometric system like any conventional security system is exposed to malicious adversaries, who can manipulate data to make the system ineffective by compromising its integrity. Current theory and design methods of biometric systems do not take into account the vulnerability to such adve...

Journal: :EURASIP J. Information Security 2016
Christian Rathgeb Benjamin Tams Johannes Wagner Christoph Busch

Iris recognition technologies are deployed in numerous large-scale nation-wide projects in order to provide robust and reliable biometric recognition of individuals. Moreover, the iris has been found to be rather stable over time, i.e. iris biometric reference data provides a strong and permanent link between individuals and their biometric traits. Hence, unprotected storage of (iris) biometric...

2015
Dinesh Kumar D. S P. V. Rao

Biometric detection is considered as an important tool for states to use to strengthen the safety measures. Biometric increases robustness of the biometric system against many attacks and solve the problem of non-universality. Since facial image is the mandatory biometric identifier this proposed work focuses on the use of facial image. Face authentication involves extracting characteristics se...

2002
Stephen J. Elliott Mathias J. Sutton

This paper accounts the development of a graduate course in biometrics at Purdue University. The course has been developed in conjunction with the inauguration of an applied biometrics research laboratory. The laboratory represents a Purdue-industry partnership through sponsored projects, advisory relationships, and financial support, industry partners assure that the laboratory achieves its po...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید