نتایج جستجو برای: biometrics access control

تعداد نتایج: 1614058  

2014
Gurdeep Kaur Parminder Singh

Iris recognition has been done by many researchers in last decade. Iris recognition plays an important role to improve efficiency in biometric identification due to its reliability in highly secured areas. Such as In Airports And Harbors, Access Control In Laboratories And Factories traditional issue is focused on full fingerprint images matching and face detection are used for identification o...

2013
S. S. Shylaja S. Natarajan

Most of current identification and verification systems like access control and surveillance require reliable person identification technique. The primary goal of such systems is that resources are accessed only by legitimate users. Inefficient person identification systems may become vulnerable thereby allowing impostors. Under these circumstances biometric systems such as automated face recog...

2004
Eiji Okamoto

Because of the increased connectivity of households to the Internet it is now possible to consider the latter as a medium for delivery of a variety of social services. In this work, we propose dispensing prescription drugs remotely via specialized internet-enabled devices. To our knowledge, there are no such medication delivery devices in use at this time, although the idea has most probably be...

2009
Aitor Moreno Fdz. de Leceta Mariano Rincón

The methods of biometric access control are currently booming due to increased security checks at business and organizational areas. Belong to this area applications based on fingerprints and iris of the eye, among others. However, although there are many papers related to facial recognition, in fact it is difficult to apply to real-world applications because of variations in lighting, position...

Journal: :Image Vision Comput. 2016
Esteban Vázquez-Fernández Daniel González-Jiménez

Accessing information from mobile devices has become mainstream nowadays; besides the clear benefits that mobility provides as a mean to improve efficiency, productivity and user convenience, it in turn does require proper methods for secure access control. In this paper, we discuss the use of face biometric technology and share our thoughts on key related issues and concerns: usability, securi...

2000

Dependable verification of individuals has transformed into a fundamentally valuable service in a scope of regions, in police or military settings as well as in non-military personnel (civilian) applications, for example, money related exchanges methodology or access control too. Traditional authentication systems rely on either knowledge, such as a password or a PIN number or possession such a...

2015
Kiran Gupta

Biometric is used in computer science as a form of identification and access control. Out of all techniques of biometric finger vein extraction is most effective method. The paper describes the various research done on finger vein till date. We are using a unique combination of the curvature points and mathematical curve analysis along with the minutiae point extraction methods for veins biomet...

2009
James Nicholson

Information privacy is maintained through authentication—the act of proving to a system that you are who you say you are. Unfortunately, current authentication methods are affected by a range of usability problems that impact significantly on the security of people’s data and access to secure systems. Recently, an experience-oriented security device, the Biometric Daemon, has been proposed whic...

2011
Shameem Sulthana

Abstract – In this modern world everything is possible and fast. In this paper we propose a multifaceted online e-voting system. The proposed system is capable to manage through internet with multiple scopes and focus on using evidence for making access control decisions in present computing environments. To protect the election accuracy, it is necessary to have an accurate electoral roll of el...

2005
RICHARD A. WASNIOWSKI

A wide spectrum of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual person. This paper considers multimodal biometric systems and their applicability to access control, authentication and security applications. Alternative strategies for feature extraction and sensor fusion are considered and contrasted. Issues related to perfor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید