To see the other types of publications on this topic, follow the link: About Fingerprint Recognition.

Journal articles on the topic 'About Fingerprint Recognition'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 journal articles for your research on the topic 'About Fingerprint Recognition.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Marák, Pavol, and Alexander Hambalík. "Fingerprint Recognition System Using Artificial Neural Network as Feature Extractor: Design and Performance Evaluation." Tatra Mountains Mathematical Publications 67, no. 1 (September 1, 2016): 117–34. http://dx.doi.org/10.1515/tmmp-2016-0035.

Full text
Abstract:
Abstract Performance of modern automated fingerprint recognition systems is heavily influenced by accuracy of their feature extraction algorithm. Nowadays, there are more approaches to fingerprint feature extraction with acceptable results. Problems start to arise in low quality conditions where majority of the traditional methods based on analyzing texture of fingerprint cannot tackle this problem so effectively as artificial neural networks. Many papers have demonstrated uses of neural networks in fingerprint recognition, but there is a little work on using them as Level-2 feature extractors. Our goal was to contribute to this field and develop a novel algorithm employing neural networks as extractors of discriminative Level-2 features commonly used to match fingerprints. In this work, we investigated possibilities of incorporating artificial neural networks into fingerprint recognition process, implemented and documented our own software solution for fingerprint identification based on neural networks whose impact on feature extraction accuracy and overall recognition rate was evaluated. The result of this research is a fully functional software system for fingerprint recognition that consists of fingerprint sensing module using high resolution sensor, image enhancement module responsible for image quality restoration, Level-1 and Level-2 feature extraction module based on neural network, and finally fingerprint matching module using the industry standard BOZORTH3 matching algorithm. For purposes of evaluation we used more fingerprint databases with varying image quality, and the performance of our system was evaluated using FMR/FNMR and ROC indicators. From the obtained results, we may draw conclusions about a very positive impact of neural networks on overall recognition rate, specifically in low quality.
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Ha-Young, and Jung-Gyu Kim. "Quality Evaluation Model about Efficiency for Fingerprint Recognition System." Journal of Digital Convergence 12, no. 6 (June 28, 2014): 215–21. http://dx.doi.org/10.14400/jdc.2014.12.6.215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dey, Swarnadip, Sajal Kumar Karmakar, Surajit Goon, and Prianka Kundu. "A SURVEY ON FINGERPRINT PATTERN RECOGNITION." International Journal of Research -GRANTHAALAYAH 7, no. 8 (August 31, 2019): 496–506. http://dx.doi.org/10.29121/granthaalayah.v7.i8.2019.704.

Full text
Abstract:
In this advance technical time, we all need accuracy to any security system. Among all security system, biometric recognition process is very popular in that time. Not only security purpose, identification is the main cause of using biometric characteristic. A pin, password combination is not enough to secure all things because that’s tracking is possible, but a person biometric characteristic is unique, so it is near to impossible to by-pass. In this paper, we discuss about the fingerprint types such as arch, loop, and whorl. We also discuss how the fingerprint will be recognized; however, where this technique is used in very large scale and what is the future scope of this technique, we discuss what improvement is needed in future.
APA, Harvard, Vancouver, ISO, and other styles
4

Husseis, Anas, Judith Liu-Jimenez, and Raul Sanchez-Reillo. "The Impact of Pressure on the Fingerprint Impression: Presentation Attack Detection Scheme." Applied Sciences 11, no. 17 (August 26, 2021): 7883. http://dx.doi.org/10.3390/app11177883.

Full text
Abstract:
Fingerprint recognition systems have been widely deployed in authentication and verification applications, ranging from personal smartphones to border control systems. Recently, the biometric society has raised concerns about presentation attacks that aim to manipulate the biometric system’s final decision by presenting artificial fingerprint traits to the sensor. In this paper, we propose a presentation attack detection scheme that exploits the natural fingerprint phenomena, and analyzes the dynamic variation of a fingerprint’s impression when the user applies additional pressure during the presentation. For that purpose, we collected a novel dynamic dataset with an instructed acquisition scenario. Two sensing technologies are used in the data collection, thermal and optical. Additionally, we collected attack presentations using seven presentation attack instrument species considering the same acquisition circumstances. The proposed mechanism is evaluated following the directives of the standard ISO/IEC 30107. The comparison between ordinary and pressure presentations shows higher accuracy and generalizability for the latter. The proposed approach demonstrates efficient capability of detecting presentation attacks with low bona fide presentation classification error rate (BPCER) where BPCER is 0% for an optical sensor and 1.66% for a thermal sensor at 5% attack presentation classification error rate (APCER) for both.
APA, Harvard, Vancouver, ISO, and other styles
5

Drahansky, Martin, Michal Dolezel, Jan Vana, Eva Brezinova, Jaegeol Yim, and Kyubark Shim. "New Optical Methods for Liveness Detection on Fingers." BioMed Research International 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/197925.

Full text
Abstract:
This paper is devoted to new optical methods, which are supposed to be used for liveness detection on fingers. First we describe the basics about fake finger use in fingerprint recognition process and the possibilities of liveness detection. Then we continue with introducing three new liveness detection methods, which we developed and tested in the scope of our research activities—the first one is based on measurement of the pulse, the second one on variations of optical characteristics caused by pressure change, and the last one is based on reaction of skin to illumination with different wavelengths. The last part deals with the influence of skin diseases on fingerprint recognition, especially on liveness detection.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Yue, Xiang Chen, and Yingke Lei. "Emitter Identification of Digital Modulation Transmitter Based on Nonlinearity and Modulation Distortion of Power Amplifier." Sensors 21, no. 13 (June 25, 2021): 4362. http://dx.doi.org/10.3390/s21134362.

Full text
Abstract:
Specific transmitter identification (SEI) is a technology that uses a received signal to identify to which individual radiation source the transmitted signal belongs. It can complete the identification of the signal transmitter in a non-cooperative scenario. Therefore, there are broad application prospects in the field of wireless-communication-network security, spectral resource management, and military battlefield-target communication countermeasures. This article demodulates and reconstructs a digital modulation signal to obtain a signal without modulator distortion and power-amplifier nonlinearity. Comparing the reconstructed signal with the actual received signal, the coefficient representation of the nonlinearity of the power amplifier and the distortion of the modulator can be obtained, and these coefficients can be used as the fingerprint characteristics of different transmitters through a convolutional neural network (CNN) to complete the identification of specific transmitters. The existing SEI strategy for changing the modulation parameters of a test signal is to mix part of the test signal with the training signal so that the classifier can learn the signal of which the modulation parameter was changed. This method is still data-oriented and cannot process signals for which the classifier has not been trained. It has certain limitations in practical applications. We compared the fingerprint features extracted by the method in this study with the fingerprint features extracted by the bispectral method. When SNR < 20 dB, the recognition accuracy of the bispectral method dropped rapidly. The method in this paper still achieved 86% recognition accuracy when SNR = 0 dB. When the carrier frequency of the test signal was changed, the bispectral feature failed, and the proposed method could still achieve a recognition accuracy of about 70%. When changing the test-signal baud rate, the proposed method could still achieve a classification accuracy rate of more than 70% for four different individual radiation sources when SNR = 0 dB.
APA, Harvard, Vancouver, ISO, and other styles
7

Xin, Yang, Yi Liu, Zhi Liu, Xuemei Zhu, Lingshuang Kong, Dongmei Wei, Wei Jiang, and Jun Chang. "A survey of liveness detection methods for face biometric systems." Sensor Review 37, no. 3 (June 19, 2017): 346–56. http://dx.doi.org/10.1108/sr-08-2015-0136.

Full text
Abstract:
Purpose Biometric systems are widely used for face recognition. They have rapidly developed in recent years. Compared with other approaches, such as fingerprint recognition, handwriting verification and retinal and iris scanning, face recognition is more straightforward, user friendly and extensively used. The aforementioned approaches, including face recognition, are vulnerable to malicious attacks by impostors; in such cases, face liveness detection comes in handy to ensure both accuracy and robustness. Liveness is an important feature that reflects physiological signs and differentiates artificial from real biometric traits. This paper aims to provide a simple path for the future development of more robust and accurate liveness detection approaches. Design/methodology/approach This paper discusses about introduction to the face biometric system, liveness detection in face recognition system and comparisons between the different discussed works of existing measures. Originality/value This paper presents an overview, comparison and discussion of proposed face liveness detection methods to provide a reference for the future development of more robust and accurate liveness detection approaches.
APA, Harvard, Vancouver, ISO, and other styles
8

Fei, Lunke, Shaohua Teng, Jigang Wu, and Imad Rida. "Enhanced Minutiae Extraction for High-Resolution Palmprint Recognition." International Journal of Image and Graphics 17, no. 04 (October 2017): 1750020. http://dx.doi.org/10.1142/s0219467817500206.

Full text
Abstract:
A palmprint generally possesses about 10 times more minutiae features than a fingerprint, which could provide reliable biometric-based personal authentication. However, wide distribution of various creases in a palmprint creates a number of spurious minutiae. Precisely and efficiently, minutiae extraction is one of the most critical and challenging work for high-resolution palmprint recognition. In this paper, we propose a novel minutiae extraction and matching method for high-resolution palmprint images. The main contributions of this work include the following. First, a circle-boundary consistency is proposed to update the local ridge orientation of some abnormal points. Second, a lengthened Gabor filter is designed to better recover the discontinuous ridges corrupted by wide creases. Third, the principal ridge orientation of palmprint image is calculated to establish an angle alignment system, and coarse-to-fine shifting is performed to obtain the optimal coordinate translation parameters. Following these steps, minutiae matching can be efficiently performed. Experiment results conducted on the public high-resolution palmprint database validate the effectiveness of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
9

Hounsell, Elizabeth F., MIA Young, and Michael J. Davies. "Glycoprotein Changes in Tumours: A Renaissance in Clinical Applications." Clinical Science 93, no. 4 (October 1, 1997): 287–93. http://dx.doi.org/10.1042/cs0930287.

Full text
Abstract:
1. Oligosaccharides linked to protein (glycoprotein) or lipid (glycolipid) are the major components at the outer surface of mammalian cells. Studies using antibodies and lectins have shown in the past that the oligosaccharides they recognize exhibit tumour-associated changes, i.e. they are carbohydrate tumour-associated antigens. 2. The oligosaccharides have been further characterized in recent years by structural analysis using high-resolution chromatographic techniques, MS and NMR. NMR gives an oligosaccharide fingerprint that is characteristic of monosaccharide type and linkage and which can be correlated with magnetic resonance spectroscopic data on fine-needle tissue aspirates. 3. Also of relevance is the new understanding of the molecular biology of MUC genes, which code for mucin protein backbones, and of the glycosyltransferase genes, which determine oligosaccharide structure and immunological recognition. 4. For these reasons, we believe that tumour-associated oligosaccharide changes should be revisited in the context of what we now know about structure and expression. This review synopsizes the past data using the detection of carbohydrate tumour-associated antigens by binding of lectins and antibodies, and puts it into the context of NMR fingerprints or signatures.
APA, Harvard, Vancouver, ISO, and other styles
10

Costa, Nattane, Laura Llobodanin, Inar Castro, and Rommel Barbosa. "Geographical Classification of Tannat Wines Based on Support Vector Machines and Feature Selection." Beverages 4, no. 4 (November 30, 2018): 97. http://dx.doi.org/10.3390/beverages4040097.

Full text
Abstract:
Geographical product recognition has become an issue for researchers and food industries. One way to obtain useful information about the fingerprint of wines is by examining that fingerprint’s chemical components. In this paper, we present a data mining and predictive analysis to classify Brazilian and Uruguayan Tannat wines from the South region using the support vector machine (SVM) classification algorithm with the radial basis kernel function and the F-score feature selection method. A total of 37 Tannat wines differing in geographical origin (9 Brazilian samples and 28 Uruguayan samples) were analyzed. We concluded that given the use of at least one anthocyanin (peon-3-glu) and the radical scavenging activity (DPPH), the Tannat wines can be classified with 94.64% accuracy and 0.90 Matthew’s correlation coefficient (MCC). Furthermore, the combination of SVM and feature selection proved useful for determining the main chemical parameters that discriminate with regard to the origin of Tannat wines and classifying them with a high degree of accuracy. Additionally, to our knowledge, this is the first study to classify the Tannat wine variety in the context of two countries in South America.
APA, Harvard, Vancouver, ISO, and other styles
11

Kamboj, Anjoo, Ishtdeep Kaur, and Narinder Kaur. "Recent Advances in Standardization of Herbal Drugs." Current Traditional Medicine 6, no. 4 (July 30, 2020): 278–99. http://dx.doi.org/10.2174/2215083805666190613141613.

Full text
Abstract:
Background: Herbal drugs play a significant role to maintain the human healthiness and to treat the ailments since the dawn of civilization. Moreover, these plants have provided many lead compounds that culminated in modern medicine. A single herb is regarded as mini-combinatorial library of phytoconstituents hence the quality control of herbal drugs in an herbal formulation is not an easy task because a number of factors impact their pharmacological efficiency and consistent therapeutic effects. Hence, to provide consistent beneficial therapeutic effects, standardized herbal products of consistent quality and purity are required. Methods: This review is based on publications obtained by a selective search in PubMed using the keywords “Standardized herbal products”, “fingerprinting”, “authentication”, “chemometric, hyphenated techniques”, “quality control of herbal drugs”, “identification”. Results: In the era of modernization, chromatographic techniques coupled with sophisticated spectroscopic analytical methods are used in estimating the authenticity, identity and characteristic of herbal products. Further, with the advancement of computer technology, chemometrics methods have become a leading tool with an unsupervised pattern recognition technique for handling multivariate data without prior knowledge about the studied samples and mines more beneficial and valuable information about the chemical entities from the raw data. Conclusion: Standardization of HDs chromatographic fingerprint is not always a perfect way to present all compounds. To assess the quality of medicinal plants, new ways are regularly being explored such as combination chemical fingerprint with biological methods, biofingerprint and metabolic fingerprint quality metrology, pharmacodynamics and export system of medicinal plants have been researched in some groups but still a significant amount of work is required to achieve a perfect system for quality evaluation of herbal drugs. Further, novel chemometric techniques have been unfolded that mines more beneficial and valuable information about the chemical entities from the raw data. So this review emphasis mainly on hyphenated techniques associated with chemometric method used in herbal drugs for identifying more valuable information and various methods for providing data, among which most commonly used techniques are chemometric resolution method and Principal Component Analysis (PCA) method.
APA, Harvard, Vancouver, ISO, and other styles
12

M, Kalyan Chakravarthi. "Realtime Face-Mask Detection on Raspberry Kit." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 2076–83. http://dx.doi.org/10.22214/ijraset.2021.37726.

Full text
Abstract:
Abstract: Recognition from faces is a popular and significant technology in recent years. Face alterations and the presence of different masks make it too much challenging. In the real-world, when a person is uncooperative with the systems such as in video surveillance then masking is further common scenarios. For these masks, current face recognition performance degrades. Still, difficulties created by masks are usually disregarded. Face recognition is a promising area of applied computer vision . This technique is used to recognize a face or identify a person automatically from given images. In our daily life activates like, in a passport checking, smart door, access control, voter verification, criminal investigation, and many other purposes face recognition is widely used to authenticate a person correctly and automatically. Face recognition has gained much attention as a unique, reliable biometric recognition technology that makes it most popular than any other biometric technique likes password, pin, fingerprint, etc. Many of the governments across the world also interested in the face recognition system to secure public places such as parks, airports, bus stations, and railway stations, etc. Face recognition is one of the well-studied real-life problems. Excellent progress has been done against face recognition technology throughout the last years. The primary concern to this work is about facial masks, and especially to enhance the recognition accuracy of different masked faces. A feasible approach has been proposed that consists of first detecting the facial regions. The occluded face detection problem has been approached using Cascaded Convolutional Neural Network (CNN). Besides, its performance has been also evaluated within excessive facial masks and found attractive outcomes. Finally, a correlative study also made here for a better understanding.
APA, Harvard, Vancouver, ISO, and other styles
13

Huda, Syamsul, and Enjang Burhanudin Yusuf. "Biometrics in the Quran Perspective: Definition, History, and Type." Didaktika Religia 7, no. 2 (December 14, 2019): 276–98. http://dx.doi.org/10.30762/didaktika.v7i2.2180.

Full text
Abstract:
The Qur’an is the holy book which is inexhaustibly studied by many people. It has inspired a lot of thoughts, research and studies. The discussions of human in the Qur’an are numerous, ranging from the creation, life, naming, relationships of one another, and etc.. The Qur’an mentions that man is created in the perfect form, which is given advantages over other creatures. With his intellectual power, human tries to explore knowledge about him and understand his nature as a creature of God. Biometrics views human as a unique being. Biometrics sees that parts of the human body can be used as a security device because each human has his special uniqueness different from one another. Because of this specificity, human invents devices that refer to all materials, types of equipment, labours, and man-made systems to replicate the existing systems in nature. At present, the scientific community really needs such a device, especially in the field of nanotechnology, robot technology, artificial intelligence, medicine and military. Biometric normally used in the form of authentification, including Introduction to Fingerprint, Face Recognition, Recognition Retina or Iris, Geometry Arm, Geometry Finger, introduction of Palms, Voice Recognition, Introduction to Signatures, DNA (Deoxyribonucleic Acid), Thermal Imaging (Body Temperature), Shape Ear, Body Odor, Body Movement. On some types of biometric authentication on top of the al-Qur’an gives a signal on Surah Fussilat [41]: 20-22.
APA, Harvard, Vancouver, ISO, and other styles
14

Fuada, Syifaul, Ichwan Nul Ichsan, Hafiyyan Putra Pratama, Dewi Indriati Hadi Putri, Galura Muhammad Suranegara, Endah Setyowati, and Ahmad Fauzi. "Workshop Internet-Of-Things untuk Guru dan Siswa Sekolah Menengah di Purwakarta, Jawa Barat, Guna Menunjang Kompetensi Era Industri 4.0." J-ABDIPAMAS (Jurnal Pengabdian Kepada Masyarakat) 4, no. 2 (October 22, 2020): 39. http://dx.doi.org/10.30734/j-abdipamas.v4i2.938.

Full text
Abstract:
ABSTRACTInternet of Things (IoT) is one of the technological paradigms developed in the industrial revolution 4.0. The concept of IoT is an object can transfer data over a network without interaction from human-to-human or from human-to-computer. One of the IoT implementations in the education sector is the attendance system using IoT-based Radio Frequency Identification (RFID). The attendance machines such as fingerprints and face recognition have a relatively high-cost compared to RFID machines. Hence, if the number of attendance machines within the School is limited, it will be less efficient for a large number of students and vulnerable to queuing. The RFID implementation in the Education sector was socialized through a Workshop with students and teachers of the secondary schools in Purwakarta, West Java, as the participants. To provide additional insight and expertise about the RFID-IoT concept to the workshop participants, this community service activity needs to be done. Several benefits will be obtained through this workshop, including saving paper use and efficiency, because the RFID-based IoT can reduce the teachers’ workload in processing the student attendance lists. Teachers are also invited to this workshop so they can guide their students and pass on the additional skills. Moreover, the invited teacher will teach new knowledge related to workshop material to other students in the School.Keywords: Internet-of-things, RFID, Mesin Kehadiran, Workshop, Purwakarta ABSTRAKInternet of Things (IoT) merupakan salah satu paradigma teknologi yang dikembangkan dalam revolusi industri 4.0. Konsep IoT adalah suatau objek dapat mentransfer data lewat jaringan tanpa adanya interaksi dari manusia ke manusia ataupun dari manusia ke perangkat komputer. Salah satu implementasinya pada bidang pendidikan yaitu sistem kehadiran menggunakan Radio Frequency Identification (RFID) berbasis teknologi IoT. Mesin kehadiran seperti fingerprint dan face recognition memiliki harga yang relatif mahal dibandingkan mesin RFID. Sementara, jika jumlah mesin kehadiran yang ada di sekolah terbatas, hal ini sedikit kurang efisien untuk jumlah siswa yang sangat banyak dan rentan menimbulkan antrian. Implementasi RFID di bidang Pendidikan ini disosialisasikan melalui sebuah Workshop dengan siswa dan Guru dari sekolah menengah di Purwakarta, Jawa Barat sebagai peserta. Untuk dapat memberikan tambahan wawasan dan keterampilan mengenai mesin kehadiran RFID dengan konsep IoT kepada peserta Workshop, maka pengabdian masyarakat ini perlu dilakukan. Beberapa manfaat akan didapat memalui workshop ini, termasuk menghemat penggunaan kertas dan efisiensi karena RFID berbasis IoT mengurangi beban kerja guru dalam mengolah data kehadiran siswa. Guru turut diundang dalam workshop ini agar mereka dapat membimbing siswanya dan menularkan tambahan keterampilan dan wawasan yang didapat dari kegiatan PKM ini kepada siswa lainnya di sekolah..Kata Kunci: Internet-of-things, RFID, Workshop, Purwakarta
APA, Harvard, Vancouver, ISO, and other styles
15

Gabius, Hans-Joachim. "Glycobiomarkers by glycoproteomics and glycan profiling (glycomics): emergence of functionality." Biochemical Society Transactions 39, no. 1 (January 19, 2011): 399–405. http://dx.doi.org/10.1042/bst0390399.

Full text
Abstract:
Glycans stand out from all classes of biomolecules because of their unsurpassed structural complexity. This is generated by variability in anomeric status of the glycosidic bond and its linkage points, ring size, potential for branching and introduction of diverse site-specific substitutions. What poses an enormous challenge for analytical processing is, at the same time, the basis for the fingerprint-like glycomic profiles of glycoconjugates and cells. What's more, the glycosylation machinery is sensitive to disease manifestations, earning glycan assembly a reputation as a promising candidate to identify new biomarkers. Backing this claim for a perspective in clinical practice are recent discoveries that even seemingly subtle changes in the glycan structure of glycoproteins, such as a N-glycan core substitution by a single sugar moiety, have far-reaching functional consequences. They are brought about by altering the interplay between the glycan and (i) its carrier protein and (ii) specific receptors (lectins). Glycan attachment thus endows the protein with a molecular switch and new recognition sites. Co-ordinated regulation of glycan display and presentation of the cognate lectin, e.g. in cancer growth regulation exerted by a tumour suppressor, further exemplifies the broad functional dimension inherent to the non-random shifts in glycosylation. Thus studies on glycobiomarkers converge with research on how distinct carbohydrate determinants are turned into bioactive signals.
APA, Harvard, Vancouver, ISO, and other styles
16

Heigl, Michael, Enrico Weigelt, Andreas Urmann, Dalibor Fiala, and Martin Schramm. "Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data." Electronics 10, no. 17 (September 4, 2021): 2160. http://dx.doi.org/10.3390/electronics10172160.

Full text
Abstract:
Future-oriented networking infrastructures are characterized by highly dynamic Streaming Data (SD) whose volume, speed and number of dimensions increased significantly over the past couple of years, energized by trends such as Software-Defined Networking or Artificial Intelligence. As an essential core component of network security, Intrusion Detection Systems (IDS) help to uncover malicious activity. In particular, consecutively applied alert correlation methods can aid in mining attack patterns based on the alerts generated by IDS. However, most of the existing methods lack the functionality to deal with SD data affected by the phenomenon called concept drift and are mainly designed to operate on the output from signature-based IDS. Although unsupervised Outlier Detection (OD) methods have the ability to detect yet unknown attacks, most of the alert correlation methods cannot handle the outcome of such anomaly-based IDS. In this paper, we introduce a novel framework called Streaming Outlier Analysis and Attack Pattern Recognition, denoted as SOAAPR, which is able to process the output of various online unsupervised OD methods in a streaming fashion to extract information about novel attack patterns. Three different privacy-preserving, fingerprint-like signatures are computed from the clustered set of correlated alerts by SOAAPR, which characterizes and represents the potential attack scenarios with respect to their communication relations, their manifestation in the data’s features and their temporal behavior. Beyond the recognition of known attacks, comparing derived signatures, they can be leveraged to find similarities between yet unknown and novel attack patterns. The evaluation, which is split into two parts, takes advantage of attack scenarios from the widely-used and popular CICIDS2017 and CSE-CIC-IDS2018 datasets. Firstly, the streaming alert correlation capability is evaluated on CICIDS2017 and compared to a state-of-the-art offline algorithm, called Graph-based Alert Correlation (GAC), which has the potential to deal with the outcome of anomaly-based IDS. Secondly, the three types of signatures are computed from attack scenarios in the datasets and compared to each other. The discussion of results, on the one hand, shows that SOAAPR can compete with GAC in terms of alert correlation capability leveraging four different metrics and outperforms it significantly in terms of processing time by an average factor of 70 in 11 attack scenarios. On the other hand, in most cases, all three types of signatures seem to reliably characterize attack scenarios such that similar ones are grouped together, with up to 99.05% similarity between the FTP and SSH Patator attack.
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Li, Qinqin Wang, Yuanzhong Wang, and Yunmei Wang. "Comparison of Geographical Traceability of Wild and Cultivated Macrohyporia cocos with Different Data Fusion Approaches." Journal of Analytical Methods in Chemistry 2021 (July 21, 2021): 1–13. http://dx.doi.org/10.1155/2021/5818999.

Full text
Abstract:
Poria originated from the dried sclerotium of Macrohyporia cocos is an edible traditional Chinese medicine with high economic value. Due to the significant difference in quality between wild and cultivated M. cocos, this study aimed to trace the origin of the fungus from the perspectives of wild and cultivation. In addition, there were quite limited studies about data fusion, a potential strategy, employed and discussed in the geographical traceability of M. cocos. Therefore, we traced the origin of M. cocos from the perspectives of wild and cultivation using multiple data fusion approaches. Supervised pattern recognition techniques, like partial least squares discriminant analysis (PLS-DA) and random forest, were employed in this study using. Five types of data fusion involving low-, mid-, and high-level data fusion strategies were performed. Two feature extraction approaches including the selecting variables by a random forest-based method—Boruta algorithm and producing principal components by the dimension reduction technique of principal component analysis—were considered in data fusion. The results indicate the following: (1) The difference between wild and cultivated samples did exist in terms of the content analysis of vital chemical components and fingerprint analysis. (2) Wild samples need data fusion to realize the origin traceability, and the accuracy of the validation set was 95.24%. (3) Boruta outperformed principal component analysis (PCA) in feature extraction. (4) The mid-level Boruta PLS-DA model took full advantage of information synergy and showed the best performance. This study proved that both geographical traceability and optimal identification methods of cultivated and wild samples were different, and data fusion was a potential technique in the geographical identification.
APA, Harvard, Vancouver, ISO, and other styles
18

Choudhary, Kartik, and Rizwan Khan. "A Review on Biometric Technology." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (April 30, 2018): 101. http://dx.doi.org/10.23956/ijarcsse.v8i4.638.

Full text
Abstract:
Biometric Technology has turned out to be a popular area of research in computer vision and one of the most successful applications for identifying humans by capturing and analysing the sole feature or characteristic of individual which is possessed by them and involves their Physical and Behavioral characteristics. For the individual validation and authentication the biometric system has this responsibility. Biometric Technology started from the fingerprints recognition and later on improvements were done in it to make it more secure which involves the face recognition and iris Recognition. Almost both of them are available and regarded as the accurate and reliable technology for biometric validation system. This review paper is all about Face recognition techniques in biometric locking system and Iris recognition technique of identification and the ways of making locking systems ways more efficient, full of ease, more secure, and far better than before so as to make locking or security stronger. It discusses about face recognition technique, its working and its application in different sector along with iris recognition, its working, its application.
APA, Harvard, Vancouver, ISO, and other styles
19

Lazic, Palucci, De Dominicis, Nuvoli, Pistilli, Menicucci, Colao, and Almaviva. "Integrated Laser Sensor (ILS) for Remote Surface Analysis: Application for Detecting Explosives in Fingerprints." Sensors 19, no. 19 (October 1, 2019): 4269. http://dx.doi.org/10.3390/s19194269.

Full text
Abstract:
Here, we describe an innovative Integrated Laser Sensor (ILS) that combines four spectroscopic techniques and two vision systems into a unique, transportable device. The instrument performs Raman and Laser-Induced Fluorescence (LIF) spectroscopy excited at 355 nm and Laser-Induced Breakdown Spectroscopy (LIBS) excited at 1064 nm, and it also detects Laser Scattering (LS) from the target under illumination at 650 nm. The combination of these techniques supplies information about: material change from one scanning point to another, the presence of surface contaminants, and the molecular and elemental composition of top target layers. Switching between the spectroscopic techniques and the laser wavelengths is fully automatic. The instrument is equipped with an autofocus, and it performs scanning with a chosen grid density over an interactively-selected target area. Alternative to the spectroscopic measurements, it is possible to switch the instrument to a high magnification target viewing. The working distances tested until now are between 8.5 and 30 m. The instrument is self-powered and remotely controlled via wireless communication. The ILS has been fully developed at ENEA for security applications, and it was successfully tested in two outdoor campaigns where an automatic recognition of areas containing explosives in traces had been implemented. The strategies for the identification of nitro-compounds placed on various substrates as fingerprints and the results obtained at a working distance of 10 m are discussed in the following.
APA, Harvard, Vancouver, ISO, and other styles
20

PETERS, T. M., C. BERGHOLD, D. BROWN, J. COIA, A. M. DIONISI, A. ECHEITA, I. S. T. FISHER, et al. "Relationship of pulsed-field profiles with key phage types of Salmonella enterica serotype Enteritidis in Europe: results of an international multi-centre study." Epidemiology and Infection 135, no. 8 (February 19, 2007): 1274–81. http://dx.doi.org/10.1017/s0950268807008102.

Full text
Abstract:
SUMMARYSalmonella is one of the most common causes of foodborne infection in Europe with Salmonella enterica serovar Enteritidis (S. Enteritidis) being the most commonly identified serovar. The predominant phage type for S. Enteritidis is phage type (PT) 4, although PT 8 has increased in incidence. Within these phage types, pulsed-field gel electrophoresis (PFGE) provides a method of further subdivision. The international project, Salm-gene, was established in 2001 to develop a database of PFGE profiles within nine European countries and to establish criteria for real-time pattern recognition. It uses DNA fingerprints of salmonellas to investigate outbreaks and to evaluate trends and emerging issues of foodborne infection within Europe. The Salm-gene database contains details of about 11 700 S. Enteritidis isolates, demonstrating more than 65 unique PFGE profiles. The clonal nature of S. Enteritidis is evidenced by the high similarity and distribution of PFGE profiles. Over 56% (6603/11 716) of the submitted isolates of several different phage types were profile SENTXB.0001, although this profile is most closely associated with PT 4. The next most common profiles, SENTXB.0002 and SENTXB.0005, were closely associated with PT 8 and PT 21 respectively. Studies to investigate the relationship of profile types with outbreaks and possible vehicles of infection suggest that the incidence of PFGE profile SENTXB.0002, and thus PT 8, in some countries may be due to importation of foods or food production animals from Eastern Europe, where PT 8 is amongst the most frequently identified phage types. Collation of subtyping data, especially in the commonly recognized phage types, is necessary in order to evaluate trends and emerging issues in salmonella infection.
APA, Harvard, Vancouver, ISO, and other styles
21

More, Prof P. A., Atharva Lingayat, Vivek Masudge, and Sagar Singar. "Biometric Vehicle Access And Ignition System Using Fingerprint Recognition." International Journal of Advanced Research in Science, Communication and Technology, June 16, 2021, 728–35. http://dx.doi.org/10.48175/ijarsct-1469.

Full text
Abstract:
As variety of urban cars is growing very increasingly with the economy, and considering the individuals are becoming a lot about vehicle thievery which creates larger market for anti vehicle theft products. After that A lots of anti theft devices are being installed in vehicle but result is still unsatisfactory. Since every kind of devices has its own drawbacks therefore ,enhanced system has been proposed in this paper to ensure the vehicle safety and track of vehicle in the event of theft of vehicle. In this system we are using fingerprint based authentication to ignite the engine in addition to key mechanism. In this system we are using a Fingerprint Module (R307),Dc motor ,Motor Driver IC, CP-2102 USB to TTL Module, A MC ATMega 328P on a Self Made ARD. Uno board. A Guiding Wire for guiding the Structure, and Software IDE (Arduino IDE) for Programming the MC. The Heart of the entire System is MC ATMega 328P which is completely responsible for entire operation of Biometric authentication access to owner of vehicle.
APA, Harvard, Vancouver, ISO, and other styles
22

"Dynamic Fingerprint Pattern Lock Mobile Application using Android." International Journal of Recent Technology and Engineering 8, no. 2S5 (August 29, 2019): 222–25. http://dx.doi.org/10.35940/ijrte.b1045.0782s519.

Full text
Abstract:
In this paper we are examining about information security in mobile. Numerous cell phone creators currently fuse biometric security highlights into their products. Furthermore, some gadget makers presently enable application designers to utilize these highlights through their product advancement packs (SDKs). In this investigation, we use fingerprint recognition with a pattern, to build up a security for mobile application. Before, application had the single time finger press. Here we have utilized various time check and long-term hold confirmation techniques. Inside a constrained time, outline, the unique fingerprint image can be utilized to open the app which has classified information identified with government, banking, training, and so on which must be verified. As the generation of cell phones with fingerprint recognition keeps on expanding, this type of authentication system, the one we present in this paper, will turn into a great safety measure
APA, Harvard, Vancouver, ISO, and other styles
23

K., Krishna Prasad. "Multifactor Authentication Model using Fingerprint Hash code and Iris Recognition." International Journal of Management, Technology, and Social Sciences, September 10, 2018, 47–56. http://dx.doi.org/10.47992/ijmts.2581.6012.0046.

Full text
Abstract:
Authentication is using one or multiple mechanisms to show that you are who you claim to be. As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services. The modern research study reveals that fingerprint is not so secured like secured a password which consists of alphanumeric characters, number and special characters. This model proposes instead of password iris of the user, which is also one of the strongest physiological biometrics recognition systems. The iris is absolutely fashioned by way of eighth month of adults, and remains stable throughout the life span. In recent years, the usage of Iris for human identification has substantially grown due to the tremendous advantages with traditional or usual or normal authentication techniques based on private identity numbers (PINs) or passwords. In fact, given that iris is intrinsically and uniquely related to a character, they can't be forgotten, without difficulty stolen or reproduced. But, the use of Iris may additionally have some drawbacks related to viable safety breaches. On the grounds that iris traits are limited and immutable, if an attacker has gets access to the database where they are saved, the system security may be irreparably compromised. To deal with this hassle, an iris structure with template protection becomes very much essential. In this paper the different methods of iris recognition are studied with its features. This paper also discusses about multifactor authentication model.
APA, Harvard, Vancouver, ISO, and other styles
24

Hassan, Afnanul, Zaria Fahamida, Proloy Sen, and Dr Syed Akhter Hossain. "Smart Lock using Image Recognition." Global Journal of Computer Science and Technology, January 8, 2021, 29–33. http://dx.doi.org/10.34257/gjcstgvol20is6pg29.

Full text
Abstract:
In the 21st century, for a digital lifestyle in a smart city, security is one of the core ingredients to ensure digital continuity. The existing smart security technologies use a smartphone, card, and fingerprint that need additional devices to carry or can spread out infectious diseases. Now it is high time to think about an additional device free and more time-consuming technique. So, an intelligent system is proposed in this paper to secure our doors with face authentication. The human face is a unique and easy identifying feature of a human. The registered user’s image is saved in the device as a dataset to train the lock. The system recognizes the registered faces very fast and controls the hardware part to be unlocked. The system is capable of detecting and recognizing human faces from a real-time video. It is usable in the door lock, car lock, hutch, and many more security purposes.
APA, Harvard, Vancouver, ISO, and other styles
25

Arifin, Chabib, and Hartanto Junaedi. "Emotion Sound Classification with Support Vector Machine Algorithm." Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, April 16, 2018, 181–90. http://dx.doi.org/10.22219/kinetik.v3i2.610.

Full text
Abstract:
Speech one of the biometric characteristic owned by human being, as well as fingerprint, DNA, retina of the eyes and so not the two human beings who have the same voice. Human emotion is a matter that can only be predicted through the face of a person, or from the change of facial expression but it turns out human emotions can also be detected through the spoken voice. Someone emotion are happy, angry, neutral, sad, and surprise can be detected through speech signal. The development of voice recognition system is still running at this moment. So that ini this research, the analysis of someone emotion through speech signal. Some related research about the sound aims to have process of identity recognition gender recognition, Emotion recognition based on conversation. In this research the writer does research on the emotional classification of speech two classes started from happy, angry, neutral, sad and surprise while the used algorithm in this research is SVM (Support Vector Machine) with alghoritmMFCC (Mel-frequency cepstral coefficient)for extraction where it contains filter process that adapted to human’s listening. The result of the implementation process of both algorithms gives accuracy level ashappy=68.54%, angry=75.24%, neutral=78.50%, sad=74.22% and surprise=68.23%.
APA, Harvard, Vancouver, ISO, and other styles
26

"A Novel Based Algorithm for the Extraction of Blood Vessels Present In Retina." International Journal of Innovative Technology and Exploring Engineering 9, no. 1 (November 10, 2019): 2878–83. http://dx.doi.org/10.35940/ijitee.a9102.119119.

Full text
Abstract:
The purpose of tagging and describe about individuals, using the uniqueness and measurable characteristics of Biometric identifiers. These characteristics are classified as Behavioral versus Physiological. Information related to shape of body is presented in the characteristics of Physiological biometric identifiers with example of DNA, iris recognition, hand geometry, palm print, retina, face and fingerprint. Reliable and stable authentication is providing by the Human retina, so it is also consider as biometric system. In this paper we proposing a modified algorithm for the measurement and detecting of blood vessels in the retina with the uses of KNNRF classifier. Extracting the features of input retinal images are matching with the trained features are classified byusing the KNNRF classifier. For the purpose of classifying clustered blood vessels with high accuracy, KNNRF method is used.
APA, Harvard, Vancouver, ISO, and other styles
27

"Assessment on Extraction and Matching of Finger Vein and Iris Pattern based Authentication System." International Journal of Recent Technology and Engineering 8, no. 5 (January 30, 2020): 4182–94. http://dx.doi.org/10.35940/ijrte.e6642.018520.

Full text
Abstract:
Biometrics uses human behavioral features for personal identification and has become most popular and promising alternatives than the traditional methods. The vein pattern is hidden inside the body and hence the problem of forgery in vein is consequently reduced when compared to fingerprint. Iris is one of the most reliable biometric traits due to its uniqueness and stability. The uniqueness of iris texture comes from the random and complex structures such as furrows, ridges, crypts, rings, corona, and freckles etc. which are formed during gestation. Often iris is combined with other biometric features for robust biometric systems. The finger vein pattern acquired under infrared light is used to design an accurate personal authentication system. The personal identification method based on vein extract the patterns from an unclear original image and line tracking operations with randomly varied start points are repeatedly carried out. This paper reviews various techniques introduced in finger vein and iris recognition system. This paper mainly focuses in introduction about finger vein and iris pattern, survey of existing research works done in the process under finger vein combined with iris recognition such as image acquisition, vein and iris enhancement, vein and iris pattern extraction and vein and iris pattern matching. Finally the challenges and future work are discussed in order to improve the left finger vein pattern with right iris and right finger vein pattern with left iris recognition.
APA, Harvard, Vancouver, ISO, and other styles
28

"Incorporating Metadata in Multibiometric Score-Level Fusion: an Optimized Architecture." International Journal of Innovative Technology and Exploring Engineering 9, no. 1 (November 10, 2019): 5290–305. http://dx.doi.org/10.35940/ijitee.a4118.119119.

Full text
Abstract:
This manuscript presents a review on multibiometrics using ancillary information, in addition to the main biometric data. The proposed method involves taking non-biometric information into account in the biometric recognition process to improve system performance. This ancillary information can come from the user (the skin color), the sensor (the camera flash, etc.) or the operating environment (the ambient noise). Moreover, the paper presents an extension of the adapted sequential fusion framework through a complete description of the method used for the score-level fusion architecture presented at the IEEE BioSmart 2019 Proceedings. An optimized score-level fusion architecture is proposed. An introduction of new concepts (namely “biochemical features” and “multi origin biometrics”) is also made. The first part of the paper highlights the various biometric systems developed up to now, their architecture and characteristics. Then, the manuscript discussed about multibiometrics through its advantages, its diversity and the different levels of fusion. An attention was paid to the score-level fusion before addressing the consideration of ancillary information (or metadata) in multibiometrics. Dealing with the affective computing, the influence of emotion on the performance of biometric systems is explored. Finally, a typology of biometric adaptation is discussed. As an application, the proposed methodology will implement a multibiometric system using the face, contactless fingerprint and skin color. A single sensor will be used (a camera) with two shots while the skin color will be extracted automatically from the facial image.
APA, Harvard, Vancouver, ISO, and other styles
29

"Intelligent and Secured Bag using Artificial Intelligence." International Journal of Recent Technology and Engineering 9, no. 1 (May 30, 2020): 2237–40. http://dx.doi.org/10.35940/ijrte.a2686.059120.

Full text
Abstract:
The Intelligent and Secured Bag is an application-specific design that can be useful for the security of important documents and valuable materials. The bag can carry out various features for daily use such as security check using face recognition. The system uses Artificial Intelligence for more effective results in terms of security in comparison with the existing system which uses fingerprint scanner. The Secured Bag consists of the facility of face recognition for advance security solution. The face recognition with Haar Cascade Classifier which is a machine learning object detection algorithm is used for the locking and unlocking of the bag which contributes in the intelligent part of the project. In order to reduce the forgetfulness of senior citizens and even professionals to pack the required items, RF-ID Technology will be used. It maintains the list of objects present in the bag. The RF-ID tags are attached to all the objects which is to be placed inside the bag. The RF-ID reader is used to read the tags which enters the bag. When any object will be missing from the bag, the message of the list of objects missing is send to the users mobile. For the security of the bag from thefts, magnetic lock is introduced. When the face of the person accessing the bag is not matched with the already existing database indicating that an unauthorized person is trying to open the bag, the lock will remain in the locked position. Thus, the person cannot access the bag. When the face of the person accessing the bag matches with the already existing database indicating that an authorized person is trying to open the bag, the lock will be unlocked and the person can access the bag. All the alert messages and the message of the list of items present and missing from the bag is sent to the owner using a GSM modem. The main advantage of using the Smart Bag is protection from thefts, also the owner of the bag gets informed about the theft and the items missing from the bag through GSM. Raspberry Pi will control all the distinguishable features. The smart bag can be used by almost all people including students, doctors, military people, aged people, etc. In general, it can be used in the daily life without the fear of something being stolen or missing from the bag.
APA, Harvard, Vancouver, ISO, and other styles
30

Manju, V., and S. Madhumathi. "Improving Net Banking Security with Face Recognition Based Bio-Metric Verification." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, May 1, 2019, 82–91. http://dx.doi.org/10.32628/cseit195335.

Full text
Abstract:
Internet banking services must be more responsive towards security requirements. Now a days with the network world, the way for cybercrime is become easier for hacking purpose. Because of this reason, network security has become one of the biggest concerns of today security environment. While there is no doubt that Internet banking transaction must have layered safety towards protection threats, the vendors should technique protection issues as part of their provider services. And heard a lot about hackers and crackers ways to steal any logical password or pincode number character, crimes of ID cards or credit cards fraud or security breaches. In existing work, Identification can be processed to a username and is used to authorize access to a system. As usernames can be lost or stolen, it is necessary to validate that the intended user is really the person he or she claims to be – the authentication process. Biometric based totally authentication and identification structures are the new answers to deal with the issues of safety and privacy. The Face Recognition is the examine of physical or behavioral traits of individual used for the identification of individual. These biometric characteristics of a person include the various features like fingerprints, face, hand geometry, voice, and iris biometric device. Here implement real time secure authentication system using face biometrics for authorized the person for online banking system. The general objective of our project is to develop fully functional face recognition, verification system provide and understand the key aspects of these major technologies, social environmental system and performance aspects. And also provide multiparty access system to allow the multiple persons to access the same accounts by providing access privileges to original account holders. Experimental results show that the proposed system provide high level security in online transaction system than the existing traditional cryptography approach
APA, Harvard, Vancouver, ISO, and other styles
31

"A Multi Biometric IRIS Recognition System based on a Profound Learning Method." International Journal of Recent Technology and Engineering 8, no. 3S (October 22, 2019): 637–43. http://dx.doi.org/10.35940/ijrte.c1127.1083s19.

Full text
Abstract:
Biometrics is the estimation of natural qualities which are one of a kind to a person for recognizing and confirming the person. The estimations incorporate fingerprints, retinal outputs, iris checks, voice designs, facial qualities, palm prints, and so forth.., Biometric frameworks have been especially effective in distinguishing an obscure individual via looking through a database of attributes and by confirming the case of a person by contrasting his/her trademark with that put away in a database. To expand the heartiness of the framework and to make it more secure, different attributes of a similar individual are utilized. This is alluded to as multimodal biometrics. In this paper we talked about a portion of the multimodal biometric frameworks. Here a bi-modular biometric acknowledgment framework in light of iris, palm-print. Wavelet and curve let change and Gabor-edge channel are utilized to extricate includes in various weighing machine moreover introductions starting iris as well as palm print, finer points taking out in addition to arrangement is utilized in favour of coordinating. diverse combination calculations together with achieve based, positionbased plus choice depend on techniques are utilized to-join the consequences of two constituents. We additionally recommend another rank-based combination calculation Bio Maximum Inverse Rank (BMIR) which is vigorous as for varieties in scores and furthermore awful positioning from a module. IITD iris databases and CASIA datasets for palm print and unique mark are utilized in this investigation. The examinations demonstrate the adequacy of our combination strategy, profound learning, neural systems and our Bi-modular biometric acknowledgment framework in contrast with existing multi-modular acknowledgment frameworks.
APA, Harvard, Vancouver, ISO, and other styles
32

Rimbaud, Robin. "Scan and Deliver." M/C Journal 8, no. 4 (August 1, 2005). http://dx.doi.org/10.5204/mcj.2390.

Full text
Abstract:
As I sit here, the radio announcer announces a feature on the forthcoming Big Brother series, another chance to engage in this collective shared experience, another opportunity to revel in your very own voyeuristic impulse, what once was private is now made public. Curiously it’s almost fifteen years ago since I released the first Scanner recordings Scanner 1 [1992] and Scanner 2 [1993] featuring the intercepted cellular phone conversations of unsuspecting talkers, which I edited into minimalist musical settings as if they were instruments, bringing into focus issues of privacy and the dichotomy between the public and the private spectrum. Sometimes the high frequency of cellular noise would pervade the atmosphere, at other junctures it would erupt into words and melt down to radio hiss. Intercepted in the data stream, transmissions would blend, blurring the voices and rupturing the light, creating audio transparencies of dreamy, cool ambience. In many ways they pre-empted our reality culture as it exists today. Having the technology to peel open virtually any zone of information and consume the contents, I used the scanner device itself – a modestly sophisticated radio receiver – to explore the relationship between the public and private spheres. Working with sound in this manner suggested a means of mapping the city, in which the scanner device provided an anonymous window into reality, cutting and pasting information to structure an alternative vernacular. It was a rare opportunity to record experience and highlight the threads of desire and interior narrative that we weave into our everyday lives. The sounds of an illicit affair, a liaison with a prostitute, a drug deal or a simple discussion of “what’s for dinner” all exist within an indiscriminate ocean of signals flying overhead, but just beyond our reach. Applying the tools in this manner, I was able to twist state-of-the-art technology in unconventional ways to intercept highly personalised and voyeuristic forms of info food: sound recordings, phone scans, modem and Net intercepts, all of which became material for my multi-layered soundscapes. Every live performance, recording or mix that has followed is still in its way a “true” representation of that moment in time and in that way relates to performance art in the temporality of its data – a “Sound Polaroid” – a way of capturing the moment in sound similar to that of a Polaroid camera, which seizes an image and immediately exposes it to permanence of interception. Is there an innate desire to remain invisible and yet hear the world, scanning it for its stories and secrets? Today for our media saturated culture, this almost fetishistic desire to know all, is expressed in the publishing of private communications, of letters, faxes or telephone conversations, giving rise to all kinds of debate on the nature of privacy and the extent to which its protection can be legislated for. Images come to mind from Wim Wender’s film Wings of Desire where the lead character is a fallen angel left on earth to try and understand the madness of mortal behaviour. At various points he is able to pass through public spaces, the library, an underground train, people’s innermost thoughts and concerns become audible to him while he remains invisible to them. It is here that these Scanner CDs mirror this fantasy of the 20th century: to know everything and to have access to all secrets without being observed. This desire continues to inform our entertainment and cultural channels and looks to continue to do so for some years yet. This listening-in and scanning of the private channels has a clear relationship to surveillance, and connects to an aesthetic explored in works such as the seminal video piece, Der Riese – The Giant (1983) where the artist collaged the contents of surveillance cameras from German supermarkets, subway platforms, traffic crossings and shopping centres, using the tools of commercial voyeurism. Without a director, nor actors nor script, this is a dehumanised exploration of a contemporary history of our post-modern times. Connecting the invisible dots between Vertov’s The Man with a Movie Camera and the Rodney King TV footage, this detached work resonates and celebrates new technology’s ability to film and map everything, scanning our landscape for future reference. We watch with a constant anticipation of resolution, of catching a moment, yet the suspension finally gives way to an exquisite boredom, the true revelation of watching others. The film closes with an alien landscape, unmarked by any human presence, moving over a simulated environment, a toy-town yet still patrolled by the power of surveillance. This corporate datasphere, revealed as a kind of digital fingerprint through its storage and distribution, has moved from security and surveillance to entertainment consumption. For me, zooming in on these spaces in between – between language and understanding, between the digital fallout of ones and zeros, between the redundant and undesired flotsam and jetsam of environmental acoustic space, led to a focus towards the cityscape. Scanning technology led towards an understanding and reading of the environment and city in a fresh manner. If an accent suggested a certain class, age or attitude, then how suggestive was the raw sound around these conversations, how influential was the location where each conversation was held? Sound is ever-present, sometimes as a constantly shifting whir, as a damp grain of footsteps, as the drone-like spangle of distant traffic, as the seemingly motionless air that ripples past our ears, or as the elegant stuttering trill of a bird overhead. How influential was this common envelope of space, the environment in which we consume sound and music? How does one define the spaces between music and sound? When we listen to a Walkman, how do we distinguish between that which is intended – the sound carrier – and that which is incidental: passing traffic, the roar of a plane, the screech of a train door, your own footsteps? Whether active (creator) or passive (listener) we set up a virtual space in which we are each free to explore the sonorous and acoustic strata of what is an intimate yet global expression of space, a simple translation of the social transformations wrought by new technologies. Projects that have followed since then have expanded upon these notions. In 1998 Liverpool became this cityscape of focus, where I produced a project, Stopstarting, which explored the acoustic debris of the city, premiering at the International Symposion on Electronic Art (ISEA) conference in September of that year. For this project I chose significant points of sound located in the city, partly based on random questions in interviewing local people, partly out of self-interest. From these I mapped out a walk that took me from one point to another, minidisc in hand, recording the acoustic data in that place, mapping out the city in sound, teasing out the language that the city speaks. I wanted to create, in a sense, a sound work similar to the opening scene in Robert Altman’s movie Short Cuts (1993), in which a helicopter hovers gently over the densely packed city landscape and the film scans into moments in the daily lives of its inhabitants. It is a motion across a city, an architectural electronic scanning of an almost invisible sound wave. Liverpool, like most cities, has its very own unique sound dialect. Historically one can recall the sound of the docks, the railway station, the Cavern Club where the Beatles played their earliest live shows, their brittle tunes floating through the air of memory. As in Der Riese, voices, traffic lights, announcement speakers, buses, building work, footsteps, telephones and cash machines became the key subjects, the lead players, and were manipulated and transformed into a composition that captured this Sound Polaroid of Liverpool at this particular point in 1998. The following year Surface Noise (1999) which explored the wow and flutter of my own city, London; taking people on a red Routemaster bus journey across the city from Big Ben to St. Paul’s Cathedral, where the sheet music of “London Bridge Is Falling Down” became the score and A-Z for both musical and geographical direction following a Cageian use of indeterminacy. Where each note fell onto the map of the city between these two points not only suggested a location at which to record but also a route that the bus would later follow with the public aboard. Performances followed this routing every night for three nights, at intervals throughout the evening, each re-assembling fragments of the city in terms of sound and image, suggesting the slight shifts in tone and shape in similar places but at very different hours, so that a busy West End street at 18:00 would transform into a ghostly emptiness at 21:00. Surface Noise became a form of alternative film soundtrack, where the film was simply the view through the dusty window of a double-decker bus. Through the brief space of a bus journey the work drew upon many of our common reserves of sonic recognition, mingling the folk memory of the nursery rhyme, the background roar of traffic and the private sounds we make, secure in the knowledge that no one else is listening. Most recently I was commissioned to create a work to celebrate Italian film director Michelangelo Antonioni’s 90th birthday. 52 Space (2002) uses sounds of the city of Rome and elements of his movie The Eclipse (1962) to create a soundtrack of an image of a city suspended in time, anonymous and surreal. The resulting work is a distilled narrative of seductive conversation, musical fragments and scanned city soundscapes. Selecting a series of 52 framed images from the closing moments of the film slowed down to a kind of mnemonic slide show and accompanied by audio culled from the movie, processed with twinkling elements from the soundtrack’s original melody, the live performance conveys a complex and mysterious chronicle, offering up a space for contemplation and reflection as the soundtrack weaves an imaginary narrative. It’s almost as if you are gently floating through the city, experiencing this dream-like state. All of my works have explored the hidden resonances and meanings within memory and, in particular, the subtle traces that people and their actions leave behind. My role has often been to discover and reveal these layers of history, scanning across the mediums, so the works are part urban guide, part urban geography and part detective fiction, raising questions about public and private space. Engaging with the tools of surveillance and scanning technology has given rise to an understanding of communication that was otherwise hidden. Revelation followed from a discovery of the possibilities of these devices. Recording and redirecting these moments back into the public stream has enabled me to construct an archaeology of loss, pathos and missed connections, a momentary forgotten past in our digital future, radioactive fossils of sound, image and the imagination. Citation reference for this article MLA Style Rimbaud, Robin. "Scan and Deliver." M/C Journal 8.4 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0508/05-rimbaud.php>. APA Style Rimbaud, R. (Aug. 2005) "Scan and Deliver," M/C Journal, 8(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0508/05-rimbaud.php>.
APA, Harvard, Vancouver, ISO, and other styles
33

Quinan, C. L., and Hannah Pezzack. "A Biometric Logic of Revelation: Zach Blas’s SANCTUM (2018)." M/C Journal 23, no. 4 (August 12, 2020). http://dx.doi.org/10.5204/mcj.1664.

Full text
Abstract:
Ubiquitous in airports, border checkpoints, and other securitised spaces throughout the world, full-body imaging scanners claim to read bodies in order to identify if they pose security threats. Millimetre-wave body imaging machines—the most common type of body scanner—display to the operating security agent a screen with a generic body outline. If an anomaly is found or if an individual does not align with the machine’s understanding of an “average” body, a small box is highlighted and placed around the “problem” area, prompting further inspection in the form of pat-downs or questioning. In this complex security regime governed by such biometric, body-based technologies, it could be argued that nonalignment with bodily normativity as well as an attendant failure to reveal oneself—to become “transparent” (Hall 295)—marks a body as dangerous. As these algorithmic technologies become more pervasive, so too does the imperative to critically examine their purported neutrality and operative logic of revelation and readability.Biometric technologies are marketed as excavators of truth, with their optic potency claiming to demask masquerading bodies. Failure and bias are, however, an inescapable aspect of such technologies that work with narrow parameters of human morphology. Indeed, surveillance technologies have been taken to task for their inherent racial and gender biases (Browne; Pugliese). Facial recognition has, for example, been critiqued for its inability to read darker skin tones (Buolamwini and Gebru), while body scanners have been shown to target transgender bodies (Keyes; Magnet and Rodgers; Quinan). Critical security studies scholar Shoshana Magnet argues that error is endemic to the technological functioning of biometrics, particularly since they operate according to the faulty notion that bodies are “stable” and unchanging repositories of information that can be reified into code (Magnet 2).Although body scanners are presented as being able to reliably expose concealed weapons, they are riddled with incompetencies that misidentify and over-select certain demographics as suspect. Full-body scanners have, for example, caused considerable difficulties for transgender travellers, breast cancer patients, and people who use prosthetics, such as artificial limbs, colonoscopy bags, binders, or prosthetic genitalia (Clarkson; Quinan; Spalding). While it is not in the scope of this article to detail the workings of body imaging technologies and their inconsistencies, a growing body of scholarship has substantiated the claim that these machines unfairly impact those identifying as transgender and non-binary (see, e.g., Beauchamp; Currah and Mulqueen; Magnet and Rogers; Sjoberg). Moreover, they are constructed according to a logic of binary gender: before each person enters the scanner, transportation security officers must make a quick assessment of their gender/sex by pressing either a blue (corresponding to “male”) or pink (corresponding to “female”) button. In this sense, biometric, computerised security systems control and monitor the boundaries between male and female.The ability to “reveal” oneself is henceforth predicated on having a body free of “abnormalities” and fitting neatly into one of the two sex categorisations that the machine demands. Transgender and gender-nonconforming individuals, particularly those who do not have a binary gender presentation or whose presentation does not correspond to the sex marker in their documentation, also face difficulties if the machine flags anomalies (Quinan and Bresser). Drawing on a Foucauldian analysis of power as productive, Toby Beauchamp similarly illustrates how surveillance technologies not only identify but also create and reshape the figure of the dangerous subject in relation to normative configurations of gender, race, and able-bodiedness. By mobilizing narratives of concealment and disguise, heightened security measures frame gender nonconformity as dangerous (Beauchamp, Going Stealth). Although national and supranational authorities market biometric scanning technologies as scientifically neutral and exact methods of identification and verification and as an infallible solution to security risks, such tools of surveillance are clearly shaped by preconceptions and prejudgements about race, gender, and bodily normativity. Not only are they encoded with “prototypical whiteness” (Browne) but they are also built on “grossly stereotypical” configurations of gender (Clarkson).Amongst this increasingly securitised landscape, creative forms of artistic resistance can offer up a means of subverting discriminatory policing and surveillance practices by posing alternate visualisations that reveal and challenge their supposed objectivity. In his 2018 audio-video artwork installation entitled SANCTUM, UK-based American artist Zach Blas delves into how biometric technologies, like those described above, both reveal and (re)shape ontology by utilising the affectual resonance of sexual submission. Evoking the contradictory notions of oppression and pleasure, Blas describes SANCTUM as “a mystical environment that perverts sex dungeons with the apparatuses and procedures of airport body scans, biometric analysis, and predictive policing” (see full description at https://zachblas.info/works/sanctum/).Depicting generic mannequins that stand in for the digitalised rendering of the human forms that pass through body scanners, the installation transports the scanners out of the airport and into a queer environment that collapses sex, security, and weaponry; an environment that is “at once a prison-house of algorithmic capture, a sex dungeon with no genitals, a weapons factory, and a temple to security.” This artistic reframing gestures towards full-body scanning technology’s germination in the military, prisons, and other disciplinary systems, highlighting how its development and use has originated from punitive—rather than protective—contexts.In what follows, we adopt a methodological approach that applies visual analysis and close reading to scrutinise a selection of scenes from SANCTUM that underscore the sadomasochistic power inherent in surveillance technologies. Analysing visual and aural elements of the artistic intervention allows us to complicate the relationship between transparency and recognition and to problematise the dynamic of mandatory complicity and revelation that body scanners warrant. In contrast to a discourse of visibility that characterises algorithmically driven surveillance technology, Blas suggests opacity as a resistance strategy to biometrics' standardisation of identity. Taking an approach informed by critical security studies and queer theory, we also argue that SANCTUM highlights the violence inherent to the practice of reducing the body to a flat, inert surface that purports to align with some sort of “core” identity, a notion that contradicts feminist and queer approaches to identity and corporeality as fluid and changing. In close reading this artistic installation alongside emerging scholarship on the discriminatory effects of biometric technology, this article aims to highlight the potential of art to queer the supposed objectivity and neutrality of biometric surveillance and to critically challenge normative logics of revelation and readability.Corporeal Fetishism and Body HorrorThroughout both his artistic practice and scholarly work, Blas has been critical of the above narrative of biometrics as objective extractors of information. Rather than looking to dominant forms of representation as a means for recognition and social change, Blas’s work asks that we strive for creative techniques that precisely queer biometric and legal systems in order to make oneself unaccounted for. For him, “transparency, visibility, and representation to the state should be used tactically, they are never the end goal for a transformative politics but are, ultimately, a trap” (Blas and Gaboury 158). While we would simultaneously argue that invisibility is itself a privilege that is unevenly distributed, his creative work attempts to refuse a politics of visibility and to embrace an “informatic opacity” that is attuned to differences in bodies and identities (Blas).In particular, Blas’s artistic interventions titled Facial Weaponization Suite (2011-14) and Face Cages (2013-16) protest against biometric recognition and the inequalities that these technologies propagate by making masks and wearable metal objects that cannot be detected as human faces. This artistic-activist project contests biometric facial recognition and their attendant inequalities by, as detailed on the artist’s website,making ‘collective masks’ in workshops that are modelled from the aggregated facial data of participants, resulting in amorphous masks that cannot be detected as human faces by biometric facial recognition technologies. The masks are used for public interventions and performances.One mask explores blackness and the racist implications that undergird biometric technologies’ inability to detect dark skin. Meanwhile another mask, which he calls the “Fag Face Mask”, points to the heteronormative underpinnings of facial recognition. Created from the aggregated facial data of queer men, this amorphous pink mask implicitly references—and contests—scientific studies that have attempted to link the identification of sexual orientation through rapid facial recognition techniques.Building on this body of creative work that has advocated for opacity as a tool of social and political transformation, SANCTUM resists the revelatory impulses of biometric technology by turning to the use and abuse of full-body imaging. The installation opens with a shot of a large, dark industrial space. At the far end of a red, spotlighted corridor, a black mask flickers on a screen. A shimmering, oscillating sound reverberates—the opening bars of a techno track—that breaks down in rhythm while the mask evaporates into a cloud of smoke. The camera swivels, and a white figure—the generic mannequin of the body scanner screen—is pummelled by invisible forces as if in a wind tunnel. These ghostly silhouettes appear and reappear in different positions, with some being whipped and others stretched and penetrated by a steel anal hook. Rather than conjuring a traditional horror trope of the body’s terrifying, bloody interior, SANCTUM evokes a new kind of feared and fetishized trope that is endemic to the current era of surveillance capitalism: the abstracted body, standardised and datafied, created through the supposedly objective and efficient gaze of AI-driven machinery.Resting on the floor in front of the ominous animated mask are neon fragments arranged in an occultist formation—hands or half a face. By breaking the body down into component parts— “from retina to fingerprints”—biometric technologies “purport to make individual bodies endlessly replicable, segmentable and transmissible in the transnational spaces of global capital” (Magnet 8). The notion that bodies can be seamlessly turned into blueprints extracted from biological and cultural contexts has been described by Donna Haraway as “corporeal fetishism” (Haraway, Modest). In the context of SANCTUM, Blas illustrates the dangers of mistaking a model for a “concrete entity” (Haraway, “Situated” 147). Indeed, the digital cartography of the generic mannequin becomes no longer a mode of representation but instead a technoscientific truth.Several scenes in SANCTUM also illustrate a process whereby substances are extracted from the mannequins and used as tools to enact violence. In one such instance, a silver webbing is generated over a kneeling figure. Upon closer inspection, this geometric structure, which is reminiscent of Blas’s earlier Face Cages project, is a replication of the triangulated patterns produced by facial recognition software in its mapping of distance between eyes, nose, and mouth. In the next scene, this “map” breaks apart into singular shapes that float and transform into a metallic whip, before eventually reconstituting themselves as a penetrative douche hose that causes the mannequin to spasm and vomit a pixelated liquid. Its secretions levitate and become the webbing, and then the sequence begins anew.In another scene, a mannequin is held upside-down and force-fed a bubbling liquid that is being pumped through tubes from its arms, legs, and stomach. These depictions visualise Magnet’s argument that biometric renderings of bodies are understood not to be “tropic” or “historically specific” but are instead presented as “plumbing individual depths in order to extract core identity” (5). In this sense, this visual representation calls to mind biometrics’ reification of body and identity, obfuscating what Haraway would describe as the “situatedness of knowledge”. Blas’s work, however, forces a critique of these very systems, as the materials extracted from the bodies of the mannequins in SANCTUM allude to how biometric cartographies drawn from travellers are utilised to justify detainment. These security technologies employ what Magnet has referred to as “surveillant scopophilia,” that is, new ways and forms of looking at the human body “disassembled into component parts while simultaneously working to assuage individual anxieties about safety and security through the promise of surveillance” (17). The transparent body—the body that can submit and reveal itself—is ironically represented by the distinctly genderless translucent mannequins. Although the generic mannequins are seemingly blank slates, the installation simultaneously forces a conversation about the ways in which biometrics draw upon and perpetuate assumptions about gender, race, and sexuality.Biometric SubjugationOn her 2016 critically acclaimed album HOPELESSNESS, openly transgender singer, composer, and visual artist Anohni performs a deviant subjectivity that highlights the above dynamics that mark the contemporary surveillance discourse. To an imagined “daddy” technocrat, she sings:Watch me… I know you love me'Cause you're always watching me'Case I'm involved in evil'Case I'm involved in terrorism'Case I'm involved in child molestersEvoking a queer sexual frisson, Anohni describes how, as a trans woman, she is hyper-visible to state institutions. She narrates a voyeuristic relation where trans bodies are policed as threats to public safety rather than protected from systemic discrimination. Through the seemingly benevolent “daddy” character and the play on ‘cause (i.e., because) and ‘case (i.e., in case), she highlights how gender-nonconforming individuals are predictively surveilled and assumed to already be guilty. Reflecting on daddy-boy sexual paradigms, Jack Halberstam reads the “sideways” relations of queer practices as an enactment of “rupture as substitution” to create a new project that “holds on to vestiges of the old but distorts” (226). Upending power and control, queer art has the capacity to both reveal and undermine hegemonic structures while simultaneously allowing for the distortion of the old to create something new.Employing the sublimatory relations of bondage, discipline, sadism, and masochism (BDSM), Blas’s queer installation similarly creates a sideways representation that re-orientates the logic of the biometric scanners, thereby unveiling the always already sexualised relations of scrutiny and interrogation as well as the submissive complicity they demand. Replacing the airport environment with a dark and foreboding mise-en-scène allows Blas to focus on capture rather than mobility, highlighting the ways in which border checkpoints (including those instantiated by the airport) encourage free travel for some while foreclosing movement for others. Building on Sara Ahmed’s “phenomenology of being stopped”, Magnet considers what happens when we turn our gaze to those “who fail to pass the checkpoint” (107). In SANCTUM, the same actions are played out again and again on spectral beings who are trapped in various states: they shudder in cages, are chained to the floor, or are projected against the parameters of mounted screens. One ghostly figure, for instance, lies pinned down by metallic grappling hooks, arms raised above the head in a recognisable stance of surrender, conjuring up the now-familiar image of a traveller standing in the cylindrical scanner machine, waiting to be screened. In portraying this extended moment of immobility, Blas lays bare the deep contradictions in the rhetoric of “freedom of movement” that underlies such spaces.On a global level, media reporting, scientific studies, and policy documents proclaim that biometrics are essential to ensuring personal safety and national security. Within the public imagination, these technologies become seductive because of their marked ability to identify terrorist attackers—to reveal threatening bodies—thereby appealing to the anxious citizen’s fear of the disguised suicide bomber. Yet for marginalised identities prefigured as criminal or deceptive—including transgender and black and brown bodies—the inability to perform such acts of revelation via submission to screening can result in humiliation and further discrimination, public shaming, and even tortuous inquiry – acts that are played out in SANCTUM.Masked GenitalsFeminist surveillance studies scholar Rachel Hall has referred to the impetus for revelation in the post-9/11 era as a desire for a universal “aesthetics of transparency” in which the world and the body is turned inside-out so that there are no longer “secrets or interiors … in which terrorists or terrorist threats might find refuge” (127). Hall takes up the case study of Umar Farouk Abdulmutallab (infamously known as “the Underwear Bomber”) who attempted to detonate plastic explosives hidden in his underwear while onboard a flight from Amsterdam to Detroit on 25 December 2009. Hall argues that this event signified a coalescence of fears surrounding bodies of colour, genitalia, and terrorism. News reports following the incident stated that Abdulmutallab tucked his penis to make room for the explosive, thereby “queer[ing] the aspiring terrorist by indirectly referencing his willingness … to make room for a substitute phallus” (Hall 289). Overtly manifested in the Underwear Bomber incident is also a desire to voyeuristically expose a hidden, threatening interiority, which is inherently implicated with anxieties surrounding gender deviance. Beauchamp elaborates on how gender deviance and transgression have coalesced with terrorism, which was exemplified in the wake of the 9/11 attacks when the United States Department of Homeland Security issued a memo that male terrorists “may dress as females in order to discourage scrutiny” (“Artful” 359). Although this advisory did not explicitly reference transgender populations, it linked “deviant” gender presentation—to which we could also add Abdulmutallab’s tucking of his penis—with threats to national security (Beauchamp, Going Stealth). This also calls to mind a broader discussion of the ways in which genitalia feature in the screening process. Prior to the introduction of millimetre-wave body scanning technology, the most common form of scanner used was the backscatter imaging machine, which displayed “naked” body images of each passenger to the security agent. Due to privacy concerns, these machines were replaced by the scanners currently in place which use a generic outline of a passenger (exemplified in SANCTUM) to detect possible threats.It is here worth returning to Blas’s installation, as it also implicitly critiques the security protocols that attempt to reveal genitalia as both threatening and as evidence of an inner truth about a body. At one moment in the installation a bayonet-like object pierces the blank crotch of the mannequin, shattering it into holographic fragments. The apparent genderlessness of the mannequins is contrasted with these graphic sexual acts. The penetrating metallic instrument that breaks into the loin of the mannequin, combined with the camera shot that slowly zooms in on this action, draws attention to a surveillant fascination with genitalia and revelation. As Nicholas L. Clarkson documents in his analysis of airport security protocols governing prostheses, including limbs and packies (silicone penis prostheses), genitals are a central component of the screening process. While it is stipulated that physical searches should not require travellers to remove items of clothing, such as underwear, or to expose their genitals to staff for inspection, prosthetics are routinely screened and examined. This practice can create tensions for trans or disabled passengers with prosthetics in so-called “sensitive” areas, particularly as guidelines for security measures are often implemented by airport staff who are not properly trained in transgender-sensitive protocols.ConclusionAccording to media technologies scholar Jeremy Packer, “rather than being treated as one to be protected from an exterior force and one’s self, the citizen is now treated as an always potential threat, a becoming bomb” (382). Although this technological policing impacts all who are subjected to security regimes (which is to say, everyone), this amalgamation of body and bomb has exacerbated the ways in which bodies socially coded as threatening or deceptive are targeted by security and surveillance regimes. Nonetheless, others have argued that the use of invasive forms of surveillance can be justified by the state as an exchange: that citizens should willingly give up their right to privacy in exchange for safety (Monahan 1). Rather than subscribing to this paradigm, Blas’ SANCTUM critiques the violence of mandatory complicity in this “trade-off” narrative. Because their operationalisation rests on normative notions of embodiment that are governed by preconceptions around gender, race, sexuality and ability, surveillance systems demand that bodies become transparent. This disproportionally affects those whose bodies do not match norms, with trans and queer bodies often becoming unreadable (Kafer and Grinberg). The shadowy realm of SANCTUM illustrates this tension between biometric revelation and resistance, but also suggests that opacity may be a tool of transformation in the face of such discriminatory violations that are built into surveillance.ReferencesAhmed, Sara. “A Phenomenology of Whiteness.” Feminist Theory 8.2 (2007): 149–68.Beauchamp, Toby. “Artful Concealment and Strategic Visibility: Transgender Bodies and U.S. State Surveillance after 9/11.” Surveillance & Society 6.4 (2009): 356–66.———. Going Stealth: Transgender Politics and U.S. Surveillance Practices. Durham, NC: Duke UP, 2019.Blas, Zach. “Informatic Opacity.” The Journal of Aesthetics and Protest 9 (2014). <http://www.joaap.org/issue9/zachblas.htm>.Blas, Zach, and Jacob Gaboury. 2016. “Biometrics and Opacity: A Conversation.” Camera Obscura: Feminism, Culture, and Media Studies 31.2 (2016): 154-65.Buolamwini, Joy, and Timnit Gebru. “Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification.” Proceedings of Machine Learning Research 81 (2018): 1-15.Browne, Simone. Dark Matters: On the Surveillance of Blackness. Durham, NC: Duke UP, 2015.Clarkson, Nicholas L. “Incoherent Assemblages: Transgender Conflicts in US Security.” Surveillance & Society 17.5 (2019): 618-30.Currah, Paisley, and Tara Mulqueen. “Securitizing Gender: Identity, Biometrics, and Transgender Bodies at the Airport.” Social Research 78.2 (2011): 556-82.Halberstam, Jack. The Queer Art of Failure. Durham: Duke UP, 2011.Hall, Rachel. “Terror and the Female Grotesque: Introducing Full-Body Scanners to U.S. Airports.” Feminist Surveillance Studies. Eds. Rachel E. Dubrofsky and Shoshana Amielle Magnet. Durham, NC: Duke UP, 2015. 127-49.Haraway, Donna. “Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective.” Feminist Studies 14.3 (1988): 575-99.———. Modest_Witness@Second_Millennium. FemaleMan_Meets_OncoMouse: Feminism and Technoscience. New York: Routledge, 1997.Kafer, Gary, and Daniel Grinberg. “Queer Surveillance.” Surveillance & Society 17.5 (2019): 592-601.Keyes, O.S. “The Misgendering Machines: Trans/HCI Implications of Automatic Gender Recognition.” Proceedings of the ACM on Human-Computer Interaction 2. CSCW, Article 88 (2018): 1-22.Magnet, Shoshana Amielle. When Biometrics Fail: Gender, Race, and the Technology of Identity. Durham: Duke UP, 2011.Magnet, Shoshana, and Tara Rodgers. “Stripping for the State: Whole Body Imaging Technologies and the Surveillance of Othered Bodies.” Feminist Media Studies 12.1 (2012): 101–18.Monahan, Torin. Surveillance and Security: Technological Politics and Power in Everyday Life. New York: Routledge, 2006.Packer, Jeremy. “Becoming Bombs: Mobilizing Mobility in the War of Terror.” Cultural Studies 10.5 (2006): 378-99.Pugliese, Joseph. “In Silico Race and the Heteronomy of Biometric Proxies: Biometrics in the Context of Civilian Life, Border Security and Counter-Terrorism Laws.” Australian Feminist Law Journal 23 (2005): 1-32.Pugliese, Joseph. Biometrics: Bodies, Technologies, Biopolitics New York: Routledge, 2010.Quinan, C.L. “Gender (In)securities: Surveillance and Transgender Bodies in a Post-9/11 Era of Neoliberalism.” Eds. Stef Wittendorp and Matthias Leese. Security/Mobility: Politics of Movement. Manchester: Manchester UP, 2017. 153-69.Quinan, C.L., and Nina Bresser. “Gender at the Border: Global Responses to Gender Diverse Subjectivities and Non-Binary Registration Practices.” Global Perspectives 1.1 (2020). <https://doi.org/10.1525/gp.2020.12553>.Sjoberg, Laura. “(S)he Shall Not Be Moved: Gender, Bodies and Travel Rights in the Post-9/11 Era.” Security Journal 28.2 (2015): 198-215.Spalding, Sally J. “Airport Outings: The Coalitional Possibilities of Affective Rupture.” Women’s Studies in Communication 39.4 (2016): 460-80.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography