نتایج جستجو برای: biometrics access control

تعداد نتایج: 1614058  

2000

Dependable verification of individuals has transformed into a fundamentally valuable service in a scope of regions, in police or military settings as well as in non-military personnel (civilian) applications, for example, money related exchanges methodology or access control too. Traditional authentication systems rely on either knowledge, such as a password or a PIN number or possession such a...

2008
Christian Benderoth Jun Yan Kavon Hooshiar Rebecca L. Bell Gottfried Frankowski

Facial recognition of people can be used for the identification of individuals, or can serve as verification e.g. for access controls. The process requires that the facial data is captured and then compared with stored reference data. In order to obtain better identification and verification performance and to avoid a number of security weaknesses, 3-dimensional facial recognition systems can b...

2008
Sebastian Pape

There are at least two principal approaches to prevent users from sharing their anonymous credentials: adding valuable secrets into the system the user does not want to share or embedding biometric access control. This paper seeks to identify possible fields of application and to compare both approaches with respect to the credentials’ nontransferability. The paper shows that both approaches do...

2016
Sneha Gajbhiye

This paper proposes an enhanced method for personal authentication based on finger Knuckle Print using Gabor transform. In study shows that finger knuckle print (FKP) technique of a person can be used as a biometric trait in a biometric authentication system due to its uniqueness property. Hand-based person recognition provides a reliable, in low-cost and user-friendly viable solution for a ran...

2005
Guilherme Boreki Zimmer Alessandro

In this work a complete access control system based on a biometric code formed by invariant geometric features extracted from the hand’s image, a hardware key and a vital sign detector. The feature extraction process is based on the analysis of the curvature profile of the image, making the system invariant to the rotation and translation of the hand. This makes unnecessary the use of any kind ...

Journal: :I. J. Network Security 2005
Deholo Nali Carlisle M. Adams Ali Miri

Threshold attribute-based encryption (thABE) is a variant of identity-based encryption which views identities as sets of descriptive attributes. If a thABE ciphertext c is computed for a set ω of attributes, then, to decrypt c, a user must have keys associated with a sufficiently large subset of ω. One application of thABE is biometric-based access control (BBAC). Practical BBAC applications im...

Journal: :CoRR 2012
Noureddine Chikouche Cherif Foudil Mohamed Benmohammed

Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms ...

2008
Linchuan Li Yao Zhang Chengdong Ge Xiao Kan

With the advent of fast-growing digital, information, and network technologies and the desire for a more convenient lifestyle in recent years, users have higher security expectations for electronic systems. Additionally, e-Business, ATM, access control, and intelligent cards all require a safe and easy-to-use identification technology. The traditional identification method, user ID plus passwor...

2005
Richard A. Wasniowski

A wide spectrum of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual person. This paper considers multimodal biometric system and their applicability to access control, authentication and security applications. Strategies for feature extraction and sensor fusion are considered and contrasted. Issues related to performance assessme...

2008
Li Xueyan Peng-Yeng Yin

A reliable biometric system, which is essentially a pattern-recognition that recognizes a person based on physiological or behavioral characteristic [1], is an indispensable element in several areas, including ecommerce(e.g. online banking), various forms of access control security(e.g. PC login), and so on. Nowadays, security has been important for privacy protection and country in many situat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید