نتایج جستجو برای: biometric component

تعداد نتایج: 626358  

2017
P. Devakumar

Biometric systems are vulnerable to certain type of attacks at various points in the biometric model. A spoofing attack which is submitting a stolen, copied biometric trait to the sensor to gain unauthorized access to the biometric system is one among them. Multimodal biometric systems are designed to increase the accuracy of the biometric system, but they are more vulnerable to spoofing attack...

E. Eken K. Beşoluk M. O. Dayan S. Özkadif,

The aim of this study was to reveal biometric peculiarities of New Zealand white rabbit antebrachium (radius and ulna) by means of three-dimensional (3D) reconstruction of multidetector computed tomography (MDCT) images. Under general anesthesia, the antebrachiums of a total of sixteen rabbits of both sexes were scanned with a general diagnostic MDCT. Biometric measurements of the reconstructed...

2002
B. V. K. Vijaya Kumar Chunyan Xie Marios Savvides Krithika Venkataramani

Biometric recognition refers to the process of matching an input biometric to stored biometric information. In particular, biometric verification refers to matching the live biometric input from an individual to the stored biometric template about that individual. Examples of biometrics include face images, fingerprint images, iris images, retinal scans, etc. Thus, image processing techniques p...

2009
V. S. Meenakshi G. Padmavathi

Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person’s biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biom...

Journal: :IEEE Trans. Circuits Syst. Video Techn. 2004
Xiaoou Tang Songde Ma Lawrence O'Gorman Massimo Tistarelli

T HIS is the second installment of the Special Issue on Image and Video-Based Biometrics. In the January 2004 issue of IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, we published ten papers on traditional biometrics, such as iris, face, and fingerprint recognition, and an introduction on biometric technologies. In this issue, we will present a set of papers addressing relativel...

2014
Deven Trivedi Rohit Thanki Ashish Kothari

In present world, biometric base authentication system is used by many agencies for security purpose. Use of important characteristics of biometric based authentication system become so popular because every human presents unique biometric characteristics and biometric recognition done automatically. Biometric authentication system is divided into four steps like biometric template acquisition ...

Journal: :Twin research : the official journal of the International Society for Twin Studies 2004
Lise Hestbaek Ivan A Iachine Charlotte Leboeuf-Yde Kirsten Ohm Kyvik Claus Manniche

Important genetic influence on intervertebral disc degeneration has been shown previously. However, the role of the disc in pain production is not clear and the genetic influence on the development of the symptoms of low back pain is largely unknown. Therefore, data on lifetime prevalence of low back pain from the young cohort in The Danish Twin Registry (aged 12-41) were analyzed with respect ...

2010
V. S. Meenakshi G. Padmavathi

personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person's biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biometric template is very crucial. Crypto biometric...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید