نتایج جستجو برای: biometric component

تعداد نتایج: 626358  

2013
Shin-Yan Chiou

Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use...

2011
Youssef Elmir Zakaria Elberrichi Réda Adjoudj

Feature level based monomodal biometric systems perform person recognition based on a multiple sources of biometric information and are affected by problems like integration of evidence obtained from multiple cues and normalization of features codes since they are heterogeneous, in addition of monomodal biometric systems problems like noisy sensor data, non-universality and lack of individualit...

2014
Garima Yadav Nikita Yadav

Traditional user authentication/verification systems mostly rely on knowledge; like password or smart card. But they are not able to meet strict security performance of today’s computer applications. That’s why now biometrics-based authentication systems are good alternate to these traditional authentication methods. Biometric system works on the principle of recognizing individuals on the basi...

2011
Monika Desoi Matthias Pocs Benjamin Stach

Biometric technology for crime prevention is emerging. The design of a biometric system is decisive for the protection of fundamental rights. This paper analyses the necessary reduction of identifiability of biometric data. By outlining the German legal framework, the paper assesses a technical design proposal for future biometric systems. In this context, a Three-Step-Model is suggested.

2013
Shih Yin Ooi Andrew Beng Jin Teoh Ying Han Pang Bee Yan Hiew Fu San Hiew

The privacy invasion of the biometric technology is getting public concerns due to the fact that biometric characteristics are immutable. In other words, their compromise is permanent. Reissuable biometrics was devised to make the reissuable or replaceable of biometric templates possible once they are found compromised. Biometric Strengthening is a form of reissuable biometrics. It strengthens ...

Journal: :IEEE Trans. Pattern Anal. Mach. Intell. 2003
Anil K. Jain Umut Uludag

With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of security/integrity of biometric data extremely...

2011
Chi-Ho Chan Budhaditya Goswami Josef Kittler William J. Christmas

The lip-region can be interpreted as either a genetic or behavioural biometric trait. Despite this breadth of biometric content, lip-based biometric systems are scarcely developed in the literature. A recent trend in lip biometrics is to use a spatiotemporal texture representation of visual speech to generate biometric features. In this paper we make two contributions related to the above biome...

2005
Daniel Ramos-Castro Joaquín González-Rodríguez Christophe Champod Julian Fiérrez Javier Ortega-Garcia

In this paper, the use of biometric systems in forensic applications is reviewed. Main differences between the aim of commercial biometric systems and forensic reporting are highlighted, showing that commercial biometric systems are not suited to directly report results to a court of law. We propose the use of a Bayesian approach for forensic reporting, in which the forensic scientist has to as...

Journal: :Image Vision Comput. 2014
Kenta Takahashi Takao Murakami

We propose a measure of information gained through biometric matching systems. Firstly, we discuss how the information about the identity of a person is derived from biometric samples through a biometric system, and define the “biometric system entropy” or BSE based on mutual information. We present several theoretical properties and interpretations of the BSE, and show how to design a biometri...

2007
Daniel Hartung Xuebing Zhou Dieter W. Fellner

Nowadays systems for authentication are mainly based on passwords and possession. This implies some problems: For high security purposes long passwords are required. Because of the fact that more and more passwords are needed for several applications it gets harder to remember all of them. So what usually happens is that only a few number of weak passwords are used for all of these applications...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید