نتایج جستجو برای: biometric fingerprint

تعداد نتایج: 22183  

2012
W. Y. Leng S. M. Shamsuddin

Fingerprint based identification system; one of a well known biometric system in the area of pattern recognition and has always been under study through its important role in forensic science that could help government criminal justice community. In this paper, we proposed an identification framework of individuals by means of fingerprint. Different from the most conventional fingerprint identi...

2008
Giancarlo Iannizzotto Francesco La Rosa

Recently, with the increasing demand of high security, person identification has become more and more important in our everyday life. The purpose of establishing the identity is to ensure that only a legitimate user, and not anyone else, accesses the rendered services. The traditional identification methods are based on “something that you possess” and “something that you know” such as key, use...

2014
Navjot Kaur Gagandeep Singh

Fingerprint enhancement algorithm is used to improve the clarity of ridges and valleys of input fingerprint images. These kind of algorithm make them more suitable for the minutiae extraction algorithm. The ultimate criterion for evaluating such an enhancement algorithm is the total amount of “quality” improvement when the algorithm is applied to the noisy input fingerprint images. There are va...

2014
Shahid Akbar Maqsood Hayat Abdul Wali Khan

Fingerprint recognition is mostly used in biometric and security system that are practically applicable in different fields of national defense organization for various safety measures. Looking at the importance of biometric system, a lot of efforts have been carried out for recognition of fingerprint, but still there exist some issues, which demand for more attention and exploration. In this r...

2015
Vaibhav B. Joshi Dhruv Gupta Mehul S. Raval

In this work, authors propose a novel scheme with commutative encryption and reversible watermarking for a fingerprint image. Due to commutative property one can embed and extract watermark in either plain or encrypted fingerprint image, irrespective of order in which encryption or watermarking is applied. The encryption and the watermarking keys are shared using secret key sharing mechanism. T...

2006
Fengling Han Jiankun Hu Xinghuo Yu Yong Feng Jie Zhou

This paper studies the smartcard based fingerprint encrytion/authentication scheme for ATM banking systems. In this scheme, the system authenticates each user by both his/her possession (smartcard) and biometrics (fingerprint). A smartcard is used for the first layer of authentication. Based on the successful pass of the first layer authentication, a subsequent process of the biometric fingerpr...

Journal: :IACR Cryptology ePrint Archive 2014
Marina Blanton Siddharth Saraph

The increasing availability and use of biometric data for authentication and other purposes leads to situations when sensitive biometric data is to be handled or used in computation by entities who may not be fully trusted or otherwise authorized to have full access to such data. This calls for mechanisms of provably protecting biometric data while still allowing the computation to take place. ...

Journal: :Journal of Pharmaceutical Negative Results 2022

Automated Teller Machines (ATMs) are a very convenient way to withdraw money wherever you ATMs in high demand because users rely heavily on their ATMs. But if someone has access us, they can easily our bank accounts. The only solution for ATM security is 6-digit PIN. There still many vulnerabilities that criminals use fraud customer data. To avoid such thievery and fraud, the actual creator emb...

Journal: :Engineering and technology journal 2022

In security-related systems, such as access control authentication is extremely important. There are several ways to carry out this crucial activity, but biometrics currently attracting more attention. After realizing the usefulness of biometrics, security systems use them for one two fundamental functions: user identification or verification. Multiple exist, and various require biometrics. As ...

2014
Li Lu Jialiang Peng

In this paper, we propose a new finger multi-biometric cryptosystem using feature-level fusion to simultaneously protect multiple templates of fingerprint, finger vein, finger knuckle print and finger shape traits as a single secure sketch. We theoretically analyze the featurelevel fusion for finger multi-biometric cryptosystem with respect to their impact on security and recognition accuracy. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید