نتایج جستجو برای: biometric component
تعداد نتایج: 626358 فیلتر نتایج به سال:
In this study, we are interested in a face verification or authentication system based on Principal Component Analysis and Linear Discriminant Analysis (known as Fisherfaces). We evaluate the tradeoff between performance and computational requirements of making a decision in such a biometric system. This kind of evaluation is useful when implementing a practical system where the CPU power and s...
In this paper, we propose and evaluate palmprint recognition method based on local Haralick features. The Haralick features are extracted from overlapping square subimages of a palmprint region of interest (ROI). A biometric template is composed of N m-component feature vectors, where N is the total number of overlapping subimages, and m is the number of local Haralick features per subimage in ...
Today’s business applications are increasingly process driven, meaning that the main application logic is executed by a dedicate process engine. In addition, component-oriented software development has been attracting attention for building complex distributed applications. In this paper we present the experiences gained from building a process-driven biometric identification application which ...
Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...
Low Dimensional Representation of Dorsal Hand Vein Features Using Principle Component Analysis (PCA)
The quest of providing more secure identification system has led to a rise in developing biometric systems. Dorsal hand vein pattern is an emerging biometric which has attracted the attention of many researchers, of late. Different approaches have been used to extract the vein pattern and match them. In this work, Principle Component Analysis (PCA) which is a method that has been successfully a...
The authors present a secure facial recognition system. The biometric data are transformed to the cancellable domain using high-order polynomial functions and co-occurrence matrices. The proposed method has provided both high-recognition accuracy and biometric data protection. Protection of data relies on the polynomial functions, where the new reissued cancellable biometric can be obtained by ...
iometric systems are mostly used as person identification or verification systems. In the last few decades, the Electrocardiogram (ECG) has been introduced as a most powerful biometric tool for personal/individual identification. ECG has unique cardiac feature to each individual which motivated its use in various identification systems. Recent developments have also shown that person identifica...
Many biometric based personal identification systems have been developed, and palm print identification is one of the emerging technologies. Recently, biometric technologies are used to solve security problems in the information area. Authentications of a person by the physiological or behavioural characteristics have attracted researcher’s attention. Proposed method uses Hybrid Wavelet Transfo...
The quest of providing more secure identification system has lead to rise in developing biometric systems. Biometrics such as face, fingerprint and iris have been developed extensively for human identification purpose and also to provide authentic input to many security systems in the past few decades. Dorsal hand vein pattern is an emerging biometric which is unique to every individual. In thi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید