نتایج جستجو برای: biometrics access control
تعداد نتایج: 1614058 فیلتر نتایج به سال:
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...
Modern societies give higher relevance to personal recognition system that contribute to the increase of security and reliability, essentially due to terrorism and other extremism or illegal activities. The objective of this work is to present a multi-algorithmic biometric authentication system for physical access control based on iris pattern for high security access. The CASIA database of IRI...
To thoroughly prepare the expected start of the European Visa Information System (VIS) in 2011, Germany has implemented and evaluated the biometric visa border control process in a dedicated pilot project. In addition to implementing all necessary software modules for the access to the VIS, the focus of the project was set on the new feature of fingerprint biometrics. Fingerprint verification i...
To thoroughly prepare the expected start of the European Visa Information System (VIS) in 2011, Germany has implemented and evaluated the biometric visa border control process in a dedicated pilot project. In addition to implementing all necessary software modules for the access to the VIS, the focus of the project was set on the new feature of fingerprint biometrics. Fingerprint verification i...
Despite the obvious advantages of biometric authentication systems over traditional security ones (based on tokens or passwords), they are vulnerable to attacks which may considerably decrease their security. In order to contribute in resolving such problematic, we propose a modality-independent evaluation methodology for the security evaluation of biometric systems. It is based on the use of a...
The number of biometric applications has increased a lot in the last few years. In this context, the automatic person recognition by some physical traits like fingerprints, face, voice or iris, plays an important role. Users demand this type of applications every time more and the technology seems already mature. People look for security, low cost and accuracy but, at the same time, there are m...
In the present age of digital impersonation, biometric techniques are being used increasingly to prevaricate against identity thefts. Iris recognition is a proven, accurate means to identify people. Iris is regarded as the most reliable biometric feature in terms of its uniqueness and robustness. The objective of this work is to present a biometric authentication system for high security physic...
in recent years, many researchers have been done in the area of wireless sensornetworks that has led to the variety of algorithms and methods for the collection andtransmission of environment information; but still many challenges faced bywireless sensor networks using methodologies are applied in various fields. such asmedia access control that due to the media being shared on these networks, ...
Biometric advances apply to a range of disciplines to ensure the safety and security of individuals and groups. To stress the value of biometrics, this study focuses on the application of biometric techniques to a vast range of individuals and groups, irrespective of their age. This report covers biometric development within three generations. For the younger age group, biometrics can play a si...
This paper presents a typical application of secured access to a terminal and/or teleservices using biometrics (speech and frontal face) verification. This application is one of the prototype developed in the European ACTS project « M2VTS » which stands for Multi Modal Verification for Teleservices and Security Applications. The primary goal of this project was to address the issue of secured a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید