نتایج جستجو برای: biometric identification

تعداد نتایج: 416436  

2013
Youssef Elmir

Biometric performance improvement is a challenging task. In this paper, a hierarchical strategy fusion based on multimodal biometric identification systems is presented. This strategy relies on a combination of several biometric traits using a multi-level biometric fusion hierarchy. The multi-level biometric fusion includes a pre-classification fusion with optimal feature selection and a post-c...

2004
Rajender Nath Chander Kant

Fingerprints are the most widely used biometric feature for person identification and verification in the field of biometric identification. Fingerprints possess two main types of features that are used for automatic fingerprint identification and verification: (i) Ridge and furrow structure that forms a special pattern in the central region of the fingerprint and (ii) Minutiae details associat...

2012
Shrikant Tiwari Aruni Singh Sanjay Kumar Singh

Recognition of newborn after birth is a critical issue for hospitals, maternity word and other places where multiple birthstake place. Switching and abduction of newborn is a global challenge and research done to meet this challenge is minimal. Most of the biometric systems developed are for adults and very few of them address the issue of newborn identification.The ear of newborn is a perfect ...

2010
Ahmed Al-Khazzar Nick Savage

Biometric mechanisms of authentication are becoming a popular approach to securing computer systems, networks and other critical resources. This paper proposes a behavioural authentication system based on user interaction with computer games. Literature about current physical and behavioural biometric methods is reviewed and game based authentication design and implementation issues are discuss...

2012
Savita Sondhi Sharda Vashisth Asha Gaikwad Anjali Garg

With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention over the past decade. Iris recognition, as an emerging biometric recognition approach is receiving interest in both research and practical applications. Iris is a kind of physiological biometric feature. It contains unique texture and is complex enough to be used...

2014
Dhanashri J. Ghate Savitri B. Patil

Now a days Security of computer science and information technology is an important issue. Authentication and identification are related to the security. The traditional methods for confirming person identity involve use of ATM, Pins, and Password which can be lost or stolen. So it is needed to have a system which provide security and overcome the limitations of traditional methods. A biometric ...

2018
Takao Murakami Tetsushi Ohki Yosuke Kaga Masakazu Fujio Kenta Takahashi

A cancelable biometric scheme called correlation-invariant random filtering (CIRF) is known as a promising template protection scheme. This scheme transforms a biometric feature represented as an image via the 2D number theoretic transform (NTT) and random filtering. CIRF has perfect secrecy in that the transformed feature leaks no information about the original feature. However, CIRF cannot be...

Journal: :JTHTL 2008
Patrick R. Thiessen

Congress passed the Real ID Act (‘‘the Act’’) in 2005 and will require all states to implement much more stringent controls on the issuance of driver’s licenses and identification. The states face a number of obstacles in implementing the requirements including a lack of funding, lack of federal support and training, and a rapidly approaching implementation deadline. Under the Real ID Act, the ...

2014
Don Adjeroh Bojan Cukic Arun Ross

and Immigration (BORDERS) under grant number 2008-ST-061-BS0002. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security."

2011
Natarajan Meghanathan

Authenticating the identity of users is a critical issue in information security. Biometrics is known for recognizing users based on their physiological or behavioral traits as identifiers and these cannot be easily stolen unlike passwords or ID cards. Biometrics could be employed as the primary means for authentication, called user identification, as well as a complementary (secondary) method ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید