نتایج جستجو برای: biometrics access control

تعداد نتایج: 1614058  

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

2012
G. Sathish S. Narmadha S. Uma Maheswari Anil K. Jain

Modern societies give higher relevance to personal recognition system that contribute to the increase of security and reliability, essentially due to terrorism and other extremism or illegal activities. The objective of this work is to present a multi-algorithmic biometric authentication system for physical access control based on iris pattern for high security access. The CASIA database of IRI...

2011
Arslan Brömme Christoph Busch

To thoroughly prepare the expected start of the European Visa Information System (VIS) in 2011, Germany has implemented and evaluated the biometric visa border control process in a dedicated pilot project. In addition to implementing all necessary software modules for the access to the VIS, the focus of the project was set on the new feature of fingerprint biometrics. Fingerprint verification i...

2011
Michael Schwaiger Fares Rahmun Oliver Bausinger Mathias Grell

To thoroughly prepare the expected start of the European Visa Information System (VIS) in 2011, Germany has implemented and evaluated the biometric visa border control process in a dedicated pilot project. In addition to implementing all necessary software modules for the access to the VIS, the focus of the project was set on the new feature of fingerprint biometrics. Fingerprint verification i...

2010
Mohamad El-Abed Romain Giot Baptiste Hemery Christophe Rosenberger

Despite the obvious advantages of biometric authentication systems over traditional security ones (based on tokens or passwords), they are vulnerable to attacks which may considerably decrease their security. In order to contribute in resolving such problematic, we propose a modality-independent evaluation methodology for the security evaluation of biometric systems. It is based on the use of a...

2006
Javier Rodríguez Saeta

The number of biometric applications has increased a lot in the last few years. In this context, the automatic person recognition by some physical traits like fingerprints, face, voice or iris, plays an important role. Users demand this type of applications every time more and the technology seems already mature. People look for security, low cost and accuracy but, at the same time, there are m...

2012
G. Sathish S. Uma Maheswari

In the present age of digital impersonation, biometric techniques are being used increasingly to prevaricate against identity thefts. Iris recognition is a proven, accurate means to identify people. Iris is regarded as the most reliable biometric feature in terms of its uniqueness and robustness. The objective of this work is to present a biometric authentication system for high security physic...

Journal: :journal of advances in computer research 2013
somayeh rahmani ahmad khademzadeh amir masoud eftekhari moghadam

in recent years, many researchers have been done in the area of wireless sensornetworks that has led to the variety of algorithms and methods for the collection andtransmission of environment information; but still many challenges faced bywireless sensor networks using methodologies are applied in various fields. such asmedia access control that due to the media being shared on these networks, ...

2008
Marthie Lessing Lara Weissenberger

Biometric advances apply to a range of disciplines to ensure the safety and security of individuals and groups. To stress the value of biometrics, this study focuses on the application of biometric techniques to a vast range of individuals and groups, irrespective of their age. This report covers biometric development within three generations. For the younger age group, biometrics can play a si...

2003
G. Richard Y. Menguy I. Guis P. Lockwood

This paper presents a typical application of secured access to a terminal and/or teleservices using biometrics (speech and frontal face) verification. This application is one of the prototype developed in the European ACTS project « M2VTS » which stands for Multi Modal Verification for Teleservices and Security Applications. The primary goal of this project was to address the issue of secured a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید