نتایج جستجو برای: biometric identification
تعداد نتایج: 416436 فیلتر نتایج به سال:
Biometric performance improvement is a challenging task. In this paper, a hierarchical strategy fusion based on multimodal biometric identification systems is presented. This strategy relies on a combination of several biometric traits using a multi-level biometric fusion hierarchy. The multi-level biometric fusion includes a pre-classification fusion with optimal feature selection and a post-c...
Fingerprints are the most widely used biometric feature for person identification and verification in the field of biometric identification. Fingerprints possess two main types of features that are used for automatic fingerprint identification and verification: (i) Ridge and furrow structure that forms a special pattern in the central region of the fingerprint and (ii) Minutiae details associat...
Recognition of newborn after birth is a critical issue for hospitals, maternity word and other places where multiple birthstake place. Switching and abduction of newborn is a global challenge and research done to meet this challenge is minimal. Most of the biometric systems developed are for adults and very few of them address the issue of newborn identification.The ear of newborn is a perfect ...
Biometric mechanisms of authentication are becoming a popular approach to securing computer systems, networks and other critical resources. This paper proposes a behavioural authentication system based on user interaction with computer games. Literature about current physical and behavioural biometric methods is reviewed and game based authentication design and implementation issues are discuss...
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention over the past decade. Iris recognition, as an emerging biometric recognition approach is receiving interest in both research and practical applications. Iris is a kind of physiological biometric feature. It contains unique texture and is complex enough to be used...
Now a days Security of computer science and information technology is an important issue. Authentication and identification are related to the security. The traditional methods for confirming person identity involve use of ATM, Pins, and Password which can be lost or stolen. So it is needed to have a system which provide security and overcome the limitations of traditional methods. A biometric ...
A cancelable biometric scheme called correlation-invariant random filtering (CIRF) is known as a promising template protection scheme. This scheme transforms a biometric feature represented as an image via the 2D number theoretic transform (NTT) and random filtering. CIRF has perfect secrecy in that the transformed feature leaks no information about the original feature. However, CIRF cannot be...
Congress passed the Real ID Act (‘‘the Act’’) in 2005 and will require all states to implement much more stringent controls on the issuance of driver’s licenses and identification. The states face a number of obstacles in implementing the requirements including a lack of funding, lack of federal support and training, and a rapidly approaching implementation deadline. Under the Real ID Act, the ...
and Immigration (BORDERS) under grant number 2008-ST-061-BS0002. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security."
Authenticating the identity of users is a critical issue in information security. Biometrics is known for recognizing users based on their physiological or behavioral traits as identifiers and these cannot be easily stolen unlike passwords or ID cards. Biometrics could be employed as the primary means for authentication, called user identification, as well as a complementary (secondary) method ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید