نتایج جستجو برای: biometric identification
تعداد نتایج: 416436 فیلتر نتایج به سال:
We propose the use of eye-movements as a biometric. A case study investigating potentials of eye-movement data for biometric purposes was conducted. Twelve participants’ eye-movements were measured during still and moving objects viewing. The measured data includes pupil sizes and their dynamics, gaze velocities and distances of infrared reflections of the eyes. For still object viewing of 1 se...
A Person's identity is an essential factor in this vastly connected society. Biometric Finger has wide acceptance as a genuine method for determining an individual’s identity. Biometric Finger authentication is reliable, since physical characteristics in humans are difficult to forge, harder to change or make copies. Biometric fingerprinting is one of the most popular and legally accepted biome...
This chapter is intended to introduce the role of biometrics in virtual communities and digital governments. Key steps for a biometric system to complete an identification or verification / authentication process are introduced. Main biometric techniques, such as fingerprint recognition, face recognition, iris recognition, and voice recognition, for the security purposes of identification and a...
A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Unlike other biometric such as fingerprints, hand geometry and face recognition, the distinct aspect of iris comes from randomly distributed features. Iris recognition is regarded as the most reliable and accurate biometric identification system availabl...
In the last decade of computer security, using biometrics for various types of security problems becomes more and more popular. The uniqueness of biometrics for any specific humanbeing makes the identification system more secure. Biometrics are widely used in person identification and verification. But using biometrics by means of cryptography is a new research area and there is less work in li...
Traditional identity verification in computer systems are done based on Knowledge based and token based identification these are prone to fraud. Unfortunately, these may often be forgotten, disclosed or changed. A reliable and accurate identification/verification technique may be designed using biometric technologies. Biometric authentication employs unique combinations of measurable physical c...
In this short paper we introduce a technique for a more private form of biometric identification to be used in PKI applications. We discuss how this technique can be applied within Internet banking. In particular we see the opportunity to apply these techniques in some of the developing PKI markets in Asia, where the legacy PKI systems will not form a barrier to entry. Biometric techniques have...
This paper examines the interplay between biometric technologies and advanced analytics, referred to as biometric analytics, as a way to detect fraudulent entries in a biometric system. We follow a systematic approach, based on cost estimating standards, to ascertain whether deploying such a capability is worthwhile. A simple case study is presented that illustrates the key aspects of our analy...
With the increasing development of global economy and information technology, more and more fields require reliable identity authentication. And with information age characterized by digitalization and recessiveness of identity, a key problem to be solved is how to identify a person’s identity accurately and ensure information security. In this regard, a variety of inherent human biometrics wer...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید