To see the other types of publications on this topic, follow the link: Biometics.

Journal articles on the topic 'Biometics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Biometics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Srivastava, Prateek, and Rohit Srivastava. "A Multimodal Based Approach for Face and Unique Mark Based Combination for Confirmation of Human." International Journal of Business Analytics 6, no. 3 (July 2019): 16–28. http://dx.doi.org/10.4018/ijban.2019070102.

Full text
Abstract:
Biometric processes are utilized for recognition and distinguishing a person for different applications. The procedure is made possible by utilizing single biometric highlight or a mix of biometric highlights. In the event that the distinguishing proof is finished by utilizing a solitary biometric highlight (confront, iris, finger, palm, and so forth) then the framework is called unimodal, and if a combnation of biometrics are utilized then it is called multimodal. In a multimodal framework compared to the different downsides of a unimodal framework (noisy data, multiple vectors and so forth) are evacuated. The fundamental objective of the proposed work is to outline a system that will give validation in view of three-level verification for a man. Prior works in this field are clarified in various factual models in view of various verification plans. In the proposed strategy, a system is created in which if one biometric attribute fails then the other biometic characteristics can be utilized for verification.
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Tushar, and Upinder Kaur. "Biometric Security: A Review to Future." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3758–68. http://dx.doi.org/10.47059/revistageintec.v11i4.2405.

Full text
Abstract:
This paper presents the different biometric with their limitations and introduces their alternative in form of brain biometric, Breath biometrics, and Tongue biometrics. Brain biometric uses brain wave while breath biometric uses one’s breath and tongue biometric uses a tongue’s shape and variation to distinguish them and present a good alternative for the presently used biometric like fingerprint, iris recognition, face recognition.
APA, Harvard, Vancouver, ISO, and other styles
3

Yaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.

Full text
Abstract:
Biometric is used as a main security fence in a computer system. The unique characteristics of a person can be distinguished from each other. Human’s biometrics can be categorized into three types: morphological, biological and behavioural. Morphological biometrics uses physical features for recognition. Biological biometrics used to identify user based on biological features. Behavioural biometrics such as gender, culture, height and weight can be used as an additional security measure within a system. These biometric behavioural features are also known as soft biometric. This study uses soft biometric elements (gender, culture, region of birth and educational level) in the keystroke dynamic study to distinguish typing patterns in each of these categories. The Support Vector Machine (SVM) classification method is used to perform this classification for soft biometric identification. The results of this study have shown that soft biometrics in keystroke dynamic can be used to distinguish group of individuals typing.
APA, Harvard, Vancouver, ISO, and other styles
4

Shopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, and Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions." Journal of Cybersecurity and Privacy 1, no. 3 (August 31, 2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.

Full text
Abstract:
Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article concludes with open questions and provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.
APA, Harvard, Vancouver, ISO, and other styles
5

B.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.

Full text
Abstract:
Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric Modalities and Face recognition Techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Reddy, M. V. Bramhananda, and V. Goutham. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research -GRANTHAALAYAH 6, no. 1 (January 31, 2018): 80–90. http://dx.doi.org/10.29121/granthaalayah.v6.i1.2018.1596.

Full text
Abstract:
Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using iris or along with other biometrics for security with great precision. Multimodal biometric systems came into existence for better accuracy in human authentication. However, iris is considered to be most discriminatory of facial biometrics. Study of iris based human identification in ideal and non-cooperative environments can provide great insights which can help researchers and organizations that depend on iris-based biometric systems. The technical knowhow of iris strengths and weaknesses can be great advantage. This is more important in the wake of widespread use of smart devices which are vulnerable to attacks. This paper throws light into various iris-based biometric systems, issues with iris in the context of texture comparison, cancellable biometrics, iris in multi-model biometric systems, iris localization issues, challenging scenarios pertaining to accurate iris recognition and so on.
APA, Harvard, Vancouver, ISO, and other styles
7

S. Raju, A., and V. Udayashankara. "A Survey on Unimodal, Multimodal Biometrics and Its Fusion Techniques." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 689. http://dx.doi.org/10.14419/ijet.v7i4.36.24224.

Full text
Abstract:
Presently, a variety of biometric modalities are applied to perform human identification or user verification. Unimodal biometric systems (UBS) is a technique which guarantees authentication information by processing distinctive characteristic sequences and these are fetched out from individuals. However, the performance of unimodal biometric systems restricted in terms of susceptibility to spoof attacks, non-universality, large intra-user variations, and noise in sensed data. The Multimodal biometric systems defeat various limitations of unimodal biometric systems as the sources of different biometrics typically compensate for the inherent limitations of one another. The objective of this article is to analyze various methods of information fusion for biometrics, and summarize, to conclude with direction on future research proficiency in a multimodal biometric system using ECG, Fingerprint and Face features. This paper is furnished as a ready reckoner for those researchers, who wish to persue their work in the area of biometrics.
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Bhanu, and Nirvisha Singh. "MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics." Information 11, no. 6 (June 8, 2020): 308. http://dx.doi.org/10.3390/info11060308.

Full text
Abstract:
With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. Organizations encourage their members to use biometrics, but they are hesitant to use them due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. We propose a server-specific add-on biometric security layer model (MoLaBSS) to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show good potential of this framework to enhance users’ confidence level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (September 14, 2021): 6163. http://dx.doi.org/10.3390/s21186163.

Full text
Abstract:
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
10

Alam*, Varisha, and Dr Mohammad Arif. "Classification of Large Biometric Data in Database System." International Journal of Innovative Technology and Exploring Engineering 10, no. 10 (August 30, 2021): 1–8. http://dx.doi.org/10.35940/ijitee.d8592.08101021.

Full text
Abstract:
"Biometrics" is got from the Greek word 'life' and 'measure' which implies living and evaluation take apart. It simply converts into "life estimation". Biometrics uses computerized acknowledgment of people, dependent on their social and natural attributes. Biometric character are data separated from biometric tests, which can use for examination with a biometric orientation. Biometrics involves techniques to unusually recognize people dependent on at least one inherent physical or behavior attribute. In software engineering, specifically, biometric is used as a form of character retrieve the Committee and retrieve command. Biometric identically utilized to recognize people in bunches that are in observation. Biometric has quickly risen like a auspicious innovation for validation and has effectively discovered a spot in most of the scientific safety regions. An effective bunching method suggest for dividing enormous biometrics data set through recognizable proof. This method depends on the changed B+ tree is decreasing the discs get to. It diminishes the information recovery time and also possible error rates. Hence, for bigger applications, the need to reduce the data set to a more adequate portion emerges to accomplish both higher paces and further developed precision. The main motivation behind ordering is to recover a small data set for looking through the inquiry
APA, Harvard, Vancouver, ISO, and other styles
11

Michelsen, Lea Laura. "Thinking Beyond Biometrics." A Peer-Reviewed Journal About 7, no. 1 (July 6, 2018): 36–49. http://dx.doi.org/10.7146/aprja.v7i1.115063.

Full text
Abstract:
Today, digital biometrics are proliferating. Based on scans of biological traits – from faces, fingerprints and gait to vein patterns, heart rhythm, brain activity, and body odor – biometrics are known to be able to establish the identity of a human subject. When reading humanities research on biometrics, though, it becomes evident that we are altering a lot more than just our faces. This article proposes a study of a wave of artistic counter-biometrics in order to enable thinking beyond the biometric box, practicing the ‘art of disappearing’ from the biometric gaze. With an outset in Zach Blas’ Face Cages (2013- 16) and his “Fag Face” mask from Facial Weaponization Suite (2011-14) the article argues that biometrics produces an aesthetics, and that it should be treated as such. This shifts our perspective from the technical media to the narratives we inscribe in these media and the aesthetic output enabled by that. Activating a counter- biometric aesthetics is far from naïve. On the contrary, engaging in the aesthetics of biometrics is a valuable and urgently needed research strategy for dealing with the physiognomic renaissance biometrics brings about.
APA, Harvard, Vancouver, ISO, and other styles
12

Hausawi, Yasser. "Role of Usability on using Biometrics for Cybersecurity." Transactions on Networks and Communications 7, no. 4 (November 8, 2019): 19–26. http://dx.doi.org/10.14738/tnc.74.7244.

Full text
Abstract:
ABSTRACT Biometrics are traits that allow individuals to be identified. Popular biometrics include fingerprints, faces, and irides. A common use of biometric systems is for authentication of users desiring access to a system or resource. However, the use of biometrics presents challenges and opportunities unique to other authentication methods, such as passwords and tokens. Biometric systems are also vulnerable to poor usability. Such systems must be engineered with wide user accessibility and acceptability in mind, but must still provide robust security as well. As lack of usability causes systems' failures, and enhancing systems' usability reduces such failures. This article first presents an overview of biometric systems employed today, including their usage and security merits. We then consider the specific role usability plays on both the development and long-term utility of biometric systems used for Cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
13

., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.

Full text
Abstract:
Biometrics is the discipline to measure physical human characteristics for the identification and authentication of an individual. Since ancient times, people have used voice, face, and other characteristics for the identification of an individual. With evolution, we take the individual characteristics like fingerprint scans, retina and iris images, etc., as inputs to the computer systems and then store or verify them with existing records. This report discusses biometrics and its recent roles found in the field of healthcare, medicine, genetics, and biotechnology. It includes the concept of biometrics, the system used for biometric recognition and its working, types of biometric systems, the different system algorithms applied, and system modules which are well illustrated with flow charts and block diagrams. Some of the health institutes in developed countries have started using biometric systems for checking patients and/or doctors. Biometry has enabled the proper organization and storage of the health records of individuals in medical institutes. Biometric authentication is also finding a distinct role in foiling medical claims fraud highlighting the advantages it. Even after processing via a very accurate biometric system, there is a chance of a false result due to some disease or injury to the body part subjected to biometry or faulty system leading to some error. There is also a possibility that the biometric system may harm our bodies. Moreover, biometric records need really tight system security to prevent any kind of misuse. Biometrics has a great potential to find a lot more uses in the field of healthcare. Many ideas are being proposed for implementation. In the future, biometrics can be used to detect potential disease and risks by using methods like adiposity measurement and Gas Discharge Visualization (GDV).
APA, Harvard, Vancouver, ISO, and other styles
14

Fianyi, Israel, and Tanveer Zia. "Biometric Technology Solutions to Countering Today's Terrorism." International Journal of Cyber Warfare and Terrorism 6, no. 4 (October 2016): 28–40. http://dx.doi.org/10.4018/ijcwt.2016100103.

Full text
Abstract:
The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification purpose has become important. Consequently, the many ripostes that were renewed on identity management included enhanced use of biometrics to verify and authenticate travellers at various airports as well as the use of video surveillance equipped with facial recognition sensors. The growth in data and storage devices have also become a critical phenomenon in biometrics deployment, the swiftness and accuracy with which these biometrics details can be processed is a prevailing challenge. This paper provides an extensive review of literatures on prospects of biometric technologies and other interrelated technologies in the fight against terrorism. To date, there is relatively meagre academic research examining how biometric technologies enhance border security as well as individual security.
APA, Harvard, Vancouver, ISO, and other styles
15

Drosou, A., D. Ioannidis, K. Moustakas, and D. Tzovaras. "Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept." Scientific World JOURNAL 11 (2011): 503–19. http://dx.doi.org/10.1100/tsw.2011.51.

Full text
Abstract:
Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.
APA, Harvard, Vancouver, ISO, and other styles
16

Channegowda, Arjun Benagatte, and H. N. Prakash. "Multimodal biometrics of fingerprint and signature recognition using multi-level feature fusion and deep learning techniques." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 187. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp187-195.

Full text
Abstract:
Providing security in biometrics is the major challenging task in the current situation. A lot of research work is going on in this area. Security can be more tightened by using complex security systems, like by using more than one biometric trait for recognition. In this paper multimodal biometric models are developed to improve the recognition rate of a person. The combination of physiological and behavioral biometrics characteristics is used in this work. Fingerprint and signature biometrics characteristics are used to develop a multimodal recognition system. Histograms of oriented gradients (HOG) features are extracted from biometric traits and for these feature fusions are applied at two levels. Features of fingerprint and signatures are fused using concatenation, sum, max, min, and product rule at multilevel stages, these features are used to train deep learning neural network model. In the proposed work, multi-level feature fusion for multimodal biometrics with a deep learning classifier is used and results are analyzed by a varying number of hidden neurons and hidden layers. Experiments are carried out on SDUMLA-HMT, machine learning and data mining lab, Shandong University fingerprint datasets, and MCYT signature biometric recognition group datasets, and encouraging results were obtained.
APA, Harvard, Vancouver, ISO, and other styles
17

Buciu, Ioan, and Alexandru Gacsadi. "Biometrics Systems and Technologies: A survey." International Journal of Computers Communications & Control 11, no. 3 (March 24, 2016): 315. http://dx.doi.org/10.15837/ijccc.2016.3.2556.

Full text
Abstract:
In a nutshell, a biometric security system requires a user to provide some biometric features which are then verified against some stored biometric templates. Nowadays, the traditional password based authentication method tends to be replaced by advanced biometrics technologies. Biometric based authentication is becoming increasingly appealing and common for most of the human-computer interaction devices. To give only one recent example, Microsoft augmented its brand new Windows 10 OS version with the capability of supporting face recognition when the user login in. This chapter does not intend to cover a comprehensive and detailed list of biometric techniques. The chapter rather aims at briefly discussing biometric related items, including principles, definitions, biometric modalities and technologies along with their advantages, disadvantages or limitations, and biometric standards, targeting unfamiliar readers. It also mentions the attributes of a biometric system as well as attacks on biometrics. Important reference sources are pointed out so that the interested reader may gain deeper in-depth knowledge by consulting them.
APA, Harvard, Vancouver, ISO, and other styles
18

Thian Song, Ong, Andrew Teoh Beng Jin, and Tee Connie. "Personalized biometric key using fingerprint biometrics." Information Management & Computer Security 15, no. 4 (August 21, 2007): 313–28. http://dx.doi.org/10.1108/09685220710817824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Arunarani, S., and R. Gobinath. "A survey on multimodal biometrics for human authentication." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 273. http://dx.doi.org/10.14419/ijet.v7i2.33.14167.

Full text
Abstract:
Authentication process identifies an individual to get an endorsed access by entering their login credentials. The inconvenience with this method is the user must remember the keywords, and the passwords can be predicted or if it is hard to guess it will be cracked through brute force. Due to this fault, this method is lack of integrity. Biometrics sample recognize a person based on his behavioral or physiological char-acteristics. Unimodal biometric systems have to resist with a different types of problems such as inconsistent data, intra-class variations, deceit attacks and high error rates. Multimodal biometrics implements secure authentication using various biometric traits. This survey gives us a wide scope for improving and enhancing the biometric applications. In this paper, we have explained multimodal biometrics to decrease the error rate and increase the security.
APA, Harvard, Vancouver, ISO, and other styles
20

Chinyemba, Melissa K., and Jackson Phiri. "Gaps in the Management and Use of Biometric Data: A Case of Zambian Public and Private Institutions." Zambia ICT Journal 2, no. 1 (June 29, 2018): 35–43. http://dx.doi.org/10.33260/zictjournal.v2i1.49.

Full text
Abstract:
The current physical and cybersecurity systems rely on traditional three-factor authentication to mitigate the threats posed by insider attacks. Key is the use of biometric information. Biometrics are a unique measurement and analysis of the unique physiological special traits such as voice, eye structure and others that can be used in the discipline of varying person identification. Biometry, which is the analysis of these biometrics is a complex process but guarantees identification and non-repudiation. If used to identify humans then several issues such as where is the biometric data stored? Who has access to it? And how does one ensure that such data satisfies the principle of availability. To achieve availability, secure transportation arises. To achieve transportation, non-repudiation, confidentiality and authentication, integrity arise. A storage and transport system is recommended to these challenges. In this paper, we explore the gaps into how public and private institution store and manage biometrics information. We benchmarked each organization again the ISO 30107 and ISO 24745. Our results show that while most companies are adopting and using biometrics systems, few have adopted the ISO biometrics standards that govern the storage and management of biometric information and hence creating security risk.
APA, Harvard, Vancouver, ISO, and other styles
21

Alam, Varisha. "Ordering of Huge Biometric Information in Database System." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 2, no. 2 (June 6, 2021): 1–19. http://dx.doi.org/10.54060/jieee/002.02.011.

Full text
Abstract:
The word biometrics is derived from the Greek words 'bios' and 'metric' which means living and calculation appropriately. Biometrics is the electronic identification of individuals based on their physiological and biological features. Biometric attributes are data take out from biometric test which can be used for contrast with a biometric testimonial. Biometrics composed methods for incomparable concede humans based upon one or more inherent material or behavioral characteristics. In Computer Science, bio-metrics is employed as a kind of recognition access management and access command. Biometrics has quickly seemed like an auspicious technology for attestation and has already found a place in the most sophisticated security areas. A systematic clustering technique has been there for partitioning huge biometric databases throughout recognition. As we tend to are still obtaining the higher bin-miss rate, so this work is predicated on conceiving an ordering strategy for recognition of huge biometric database and with larger precision. This technique is based on the modified B+ tree that decreases the disk accesses. It reduced the information retrieval time and feasible error rates. The ordering technique is employed to proclaims a person’s identity with a reduced rate of differentiation instead of searching the whole database. The response time degenerates, further-more because the accuracy of the system deteriorates as the size of the database increases. Hence, for vast applications, the requirement to reduce the database to a little fragment seems to attain higher speeds and improved accuracy.
APA, Harvard, Vancouver, ISO, and other styles
22

Jovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.

Full text
Abstract:
Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digital identity management and MMBio framework for multimodal biometrics. Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data. Developed prototype confirms possible integration of identity management and multimodal biometric systems.
APA, Harvard, Vancouver, ISO, and other styles
23

Avinash, P., T. Venkateswarlu, and Dama Anand. "A Detail Study on Biometrics with Matlab." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 243. http://dx.doi.org/10.14419/ijet.v7i2.20.14771.

Full text
Abstract:
Biometrics is an emerging field of innovation utilizing one of a kind and quantifiable physical, natural, or behavioral attributes that can be prepared to recognize a man. It is a multidisciplinary subject that incorporates building, measurements, arithmetic, figuring, brain research, and approach. The requirement for biometrics can be found in governments, in the military, and in business applications. The Electrical Engineering Department at the U.S. Maritime Academy, Annapolis, MD, has presented a biometric flag preparing course for senior-level undergrad understudies and has built up a biometrics lab to help this course. In this paper, the creators exhibit the course content, the recently created biometric flag handling lab, and the intuitive learning procedure of the biometric course. They examine a portion of the challenges that were experienced in executing the course and how they were overcome. They additionally give some input from the course appraisal.
APA, Harvard, Vancouver, ISO, and other styles
24

Jain, Anil K., and Arun Ross. "Bridging the gap: from biometrics to forensics." Philosophical Transactions of the Royal Society B: Biological Sciences 370, no. 1674 (August 5, 2015): 20140254. http://dx.doi.org/10.1098/rstb.2014.0254.

Full text
Abstract:
Biometric recognition, or simply biometrics, refers to automated recognition of individuals based on their behavioural and biological characteristics. The success of fingerprints in forensic science and law enforcement applications, coupled with growing concerns related to border control, financial fraud and cyber security, has generated a huge interest in using fingerprints, as well as other biological traits, for automated person recognition. It is, therefore, not surprising to see biometrics permeating various segments of our society. Applications include smartphone security, mobile payment, border crossing, national civil registry and access to restricted facilities. Despite these successful deployments in various fields, there are several existing challenges and new opportunities for person recognition using biometrics. In particular, when biometric data is acquired in an unconstrained environment or if the subject is uncooperative, the quality of the ensuing biometric data may not be amenable for automated person recognition. This is particularly true in crime-scene investigations, where the biological evidence gleaned from a scene may be of poor quality. In this article, we first discuss how biometrics evolved from forensic science and how its focus is shifting back to its origin in order to address some challenging problems. Next, we enumerate the similarities and differences between biometrics and forensics. We then present some applications where the principles of biometrics are being successfully leveraged into forensics in order to solve critical problems in the law enforcement domain. Finally, we discuss new collaborative opportunities for researchers in biometrics and forensics, in order to address hitherto unsolved problems that can benefit society at large.
APA, Harvard, Vancouver, ISO, and other styles
25

Lakhera, Manmohan, and Manmohan Singh Rauthan. "Securing Stored Biometric Template Using Cryptographic Algorithm." International Journal of Rough Sets and Data Analysis 5, no. 4 (October 2018): 48–60. http://dx.doi.org/10.4018/ijrsda.2018100103.

Full text
Abstract:
The biometric template protection technique provides the security in many authentication applications. Authentication based on biometrics has more advantages over traditional methods such as password and token-based authentication methods. The advantage of any biometric-based authentication system over a traditional one is that the person must physically be present at that place while recognizing him. So, it is essential to secure these biometrics by combining these with cryptography. In the proposed algorithm, the AES algorithm is used for securing the stored and transmitted biometric templates using helping data. The helping data is a variable type of data which is changed at every attempt for registration. The final symmetric key AES algorithm is a combination of helping data and actual symmetric keys of the AES algorithm. The experimental analysis shows that a brute force attack takes a long time to recover the original biometric template from cipher biometric template. So, the proposed technique provides sufficient security to stored biometric templates.
APA, Harvard, Vancouver, ISO, and other styles
26

Song, Mi Yeon, Sung Rae Noh, and Kook Young Kim. "Refractive prediction of four different intraocular lens calculation formulas compared between new swept source optical coherence tomography and partial coherence interferometry." PLOS ONE 16, no. 5 (May 4, 2021): e0251152. http://dx.doi.org/10.1371/journal.pone.0251152.

Full text
Abstract:
Purpose To compare the biometry and prediction of postoperative refractive outcomes of four different formulae (Haigis, SRK/T, Holladay1, Barrett Universal II) obtained by swept-source optical coherence tomography (SS-OCT) biometers and partial coherence interferometry (PCI; IOLMaster ver 5.4). Methods We compared the biometric values of SS-OCT (ANTERION, Heidelberg Engineering Inc., Heidelberg, Germany) and PCI (IOLMaster, Carl Zeiss Meditec, Jena, Germany). Predictive errors calculated using four different formulae (Haigis, SRKT, Holladay1, Barrett Universal II) were compared at 1 month after cataract surgery. Results The mean preoperative axial length (AL) showed no statistically significant difference between SS-OCT and PCI (SS-OCT: 23.78 ± 0.12 mm and PCI: 23.77 ± 0.12 mm). The mean anterior chamber depth (ACD) was 3.30 ± 0.04 mm for SS-OCT and 3.23 ± 0.04 mm for PCI, which was significantly different between the two techniques. The mean corneal curvature also differed significantly between the two techniques. The difference in mean arithmetic prediction error was significant in the Haigis, SRKT, and Holladay1 formulae. The difference in mean absolute prediction error was significant in all four formulae. Conclusions SS-OCT and PCI demonstrated good agreement on biometric measurements; however, there were significant differences in some biometric values. These differences in some ocular biometrics can cause a difference in refractive error after cataract surgery. New type SS-OCT was not superior to the IOL power prediction calculated by PCI.
APA, Harvard, Vancouver, ISO, and other styles
27

Sabharwal, Munish. "Multi-Modal Biometric Authentication and Secure Transaction Operation Framework for E-Banking." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 102–16. http://dx.doi.org/10.4018/ijbdcn.2017010109.

Full text
Abstract:
The rationale of the research work is to suggest a multi-modal biometric authentication and secure transaction operation framework for E-Banking. The literature survey identifies the various types of E-Banking Channels available as on-date, the various types of biometric technologies available as on-date as well the significant metrics affecting their performance while deploying them in various different e-banking channels. The performance analysis of various types of biometric technologies based on significant metrics for Biometrics Implementation further identifies the currently implementable biometric technologies for the various different e-banking channels. Subsequently a requirement analysis of potential e-banking channels is followed by System Suitability Analysis to identify which multi-biometrics and support mechanisms are suitable for particular e-banking channels. The final conclusion suggests a viable multi-modal biometric authentication and secure transaction operation framework for various e-banking channels.
APA, Harvard, Vancouver, ISO, and other styles
28

Choudhury, Bismita, Patrick Then, Biju Issac, Valliappan Raman, and Manas Kumar Haldar. "A Survey on Biometrics and Cancelable Biometrics Systems." International Journal of Image and Graphics 18, no. 01 (January 2018): 1850006. http://dx.doi.org/10.1142/s0219467818500067.

Full text
Abstract:
Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results.
APA, Harvard, Vancouver, ISO, and other styles
29

Rasiah, Devinaga, and Yuen Yee Yen. "User acceptance of ATM biometric authentication." Global Journal of Computer Sciences: Theory and Research 10, no. 1 (April 30, 2020): 11–17. http://dx.doi.org/10.18844/gjcs.v10i1.4748.

Full text
Abstract:
Malaysia is amongst one of the first countries in the world to use biometrics as a standard in its identification cards and automatic teller machines (ATMs). Currently, there is a lack of studies in Malaysia and around the world that studied the user acceptance of ATM biometric authentication technology. All previous studies tended to overlook the user acceptance of ATM biometrics authentication which is an increasingly important mechanism to verify user identity in banking industry. Therefore, this study is carried out to examine the key factors of user acceptance of ATM biometric authentication technology in Malaysian banks. The target population of this study was customers of commercial banks in the central region of Malaysia. The participants were randomly selected. The questionnaire was distributed to 200 bank customers who have at least 1-year experience in using ATM biometric authentication. The items in the questionnaire were derived from the extensive survey of relevant literature and oral interview. The findings show that both the performance expectancy and social influence have significant effects on user adoption of ATM biometric authentication. Keywords: ATM, behavioural intention to use, biometrics, performance expectancy, social influence.
APA, Harvard, Vancouver, ISO, and other styles
30

Lozhnikov, Pavel, and Samal Zhumazhanova. "Model of the "biometry-code" converter based on artificial neural networks for analysis of facial thermograms." Digital Technology Security, no. 2 (June 25, 2021): 154–65. http://dx.doi.org/10.17212/2782-2230-2021-2-154-165.

Full text
Abstract:
Existing asymmetric encryption algorithms involve the storage of a secret private key, authorized access to which, as a rule, is carried out upon presentation of a password. Passwords are vulnerable to social engineering and human factors. Combining biometric security techniques with cryptography is seen as a possible solution to this problem, but any biometric cryptosystem should be able to overcome the small differences that exist between two different implementations of the same biometric parameter. This is especially true for dynamic biometrics, when differences can be caused by a change in the psychophysiological state of the subject. The solution to the problems is the use of a system based on the "biometrics-code" converter, which is configured to issue a user key after presentation of his/her biometric image. In this case, the key is generated in advance in accordance with accepted standards without the use of biometric images. The work presents results on using thermal images of a user for reliable biometric authentication based on a neural network "biometrics-code" converter. Thermal images have recently been used as a new approach in biometric identification systems and are a special type of biometric images that allow us to solve the problem of both the authentication of the subject and the identification of his psychophysiological state. The advantages of thermal imaging are that this technology is now becoming available and mobile, allowing the user to be identified and authenticated in a non-contact and continuous manner. In this paper, an experiment was conducted to verify the images of thermograms of 84 subjects and the following indicators of erroneous decisions were obtained: EER = 0.85 % for users in the "normal"state.
APA, Harvard, Vancouver, ISO, and other styles
31

Barzut, Srđan, Milan Milosavljević, Saša Adamović, Muzafer Saračević, Nemanja Maček, and Milan Gnjatović. "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks." Mathematics 9, no. 7 (March 28, 2021): 730. http://dx.doi.org/10.3390/math9070730.

Full text
Abstract:
Modern access controls employ biometrics as a means of authentication to a great extent. For example, biometrics is used as an authentication mechanism implemented on commercial devices such as smartphones and laptops. This paper presents a fingerprint biometric cryptosystem based on the fuzzy commitment scheme and convolutional neural networks. One of its main contributions is a novel approach to automatic discretization of fingerprint texture descriptors, entirely based on a convolutional neural network, and designed to generate fixed-length templates. By converting templates into the binary domain, we developed the biometric cryptosystem that can be used in key-release systems or as a template protection mechanism in fingerprint matching biometric systems. The problem of biometric data variability is marginalized by applying the secure block-level Bose–Chaudhuri–Hocquenghem error correction codes, resistant to statistical-based attacks. The evaluation shows significant performance gains when compared to other texture-based fingerprint matching and biometric cryptosystems.
APA, Harvard, Vancouver, ISO, and other styles
32

Sujana, S., and V. S. K. Reddy. "Comparison of levels and fusion approaches for multimodal biometrics." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (August 1, 2021): 791. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp791-801.

Full text
Abstract:
The biometric-based authentication system occupies maximal space in the field of security administration. Biometric applications are swiftly accelerating in day-to-day life such as computer login, smart homes, online banking, hospitals, border areas, industries, forensics, e-voting attendance system and investigation of crime. A reliable and accurate recognition body can be achieved with multimodal biometric methodologies. In this paper, we discuss starting with an introduction to biometric systems followed by their classification, and advantages as well as disadvantages. In today’s world, most of the systems are unimodal biometrics having a lot of limitations to overcome those multimodal biometrics comes in to picture. In this paper we have discussed comprehensive representation on the system of multimodal biometric, various modes of undertakings, the significance of information fusion, a different section is allotted on the various possible levels of fusion involving sensor-level, feature-level, score-level, and decision -level as well as different rules of fusion.
APA, Harvard, Vancouver, ISO, and other styles
33

Kulikov, A. A. "Application of biometric systems in face identification technologies." Russian Technological Journal 9, no. 3 (June 28, 2021): 7–14. http://dx.doi.org/10.32362/2500-316x-2021-9-3-7-14.

Full text
Abstract:
The paper presents an analytical review of the application of biometric recognition systems in relation to facial image identification technologies. The classification of biometric systems is presented. The trends of technological progress in the field of biometrics and facial recognition capabilities are considered. It is determined that in 2020 there is a trend of transition from the use of biometric recognition technologies in traditional state security systems to the sphere of commercial and user applications. The process of «linking» encryption keys and passwords with the biometric parameters of the data subject is described. It is proposed that a biometric feature and a biometrics parameter mean a certain value that has a physical meaning that characterizes the subject itself. The possibility of using circular neighborhood and bilinear interpolation of pixel intensity values in biometrics is also presented. This will make it possible to build a local binary template. In order to solve the problem of identification of persons, it is advisable to investigate the essence of biometric systems in the technologies of identification of persons, their types, identifying the shortcomings of each of them, on the basis of which to present the directions of elimination and search for the most reliable technologies. The essence of the use of biometric systems in the technologies of identification of persons is, for example, that the user can provide the bank or other counterparty with evidence that it is he who wants to use the services on his accounts. At the same time, the demand has increased for contactless biometric solutions. These technologies are implemented in order to conduct additional biometric verification of users. This allows to minimize possible fraud or violation of the internal rules of the service, for example, the transfer of accounts of some registered users to others.
APA, Harvard, Vancouver, ISO, and other styles
34

NAZAR, AKIF, ISSA TRAORÉ, and AHMED AWAD E. AHMED. "INVERSE BIOMETRICS FOR MOUSE DYNAMICS." International Journal of Pattern Recognition and Artificial Intelligence 22, no. 03 (May 2008): 461–95. http://dx.doi.org/10.1142/s0218001408006363.

Full text
Abstract:
Various techniques have been proposed in different literature to analyze biometric samples collected from individuals. However, not a lot of attention has been paid to the inverse problem, which consists of synthesizing artificial biometric samples that can be used for testing existing biometric systems or protecting them against forgeries. In this paper, we present a framework for mouse dynamics biometrics synthesis. Mouse dynamics biometric is a behavioral biometric technology, which allows user recognition based on the actions received from the mouse input device while interacting with a graphical user interface. The proposed inverse biometric model learns from random raw samples collected from real users and then creates synthetic mouse actions for fake users. The generated mouse actions have unique behavioral properties separate from the real mouse actions. This is shown through various comparisons of behavioral metrics as well as a Kolmogorov–Smirnov test. We also show through a two-fold cross-validation test that by submitting sample synthetic data to an existing mouse biometrics analysis model we achieve comparable performance results as when the model is applied to real mouse data.
APA, Harvard, Vancouver, ISO, and other styles
35

Sulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised." Information and Control Systems, no. 4 (August 24, 2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.

Full text
Abstract:
Introduction: Biometrics-to-code converters based on neural networks are the ideological basis for a series of GOST R 52633 standards (unparalleled anywhere in the world) and can be used in the development of highly reliable biometric authentication and electronic signature with biometric activation. Purpose: Developing a model of a biometrics-to-code converter for highly reliable biometric authentication by handwritten passwords with high resistance to attacks on knowledge extraction. Results: We demonstrated the vulnerability of neural networks which makes it possible to perform quick directed enumeration of competing examples in order to compromise a biometric pattern and the personal key of its owner. We described a method of effective protection against this attack, and proposed a hybrid model for a biometrics-to-code converter based on a new type of hybrid neural networks, which does not compromise the biometric standard and the user’s key (password), being resistant to such attacks. The high reliability and effectiveness of the proposed model has been experimentally confirmed in handwritten password verification. The reliability indicators for generating a key from a handwritten password were: FRR = 11.5%, FAR = 0.0009% with a key length of 1024 bits (taking into account the presented fakes of a handwritten pattern). Practical relevance: The results can be used in information security applications or electronic document management.
APA, Harvard, Vancouver, ISO, and other styles
36

Thompson, Elizabeth, Marie Davidian, and Stephen Buckland. "Biometrics, JABES and the International Biometric Society." Journal of Agricultural, Biological and Environmental Statistics 22, no. 3 (August 10, 2017): 221–23. http://dx.doi.org/10.1007/s13253-017-0302-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bayly, Duncan, Maurice Castro, Arathi Arakala, Jason Jeffers, and Kathy Horadam. "Fractional biometrics: safeguarding privacy in biometric applications." International Journal of Information Security 9, no. 1 (December 1, 2009): 69–82. http://dx.doi.org/10.1007/s10207-009-0096-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ivanov, Alexander, and Alexeiy Sulavko. "Draft of the Third National Standard of Russia for Fast Automatic Learning of Large Correlation Neural Networks on Small Training Samples of Biometric Data." Voprosy kiberbezopasnosti, no. 3(43) (2021): 84–93. http://dx.doi.org/10.21681/2311-3456-2021-3-84-93.

Full text
Abstract:
The aim of the study is to show that a biometrics-to-access code converter based on large networks of correlation neurons makes it possible to obtain an even longer key at the output while ensuring the protection of biometric data from compromise. The research method is the use of large «wide» neural networks with automatic learning for the implementation of the biometric authentication procedure, ensuring the protection of biometric personal data from compromise. Results of the study - the first national standard GOST R 52633.5 for the automatic training of neuron networks was focused only on a physically secure, trusted computing environment. The protection of the parameters of the trained neural network converters biometrics-code using cryptographic methods led to the need to use short keys and passwords for biometric-cryptographic authentication. It is proposed to build special correlation neurons in the meta-space of Bayes-Minkowski features of a higher dimension. An experiment was carried out to verify the patterns of kkeystroke dynamics using a biometrics-to-code converter based on the data set of the AIConstructor project. In the meta-space of features, the probability of a verification error turned out to be less (EER = 0.0823) than in the original space of features (EER = 0.0864), while in the protected execution mode of the biometrics-to-code converter, the key length can be increased by more than 19 times. Experiments have shown that the transition to the mat space of BayesMinkowski features does not lead to the manifestation of the “curse of dimension” problem if some of the original features have a noticeable or strong mutual correlation. The problem of ensuring the confidentiality of the parameters of trained neural network containers, from which the neural network converter biometrics-code is formed, is relevant not only for biometric authentication tasks. It seems possible to develop a standard for protecting artificial intelligence based on automatically trained networks of Bayesian-Minkowski correlation neurons.
APA, Harvard, Vancouver, ISO, and other styles
39

Punithavathi, P., and S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.

Full text
Abstract:
Cancelable biometrics, a template transformation approach, attempts to provide robustness for authentication services based on biometrics. Several biometric template protection techniques represent the biometric information in binary form as it provides benefits in matching and storage. In this context, it becomes clear that often such transformed binary representations can be easily compromised and breached. In this paper, we propose an efficient non-invertible template transformation approach using random projection technique and Discrete Fourier transformation to shield the binary biometric representations. The cancelable fingerprint templates designed by the proposed technique meets the requirements of revocability, diversity, non-invertibility and performance. The matching performance of the cancelable fingerprint templates generated using proposed technique, have improved when compared with the state-of-art methods.
APA, Harvard, Vancouver, ISO, and other styles
40

Kostyuk, Nataliya, Phyadragren Cole, Natarajan Meghanathan, Raphael D. Isokpehi, and Hari H. P. Cohly. "Gas Discharge Visualization: An Imaging and Modeling Tool for Medical Biometrics." International Journal of Biomedical Imaging 2011 (2011): 1–7. http://dx.doi.org/10.1155/2011/196460.

Full text
Abstract:
The need for automated identification of a disease makes the issue of medical biometrics very current in our society. Not all biometric tools available provide real-time feedback. We introduce gas discharge visualization (GDV) technique as one of the biometric tools that have the potential to identify deviations from the normal functional state at early stages and in real time. GDV is a nonintrusive technique to capture the physiological and psychoemotional status of a person and the functional status of different organs and organ systems through the electrophotonic emissions of fingertips placed on the surface of an impulse analyzer. This paper first introduces biometrics and its different types and then specifically focuses on medical biometrics and the potential applications of GDV in medical biometrics. We also present our previous experience with GDV in the research regarding autism and the potential use of GDV in combination with computer science for the potential development of biological pattern/biomarker for different kinds of health abnormalities including cancer and mental diseases.
APA, Harvard, Vancouver, ISO, and other styles
41

Költzsch, Gregor. "BIOMETRICS - MARKET SEGMENTS AND APPLICATIONS." Journal of Business Economics and Management 8, no. 2 (June 30, 2007): 119–22. http://dx.doi.org/10.3846/16111699.2007.9636159.

Full text
Abstract:
Biometric methods are concerned with the measurement and evaluation of human physiological or behavioral characteristics. During the last years, the economic relevance of the biometric industry and market has increased rapidly. Although public security projects have initiated the positive market development, future growth will be also generated by private sector demand such as secure and convenient banking, payment applications etc. The deployment of biometrics to machine readable travel documents such as passports provides citizens with first experiences in biometric applications, thereby functioning as pioneer projects and market openers for other market segments. For example, biometric passports will redefine the border control process in the future, and in the midterm, aviation security is another market segment that will contribute to the growth. To prepare for this business, the industry must carefully analyze the market and meet the demand. This article assesses the economic relevance of biometrics and discusses selected market segments.
APA, Harvard, Vancouver, ISO, and other styles
42

Singh, Law Kumar, Munish Khanna, Shankar Thawkar, and Jagadeesh Gopal. "Robustness for Authentication of the Human Using Face, Ear, and Gait Multimodal Biometric System." International Journal of Information System Modeling and Design 12, no. 1 (January 2021): 39–72. http://dx.doi.org/10.4018/ijismd.2021010103.

Full text
Abstract:
Biometrics is the science that deals with personal human physiological and behavioral characteristics such as fingerprints, handprints, iris, voice, face recognition, signature recognition, ear recognition, and gait recognition. Recognition using a single trait has several problems and multimodal biometrics system is one of the solutions. In this work, the novel and imperative biometric feature gait is fused with face and ear biometric features for authentication and to overcome problems of the unimodal biometric recognition system. The authors have also applied various normalization methods to sort out the best solution for such a challenge. The feature fusion of the proposed multimodal biometric system has been tested using Min-Max and Z-score techniques. The computed results demonstrate that Z-Score outperforms the Min-Max technique. It is deduced that the Z-score is a promising method that generates a high recognition rate of 95% and a false acceptance rate of 10%.
APA, Harvard, Vancouver, ISO, and other styles
43

Oh, Junhyoung, Ukjin Lee, and Kyungho Lee. "Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model." Security and Communication Networks 2019 (March 27, 2019): 1–14. http://dx.doi.org/10.1155/2019/8715264.

Full text
Abstract:
Biometric devices play an integral role in consumer’s daily life, providing a seamless environment. However, it is essential to measure the usability of biometrics, owing to the elements of biometrics satisfying both usability and security. This study redefines the elements of biometrics pertaining to usability determined in previous studies and adds elements of psychological relevance, such as privacy concerns. To organize the interrelated usability structure systemically, this paper applies the DEcision MAking Trial and Evaluation Laboratory (DEMATEL) to derive the usability structure. Thereupon, the established structure is applied in the clustered weighted Analytical Network Processes (ANP) to generate the proposed usability evaluation model. By these methods, the pertinent relationships between the factors are clarified and the weight of each element is determined. In the empirical study, 106 students measured usability of the fingerprint recognition system, iris recognition system, and facial recognition system employing our usability evaluation model. The results of this model generate the quantitative score of usability for biometric systems and suggest strategies to increase the score. The proposed usability evaluation model can comprehensively assist usability practitioners to evaluate biometric systems.
APA, Harvard, Vancouver, ISO, and other styles
44

Rai, Ankush, and Jagadeesh Kannan R. "SURVEY OF SOFT BIOMETRIC TECHNIQUES FOR GENDER IDENTIFICATION." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 296. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19741.

Full text
Abstract:
Biometrics checks can be productively utilized for localization of intrusion in access control systems by utilizing soft computing frameworks.Biometrics procedures can be to a great extent separated into conventional and soft biometrics. The study presents a survey of the available softtechniques and comparison for gender identification from biometric techniques.
APA, Harvard, Vancouver, ISO, and other styles
45

Musambo, Lubasi Kakwete, and Jackson Phiri. "A Framework for Civil Registration in Developing Countries Based on Biometrics and ISO Standards." International Journal of ICT Research in Africa and the Middle East 8, no. 2 (July 2019): 32–74. http://dx.doi.org/10.4018/ijictrame.2019070103.

Full text
Abstract:
Most developing countries in Africa have civil registration processes with inherent challenges that inhibit their efficiency and accuracy. Attempts at modernization and improvement are on-going. In this article, a biometric framework that can be used to mitigate the challenges inherent in biometric data management for the civil registration system in Zambia is presented. The proposed framework presented is based on ISO models and adapted for most developing countries with low Information and Communication Technologies. A baseline study was undertaken to assess the understanding and appreciation of biometrics within the Zambian community and how this data might be stored or managed. A study of the Zambian civil registration business process has been undertaken and the authors propose an automated civil registration business process. Results obtained show that currently, Zambia does NOT have a biometric framework that supervises use of biometric data. The proposed model once adopted would form a secure framework for civil registration based on biometrics and ISO standards.
APA, Harvard, Vancouver, ISO, and other styles
46

Karthi, G., and M. Ezhilarasan. "Multi biometric Template Protection using Hybrid Technique." International Journal of Engineering & Technology 7, no. 4 (September 24, 2018): 2609. http://dx.doi.org/10.14419/ijet.v7i4.11485.

Full text
Abstract:
Recently, multi-biometrics system has been the important identification system for providing authentication mechanism. In this pa-per, the multi-biometric recognition system uses multiple traits (face, iris and fingerprint) for authentication. The features are extracted from the traits and feature level fusion technique is applied to the individual features traits to form a fused feature. Protection of these biometrics features against various attacks points is an important concern for authentication process. One such attack is the modification of stored template, which largely affects the performance of biometric recognition system. This paper addresses this concern, by apply-ing template protection algorithm to the biometric features. An improved hybrid template protection algorithm is proposed to protect the biometric template.The experimental results show that the proposed algorithm works better than the existing algorithms available. The proposed algorithm provides better protection to the template. Further, attacks are performed on the proposed system which provide strong resistant against the attacks.
APA, Harvard, Vancouver, ISO, and other styles
47

Kim, Min-Gu, Hae-Min Moon, Yongwha Chung, and Sung Bum Pan. "A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System." Journal of Biomedicine and Biotechnology 2012 (2012): 1–7. http://dx.doi.org/10.1155/2012/614146.

Full text
Abstract:
Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.
APA, Harvard, Vancouver, ISO, and other styles
48

Karmakar, Dhiman, Madhura Datta, and C. A. Murthy. "Intra-Class Threshold Generation in Multimodal Biometric Systems by Set Estimation Technique." International Journal of Software Science and Computational Intelligence 5, no. 3 (July 2013): 22–32. http://dx.doi.org/10.4018/ijssci.2013070102.

Full text
Abstract:
Biometric recognition techniques attracted the researchers for the last two decades due to their many applications in the field of security. In recent times multimodal biometrics have been found to perform better, in several aspects, over unimodal biometrics. The classical approach for recognition is based on dissimilarity measure and for the sake of proper classification one needs to put a threshold on the dissimilarity value. In this paper an intra-class threshold for multimodal biometric recognition procedure has been developed. The authors' selection method of threshold is based on statistical set estimation technique which is applied on a minimal spanning tree and consisting of fused face and iris images. The fusion is performed here on feature level using face and iris biometrics. The proposed method, applied on several multimodal datasets, found to perform better than traditional ROC curve based threshold technique.
APA, Harvard, Vancouver, ISO, and other styles
49

Rassolov, I. M., S. G. Chubukova, and I. V. Mikurova. "Biometrics in the Context of Personal Data and Genetic Information: Legal Issues." Lex Russica, no. 1 (January 1, 2019): 108–18. http://dx.doi.org/10.17803/1729-5920.2019.146.1.108-118.

Full text
Abstract:
In modern society, methods of identification of persons on the basis of their physical, biological or behavioral characteristics are actively developing. European countries are in the process of developing a holistic doctrine on biometric control and are clarifying their position on situations where biometric data are used by individuals.From the position of information law, the paper presents a new author’s approach to the problem of processing biometric data and genetic information. The division of biometrics into “trace” and “non-trace” is losing its meaning. A new classification of biometrics into digital and analog is proposed.Biometric access control should not become a routine phenomenon in the framework of the organization of the company and without any reason to replace other existing types of control. The interested person can be entrusted with the storage of their own biometric data to reduce the risks of leakage and the consequences of exposure to them. Biometric data must be stored on the company’s servers in encrypted form, which makes it impossible to use them without the consent of the person concerned.Biometric data should be protected by a special legal regime. The analysis of the European and Russian legislation made it possible to draw the following conclusions: biometric data is a special type of personal data, a special legal regime and regulation should be established; digital biometrics needs special legal regulation, since it is the most vulnerable type; genetic information does not fully correspond to the concept of personal data, as it can relate to an unlimited number of persons. This determines the need to develop a special law “on genetic information”.
APA, Harvard, Vancouver, ISO, and other styles
50

Herbadji, Abderrahmane, Noubeil Guermat, Lahcene Ziet, Zahid Akhtar, Mohamed Cheniti, and Djamel Herbadji. "Contactless Multi-biometric System Using Fingerprint and Palmprint Selfies." Traitement du Signal 37, no. 6 (December 31, 2020): 889–97. http://dx.doi.org/10.18280/ts.370602.

Full text
Abstract:
Due to the COVID-19 pandemic, automated contactless person identification based on the human hand has become very vital and an appealing biometric trait. Since, people are expected to cover their faces with masks, and advised avoiding touching surfaces. It is well-known that usually contact-based hand biometrics suffer from issues like deformation due to uneven distribution of pressure or improper placement on sensor, and hygienic concerns. Whereas, to mitigate such problems, contactless imaging is expected to collect the hand biometrics information without any deformation and leading to higher person recognition accuracy; besides maintaining hygienic and pandemic concerns. Towards this aim, in this paper, an effective multi-biometric scheme for person authentication based on contactless fingerprint and palmprint selfies has been proposed. In this study, for simplicity and efficiency, three local descriptors, i.e., local phase quantization (LPQ), local Ternary patterns (LTP), and binarized statistical image features (BSIF), have been employed to extract salient features from contactless fingerprint and palmprint selfies. The score level fusion based multi-biometric system developed in this work combines the matching scores using two different fusion techniques, i.e., transformation based-rules like triangular norms and classifier based-rules like SVM. Experimental results on two publicly available databases (i.e., PolyU contactless to contact-based fingerprint database and IIT-Delhi touchless palmprint dataset) show that the proposed contactless multi-biometric selfie system can easily outperform uni-biometrics.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography