Academic literature on the topic 'Biometics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometics"

1

Srivastava, Prateek, and Rohit Srivastava. "A Multimodal Based Approach for Face and Unique Mark Based Combination for Confirmation of Human." International Journal of Business Analytics 6, no. 3 (July 2019): 16–28. http://dx.doi.org/10.4018/ijban.2019070102.

Full text
Abstract:
Biometric processes are utilized for recognition and distinguishing a person for different applications. The procedure is made possible by utilizing single biometric highlight or a mix of biometric highlights. In the event that the distinguishing proof is finished by utilizing a solitary biometric highlight (confront, iris, finger, palm, and so forth) then the framework is called unimodal, and if a combnation of biometrics are utilized then it is called multimodal. In a multimodal framework compared to the different downsides of a unimodal framework (noisy data, multiple vectors and so forth) are evacuated. The fundamental objective of the proposed work is to outline a system that will give validation in view of three-level verification for a man. Prior works in this field are clarified in various factual models in view of various verification plans. In the proposed strategy, a system is created in which if one biometric attribute fails then the other biometic characteristics can be utilized for verification.
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Tushar, and Upinder Kaur. "Biometric Security: A Review to Future." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3758–68. http://dx.doi.org/10.47059/revistageintec.v11i4.2405.

Full text
Abstract:
This paper presents the different biometric with their limitations and introduces their alternative in form of brain biometric, Breath biometrics, and Tongue biometrics. Brain biometric uses brain wave while breath biometric uses one’s breath and tongue biometric uses a tongue’s shape and variation to distinguish them and present a good alternative for the presently used biometric like fingerprint, iris recognition, face recognition.
APA, Harvard, Vancouver, ISO, and other styles
3

Yaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.

Full text
Abstract:
Biometric is used as a main security fence in a computer system. The unique characteristics of a person can be distinguished from each other. Human’s biometrics can be categorized into three types: morphological, biological and behavioural. Morphological biometrics uses physical features for recognition. Biological biometrics used to identify user based on biological features. Behavioural biometrics such as gender, culture, height and weight can be used as an additional security measure within a system. These biometric behavioural features are also known as soft biometric. This study uses soft biometric elements (gender, culture, region of birth and educational level) in the keystroke dynamic study to distinguish typing patterns in each of these categories. The Support Vector Machine (SVM) classification method is used to perform this classification for soft biometric identification. The results of this study have shown that soft biometrics in keystroke dynamic can be used to distinguish group of individuals typing.
APA, Harvard, Vancouver, ISO, and other styles
4

Shopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, and Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions." Journal of Cybersecurity and Privacy 1, no. 3 (August 31, 2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.

Full text
Abstract:
Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article concludes with open questions and provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.
APA, Harvard, Vancouver, ISO, and other styles
5

B.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.

Full text
Abstract:
Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric Modalities and Face recognition Techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Reddy, M. V. Bramhananda, and V. Goutham. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research -GRANTHAALAYAH 6, no. 1 (January 31, 2018): 80–90. http://dx.doi.org/10.29121/granthaalayah.v6.i1.2018.1596.

Full text
Abstract:
Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using iris or along with other biometrics for security with great precision. Multimodal biometric systems came into existence for better accuracy in human authentication. However, iris is considered to be most discriminatory of facial biometrics. Study of iris based human identification in ideal and non-cooperative environments can provide great insights which can help researchers and organizations that depend on iris-based biometric systems. The technical knowhow of iris strengths and weaknesses can be great advantage. This is more important in the wake of widespread use of smart devices which are vulnerable to attacks. This paper throws light into various iris-based biometric systems, issues with iris in the context of texture comparison, cancellable biometrics, iris in multi-model biometric systems, iris localization issues, challenging scenarios pertaining to accurate iris recognition and so on.
APA, Harvard, Vancouver, ISO, and other styles
7

S. Raju, A., and V. Udayashankara. "A Survey on Unimodal, Multimodal Biometrics and Its Fusion Techniques." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 689. http://dx.doi.org/10.14419/ijet.v7i4.36.24224.

Full text
Abstract:
Presently, a variety of biometric modalities are applied to perform human identification or user verification. Unimodal biometric systems (UBS) is a technique which guarantees authentication information by processing distinctive characteristic sequences and these are fetched out from individuals. However, the performance of unimodal biometric systems restricted in terms of susceptibility to spoof attacks, non-universality, large intra-user variations, and noise in sensed data. The Multimodal biometric systems defeat various limitations of unimodal biometric systems as the sources of different biometrics typically compensate for the inherent limitations of one another. The objective of this article is to analyze various methods of information fusion for biometrics, and summarize, to conclude with direction on future research proficiency in a multimodal biometric system using ECG, Fingerprint and Face features. This paper is furnished as a ready reckoner for those researchers, who wish to persue their work in the area of biometrics.
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Bhanu, and Nirvisha Singh. "MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics." Information 11, no. 6 (June 8, 2020): 308. http://dx.doi.org/10.3390/info11060308.

Full text
Abstract:
With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. Organizations encourage their members to use biometrics, but they are hesitant to use them due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. We propose a server-specific add-on biometric security layer model (MoLaBSS) to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show good potential of this framework to enhance users’ confidence level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (September 14, 2021): 6163. http://dx.doi.org/10.3390/s21186163.

Full text
Abstract:
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
10

Alam*, Varisha, and Dr Mohammad Arif. "Classification of Large Biometric Data in Database System." International Journal of Innovative Technology and Exploring Engineering 10, no. 10 (August 30, 2021): 1–8. http://dx.doi.org/10.35940/ijitee.d8592.08101021.

Full text
Abstract:
"Biometrics" is got from the Greek word 'life' and 'measure' which implies living and evaluation take apart. It simply converts into "life estimation". Biometrics uses computerized acknowledgment of people, dependent on their social and natural attributes. Biometric character are data separated from biometric tests, which can use for examination with a biometric orientation. Biometrics involves techniques to unusually recognize people dependent on at least one inherent physical or behavior attribute. In software engineering, specifically, biometric is used as a form of character retrieve the Committee and retrieve command. Biometric identically utilized to recognize people in bunches that are in observation. Biometric has quickly risen like a auspicious innovation for validation and has effectively discovered a spot in most of the scientific safety regions. An effective bunching method suggest for dividing enormous biometrics data set through recognizable proof. This method depends on the changed B+ tree is decreasing the discs get to. It diminishes the information recovery time and also possible error rates. Hence, for bigger applications, the need to reduce the data set to a more adequate portion emerges to accomplish both higher paces and further developed precision. The main motivation behind ordering is to recover a small data set for looking through the inquiry
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Biometics"

1

Canavan, Shaun J. "Face Recognition by Multi-Frame Fusion of Rotating Heads in Videos." Youngstown State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1210446052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fouad, Marwa. "Towards Template Security for Iris-based Biometric Systems." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22736.

Full text
Abstract:
Personal identity refers to a set of attributes (e.g., name, social insurance number, etc.) that are associated with a person. Identity management is the process of creating, maintaining and destroying identities of individuals in a population. Biometric technologies are technologies developed to use statistical analysis of an individual’s biological or behavioral traits to determine his identity. Biometrics based authentication systems offer a reliable solution for identity management, because of their uniqueness, relative stability over time and security (among other reasons). Public acceptance of biometric systems will depend on their ability to ensure robustness, accuracy and security. Although robustness and accuracy of such systems are rapidly improving, there still remain some issues of security and balancing it with privacy. While the uniqueness of biometric traits offers a convenient and reliable means of identification, it also poses the risk of unauthorized cross-referencing among databases using the same biometric trait. There is also a high risk in case of a biometric database being compromised, since it’s not possible to revoke the biometric trait and re-issue a new one as is the case with passwords and smart keys. This unique attribute of biometric based authentication system poses a challenge that might slow down public acceptance and the use of biometrics for authentication purposes in large scale applications. In this research we investigate the vulnerabilities of biometric systems focusing on template security in iris-based biometric recognition systems. The iris has been well studied for authentication purposes and has been proven accurate in large scale applications in several airports and border crossings around the world. The most widely accepted iris recognition systems are based on Daugman’s model that creates a binary iris template. In this research we develop different systems using watermarking, bio-cryptography as well as feature transformation to achieve revocability and security of binary templates in iris based biometric authentication systems, while maintaining the performance that enables widespread application of these systems. All algorithms developed in this research are applicable on already existing biometric authentication systems and do not require redesign of these existing, well established iris-based authentication systems that use binary templates.
APA, Harvard, Vancouver, ISO, and other styles
3

Sumner, Kristine. "AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2475.

Full text
Abstract:
The terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the aviation system and U.S national security (9/11 Commission, 2004). Each U.S. airport is individually responsible for various aspects of security including the control of physical access to sensitive and secure areas and facilities (9/11 Commission, 2004). Biometric technology has been examined as one method of enhancing airport access control to mitigate the possibility of criminal acts against airports. However, successful implementation of biometric technology depends largely on how individual security directors at each airport perceive, understand, and accept that technology. Backgrounds, attitudes, and personal characteristics influence individual decisions about technology implementation (Rogers, 1995; Tornatzky and Fleischer, 1990). This study examines the problem of airport access control, as well as, the current trends in biometric technology. Utilizing a survey of airport security directors and security managers, this study draws upon innovation diffusion theory and organizational theories to determine what personal, organizational, and technical variables contribute to the propensity of airport security directors and managers to adopt biometric technology for airport access control.
Ph.D.
Department of Criminal Justice and Legal Studies
Health and Public Affairs
Public Affairs PhD
APA, Harvard, Vancouver, ISO, and other styles
4

Silva, Edson Tenório da. "Análise de crescimento e produtividade de duas variedades de cana-de-açúcar (Saccharum spp) influenciadas por doses de fósforo." Universidade Federal de Alagoas, 2007. http://repositorio.ufal.br/handle/riufal/201.

Full text
Abstract:
The knowledge of the leaf area is required every time the sugarcane is subjected to evaluation in which different varieties are compared or submitted to different environmental conditions, managements or fertilizations, therefore evidently showing alteration in dimensions of the plant leaves, so affecting the photosynthetic process. Although the higher breathing-photosynthesis balance increases the amount of the assimilates available to vegetative growth (Net assimilation rate), the preferential carbon allocation for the different fractions of the leaf-plant, stalks, and root system, that is conditioned by the medium and/or management, can change the growth indexes. Thus, the estimates of those indexes can supply subsidies for understanding the adaptations of the plants under different medium conditions: light, temperature, moisture and soil fertility. The growth analysis is considered as standard method, since it is fundamentally based on the fact that about 95% on average of the dry matter accumulated by plants during growth rather result from the photosynthetic activity (Benincasa, 2003). The remaining comes from the absorption of mineral nutrients. Although at lower amounts, the mineral nutrients are indispensable to the vegetal growth and development, since they are absorbed and incorporated into every vegetative biomass. On direct or indirect way, they participate into production of the organic compounds as well as in sucrose´, that is produced from the phosphates-trioses transported from the chloroplast to cytosol and is mainly exported to the vacuoles. The present study was carried out to evaluate the methods for estimation of the leaf area, population density, growth and yield of two sugarcane cultivars provided with high productive potential and fertilized with different phosphorus doses in the cane plant cycle. The randomized block experimental design was used with five replicates under a factorial scheme 2 x 6, and the treatments were composed by the cultivars RB867515 and RB92579 under six P doses (0, 30, 60, 90, 120 and 150 kg ha-1). At planting time, all plots were given amounts corresponding to 33 and 200 kg ha-1 N and K, respectively. When beginning the rainy season at 210 DAP, either side-dressing fertilization and the micronutrient fertilization at the doses 67; 6; 6; and 7 kg ha-1 N, Cu, Mn and Zn, respectively were accomplished along the cropping line. Nine evaluations were performed with plants collected within 2.4 m2 at 30-days average intervals for estimation of the leaf area by two methods, plant population and dry matter accumulation in either photosynthetically active leaves and the whole plant. The tenth sampling was accomplished at 458 DAP in order to determine the yield of the apparent sucrose. After obtaining the data, the statistical analysis was accomplished, by using the program SISVAR. The estimate of the leaf area by using just the leaf +3 is an alternative to the conventional estimate method, when determining the foliar area for sugarcane crop. The increased phosphate fertilization contributes to increment the leaf area in the sugarcane crop, specially for the RB92579 cv. The phosphate fertilization widely affected the leaf area index (IAF), dry matter accumulation in plant, crop growth rate (TCC), relative growth rate (TCR), net assimilation rate (TAL), and both stalk and sucrose yields. During the period from 280 to 310 DAP, the highest IAF and TCC occurred, whereas the RB92579 cv. showed higher values. The RB92579 cv., showed higher yield of dry matter, industrializable stalks and apparent sucrose.
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
O conhecimento da área foliar se faz necessário toda vez em que a cana-deaçúcar é submetida a avaliações, onde se comparam variedades diferentes, ou submete-as a condições ambientais, manejo ou de adubação diferentes, que possam manifestar notadamente alterações nas dimensões das folhas das plantas influindo no processo fotossintético. Maior balanço fotossínteserespiração, aumenta a quantidade de assimilados disponíveis para o crescimento vegetal (Taxa de assimilação líquida), entretanto, a alocação preferencial de carbono pelas diferentes frações da planta-folha, colmos e sistema radicular, condicionada pelo meio e/ou manejo, pode alterar os índices de crescimento. Desta forma, as estimativas desses índices podem fornecer subsídios para o entendimento das adaptações experimentadas pelas plantas sob diferentes condições de meio: luz, temperatura, umidade e fertilidade do solo. A análise do crescimento é considerada um método padrão pois se baseia fundamentalmente no fato de que cerca de 95%, em média, da matéria seca acumulada pelas plantas, ao longo do seu crescimento, resultam da atividade fotossintética (Benincasa, 2003). O restante provém da absorção de nutrientes minerais. Embora em quantidades de menor expressão, os nutrientes minerais são indispensável ao crescimento desenvolvimento vegetal, visto que os mesmos são absorvidos e incorporados em toda biomassa vegetal. Estes participam direta ou indiretamente na produção de compostos orgânicos, bem como de sacarose, que é produzida a partir de trioses-fosfatos transportadas do cloroplasto para o citossol é exportada principalmente para os vacúolos. O presente trabalho teve como objetivo estudar métodos de estimativa de área foliar, densidade populacional, crescimento e a produção de duas variedades de cana-de-açúcar de alto potencial produtivo adubadas com diferentes doses de fósforo, em ciclo de cana planta. O delineamento foi em blocos casualizados com cinco repetições em esquema fatorial 2 x 6, sendo os tratamentos compostos pelas variedades RB867515 e RB92579 sob seis doses de P (0, 30, 60, 90, 120 e 150 kg ha-1). Por ocasião do plantio, todas as parcelas receberam quantidades equivalentes a 33 e 200 kg ha-1 de N e K, respectivamente. No início do período chuvoso, aos 210 DAP, realizou-se a adubação de cobertura e adubação com micronutrientes nas doses de 67; 6; 6; e 7 kg ha-1 de N, Cu, Mn e Zn, respectivamente, ao longo da linha da cultura. Foram realizadas nove avaliações com coletas de plantas em 2,4 m2, em intervalos médios de 30 dias, para estimativas da área foliar, por dois métodos, da população de plantas e do acúmulo de matéria seca nas ativas folhas fotossinteticamente e em toda planta. A décima amostragem foi realizada aos 458 DAP para determinar a produção de sacarose aparente. De posse dos dados realizou-se a análise estatística por meio do programa SISVAR. A estimativa de área foliar apenas com utilização da folha +3, constitui-se em uma alternativa ao método convencional de estimativa, na determinação da área foliar para a cultura da cana-de-açúcar. O aumento da adubação fosfatada contribui com o incremento de área foliar na cultura da cana-de-açúcar, sobretudo para a variedade RB92579. A adubação fosfatada influenciou grandemente no índice de área foliar (IAF), acúmulo de matéria seca na planta, taxa de crescimento da cultura (TCC), taxa de crescimento relativo (TCR), taxa de assimilação líquida (TAL), e produção de colmos e de sacarose. Os maiores IAF e TCC, ocorreram no período de 280 a 310 DAP, tendo a variedade RB92579 apresentada valores maiores. A variedade RB92579, apresentou maiores produções de matéria seca, colmos industrializáveis e sacarose aparente.
APA, Harvard, Vancouver, ISO, and other styles
5

Hortai, František. "DYNAMICKÝ BIOMETRICKÝ PODPIS JAKO EFEKTIVNÍ NÁSTROJ PRO VNITROPODNIKOVOU KOMUNIKACI." Doctoral thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402115.

Full text
Abstract:
The aim of this thesis is to provide comprehensive information on the possibilities of authentication, combination of authentication factors and the integration of this issue into corporate communication. The work focuses on this issue and specifies the possibilities for obtaining authentication information, analyses the authentication methods, identification and authorization. It examines the applicability of biometric technologies, the principle of their functionality, examples of their use, their impact, the advantages and disadvantages they bring. A natural, easy-to-use, convenient tool for effective and secure communication is authentication including the dynamic biometric signature. The issues of the dynamic biometric signature technology and its implementation are examined from a comprehensive perspective involving experiments. The research proved that the dynamic biometric signature can serve as a method for supporting secure corporate communication and reduce authentication risks in companies and for individuals.
APA, Harvard, Vancouver, ISO, and other styles
6

Samangooei, Sina. "Semantic biometrics." Thesis, University of Southampton, 2010. https://eprints.soton.ac.uk/153901/.

Full text
Abstract:
Gait and face biometrics have a unique advantage in that they can be used when images are acquired at a distance and signals are at too low a resolution to be perceived by other biometrics. Given such situations, some traits can be difficult to extract automatically but can still be perceived semantically using human vision. It is contended that such semantic annotations are usable as soft biometric signatures, useful for identification tasks. Feature subset selection techniques are employed to compare the distinguishing ability of individual semantically described physical traits. Their identification ability is also explored, both in isolation and in the improvement of the recognition rates of some associated gait biometric signatures using fusion techniques. This is the first approach to explore semantic descriptions of physiological human traits as used alone or to complement primary biometric techniques to facilitate recognition and analysis of surveillance video. Potential traits to be described are explored and justified against their psychological and practical merits. A novel dataset of semantic annotations is gathered describing subjects in two existing biometric datasets. Two applications of these semantic features and their associated biometric signatures are explored using the data gathered. We also draw on our experiments as a whole to highlight those traits thought to be most useful in assisting biometric recognition overall. Effective analysis of surveillance data by humans relies on semantic retrieval of the data which has been enriched by semantic annotations. A manual annotation process is time-consuming and prone to error due to various factors. We explore the semantic content-based retrieval of surveillance captured subjects. Working under the premise that similarity of the chosen biometric signature implies similarity of certain semantic traits, a set of semantic retrieval experiments are performed using well established Latent Semantic Analysis techniques.
APA, Harvard, Vancouver, ISO, and other styles
7

Sanderson, Conrad, and conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information." Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.

Full text
Abstract:
Identity verification systems are an important part of our every day life. A typical example is the Automatic Teller Machine (ATM) which employs a simple identity verification scheme: the user is asked to enter their secret password after inserting their ATM card; if the password matches the one prescribed to the card, the user is allowed access to their bank account. This scheme suffers from a major drawback: only the validity of the combination of a certain possession (the ATM card) and certain knowledge (the password) is verified. The ATM card can be lost or stolen, and the password can be compromised. Thus new verification methods have emerged, where the password has either been replaced by, or used in addition to, biometrics such as the person’s speech, face image or fingerprints. Apart from the ATM example described above, biometrics can be applied to other areas, such as telephone & internet based banking, airline reservations & check-in, as well as forensic work and law enforcement applications. Biometric systems based on face images and/or speech signals have been shown to be quite effective. However, their performance easily degrades in the presence of a mismatch between training and testing conditions. For speech based systems this is usually in the form of channel distortion and/or ambient noise; for face based systems it can be in the form of a change in the illumination direction. A system which uses more than one biometric at the same time is known as a multi-modal verification system; it is often comprised of several modality experts and a decision stage. Since a multi-modal system uses complimentary discriminative information, lower error rates can be achieved; moreover, such a system can also be more robust, since the contribution of the modality affected by environmental conditions can be decreased. This thesis makes several contributions aimed at increasing the robustness of single- and multi-modal verification systems. Some of the major contributions are listed below. The robustness of a speech based system to ambient noise is increased by using Maximum Auto-Correlation Value (MACV) features, which utilize information from the source part of the speech signal. A new facial feature extraction technique is proposed (termed DCT-mod2), which utilizes polynomial coefficients derived from 2D Discrete Cosine Transform (DCT) coefficients of spatially neighbouring blocks. The DCT-mod2 features are shown to be robust to an illumination direction change as well as being over 80 times quicker to compute than 2D Gabor wavelet derived features. The fragility of Principal Component Analysis (PCA) derived features to an illumination direction change is solved by introducing a pre-processing step utilizing the DCT-mod2 feature extraction. We show that the enhanced PCA technique retains all the positive aspects of traditional PCA (that is, robustness to compression artefacts and white Gaussian noise) while also being robust to the illumination direction change. Several new methods, for use in fusion of speech and face information under noisy conditions, are proposed; these include a weight adjustment procedure, which explicitly measures the quality of the speech signal, and a decision stage comprised of a structurally noise resistant piece-wise linear classifier, which attempts to minimize the effects of noisy conditions via structural constraints on the decision boundary.
APA, Harvard, Vancouver, ISO, and other styles
8

Green, Nathan Alan. "Establishing Public Confidence in the Viability of Fingerprint Biometric Technology." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd919.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dimitrov, Emanuil. "Fingerprints recognition." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.

Full text
Abstract:

Nowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sample application. The demonstration software application is developed by using Verifinger SDK and Microsoft Visual Studio platform. The fingerprint sensor for testing the application is AuthenTec AES2501.

APA, Harvard, Vancouver, ISO, and other styles
10

Goswani, B. "Lip-based behavioural biometrics." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.533201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Biometics"

1

Biometric, Consortium Conference (2006 Baltimore MD). 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. Piscataway, NJ: IEEE, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

D, Woodward John. Biometrics. New York: McGraw-Hill/Osborne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boulgouris, Nikolaos V., Konstantinos N. Plataniotis, and Evangelia Micheli-Tzanakou, eds. Biometrics. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2009. http://dx.doi.org/10.1002/9780470522356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jain, Anil K., Ruud Bolle, and Sharath Pankanti, eds. Biometrics. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/b117227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maibach, Howard, and Nily Osman, eds. Cutaneous Biometrics. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-56591-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, David, and Guangming Lu. 3D Biometrics. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7400-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, David, and Milan Sonka, eds. Medical Biometrics. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13923-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rattani, Ajita, Reza Derakhshani, and Arun Ross, eds. Selfie Biometrics. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26972-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, David, ed. Medical Biometrics. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77413-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, David D. Automated Biometrics. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4519-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Biometics"

1

Gunjan, Vinit Kumar, Puja S. Prasad, and Saurabh Mukherjee. "Biometric Template Protection Scheme-Cancelable Biometrics." In Lecture Notes in Electrical Engineering, 405–11. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8715-9_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bhatnagar, Shaleen, and Nidhi Mishra. "Conventional Biometrics and Hidden Biometric: A Comparative Study." In Information and Communication Technology for Intelligent Systems, 473–81. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7062-9_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Franke, Katrin, and Javier Ruiz-del-Solar. "Soft-Biometrics: Soft-Computing Technologies for Biometric-Applications." In Advances in Soft Computing — AFSS 2002, 171–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45631-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cavoukian, Ann, Max Snijder, Alex Stoianov, and Michelle Chibba. "Privacy and Biometrics for Authentication Purposes: A Discussion of Untraceable Biometrics and Biometric Encryption." In Ethics and Policy of Biometrics, 14–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12595-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wayman, James L. "Biometrics." In Handbook of Computer Networks, 539–52. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Skågeby, Jörgen. "Biometrics." In Encyclopedia of Big Data, 1–2. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_26-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kizza, Joseph Migga. "Biometrics." In Texts in Computer Science, 277–89. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Islam, M. Nazrul. "Biometrics." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_10-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mordini, Emilio. "Biometrics." In Handbook of Global Bioethics, 505–26. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-2512-6_101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dhawale, Chitra Anil. "Review and Applications of Multimodal Biometrics for Secured Systems." In Advanced Image Processing Techniques and Applications, 251–66. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2053-5.ch012.

Full text
Abstract:
Biometric Systems provide improved security over traditional electronic access control methods such as RFID tags, electronic keypads and some mechanical locks. The user's authorized card or password pin can be lost or stolen. In order for the biometrics to be ultra-secure and to provide more-than-average accuracy, more than one form of biometric identification is required. Hence the need arises for the use of multimodal biometrics. This uses a combination of different biometric recognition technologies. This chapter begins with the basic idea of Biometrics, Biometrics System with its components, Working and proceeds with the need of Multimodal Biometrics with the emphasis on review of various multimodal systems based on fusion ways and fusion level of various features. The last section of this chapter describes various multimodal Biometric Systems.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometics"

1

Moody, Janette. "Public Perceptions of Biometric Devices:The Effect of Misinformation on Acceptance and Use." In InSITE 2004: Informing Science + IT Education Conference. Informing Science Institute, 2004. http://dx.doi.org/10.28945/2743.

Full text
Abstract:
Organizations are introducing biometric devices into various sections of the economy for various reasons. What began as a security feature for a limited number of government organizations has been adapted to such diverse uses as paying for school children’s lunches to tracking employees’ work attendance. From an organizational perspective, justifications for use of biometric devices are plentiful. However, the public’s perception of these devices may be quite different. These perceptions in turn will influence public willingness to accept and use biometric devices. Although employee use of biometric devices can be mandated, a more productive alternative might be to understand their perceptions and address those specifically through education and information. This paper describes common types of biometrics, reviews their current use in organizations, presents findings of a recent survey of public perceptions to determine the areas requiring the most education, and concludes with suggestions for providing this education.
APA, Harvard, Vancouver, ISO, and other styles
2

De A. S. M., Juliana, and Márjory Da Costa-Abreu. "An evaluation of a three-modal hand-based database to forensic-based gender recognition." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13989.

Full text
Abstract:
In recent years, behavioural soft-biometrics have been widely used to improve biometric systems performance. Information like gender, age and ethnicity can be obtained from more than one behavioural modality. In this paper, we propose a multimodal hand-based behavioural database for gender recognition. Thus, our goal in this paper is to evaluate the performance of the multimodal database. For this, the experiment was realised with 76 users and was collected keyboard dynamics, touchscreen dynamics and handwritten signature data. Our approach consists of compare two-modal and one-modal modalities of the biometric data with the multimodal database. Traditional and new classifiers were used and the statistical Kruskal-Wallis to analyse the accuracy of the databases. The results showed that the multimodal database outperforms the other databases.
APA, Harvard, Vancouver, ISO, and other styles
3

Jangua, Daniel, and Aparecido Marana. "A New Method for Gait Recognition Using 2D Poses." In Workshop de Visão Computacional. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/wvc.2020.13483.

Full text
Abstract:
Over the last decades, biometrics has become an important way for human identification in many areas, since it can avoid frauds and increase the security of individuals in society. Nowadays, most popular biometric systems are based on fingerprint and face features. Despite the great development observed in Biometrics, an important challenge lasts, which is the automatic people identification in low-resolution videos captured in unconstrained scenarios, at a distance, in a covert and noninvasive way, with little or none subject cooperation. In these cases, gait biometrics can be the only choice. The goal of this work is to propose a new method for gait recognition using information extracted from 2D poses estimated over video sequences. For 2D pose estimation, our method uses OpenPose, an open-source robust pose estimator, capable of real-time multi-person detection and pose estimation with high accuracy and a good computational performance. In order to assess the new proposed method, we used two public gait datasets, CASIA Gait Dataset-A and CASIA Gait Dataset-B. Both datasets have videos of a number of people walking in different directions and conditions. In our new method, the classification is carried out by a 1-NN classifier. The best results were obtained by using the chi-square distance function, which obtained 95.00% of rank-1 recognition rate on CASIA Gait Dataset-A and 94.22% of rank-1 recognition rate on CASIA Gait Dataset-B, which are comparable to state-of-the-art results.
APA, Harvard, Vancouver, ISO, and other styles
4

Yazdanpanah, Ali Pour, Karim Faez, and Rasoul Amirfattahi. "Multimodal biometric system using face, ear and gait biometrics." In 2010 10th International Conference on Information Sciences, Signal Processing and their Applications (ISSPA). IEEE, 2010. http://dx.doi.org/10.1109/isspa.2010.5605477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bashir, Faisal, David Usher, Pablo Casaverde, and Marc Friedman. "Video Surveillance for Biometrics: Long-Range Multi-biometric System." In 2008 IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2008. http://dx.doi.org/10.1109/avss.2008.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gilady, Erez, Dale Lindskog, and Shaun Aghili. "Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems." In 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2014. http://dx.doi.org/10.1109/waina.2014.133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pahuja, Gunjan, and T. N. Nagabhushan. "Biometric authentication & identification through behavioral biometrics: A survey." In 2015 International Conference on Cognitive Computing and Information Processing (CCIP). IEEE, 2015. http://dx.doi.org/10.1109/ccip.2015.7100681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vorobyeva, Irina, Darci Guriel, Mary Ferguson, and Helina Oladapo. "Benefits and issues of biometric technologies. Are biometrics worth using?" In SOUTHEASTCON 2014. IEEE, 2014. http://dx.doi.org/10.1109/secon.2014.6950706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Odinaka, Ikenna, Po-Hsiang Lai, Alan D. Kaplan, and Joseph A. O'Sullivan. "On estimating biometric capacity: An example based on LDV biometrics." In 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2010. http://dx.doi.org/10.1109/allerton.2010.5706900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yanushkevich, S. N. "Synthetic Biometrics for Training Users of Biometric and Biomedical Systems." In 2011 International Conference on Cyberworlds (CW). IEEE, 2011. http://dx.doi.org/10.1109/cw.2011.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Biometics"

1

Moore, Brad, and Michaela Iorga. Biometrics testing. Gaithersburg, Md.: National Institute of Standards and Technology, July 2009. http://dx.doi.org/10.6028/nist.hb.150-25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

BIOMETRICS TASK FORCE ARLINGTON VA. Biometrics Task Force. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada517637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johnston, R., and W. Grace. Bartus Iris biometrics. Office of Scientific and Technical Information (OSTI), July 1996. http://dx.doi.org/10.2172/262980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tabassi, Elham, and Patrick Grother. Biometric quality :. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.ir.7544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garris, Michael D., and Charles L. Wilson. NIST biometrics evaluations and developments. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.ir.7204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Choong, Yee-Yin, Mary Theofanos, Brian Stanton, and Patrick Hofmann. Symbols representing biometrics in use. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kang, George S., and Yvette Lee. Voice Biometrics for Information Assurance Applications. Fort Belvoir, VA: Defense Technical Information Center, December 2002. http://dx.doi.org/10.21236/ada408449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schulz, Robert Jr H. Prospects of Biometrics at-a-Distance. Fort Belvoir, VA: Defense Technical Information Center, September 2015. http://dx.doi.org/10.21236/ad1009318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Milley, Mark A., Gerald B. O'Keefe, Timothy J. Leahy, Willard III M. Burleson, S. A. Stearney, David G. Throop, and R. Jr B. Turner. Biometrics: Multi-Service Tactics, Techniques, and Procedures for Tactical Employment of Biometrics in Support of Operations. Fort Belvoir, VA: Defense Technical Information Center, May 2016. http://dx.doi.org/10.21236/ad1013627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ulery, Brad, Austin Hicklin, C. I. Watson, William Fellner, and Peter Hallinan. Studies of biometric fusion. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.ir.7346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography