Academic literature on the topic 'Biometric access control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometric access control"

1

Mohamed, El Beqqal, Azizi Mostafa, and Louis Lanet Jean. "Multimodal access control system combining RFID, fingerprint and facial recognition." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 405–13. https://doi.org/10.11591/ijeecs.v20.i1.pp405-413.

Full text
Abstract:
Monomodal biometry does not constitute an effective measure to meet the desired performance requirements for large-scale applications, due to limitations such as noisy data, restricted degree of freedom and unacceptable error rates. Some of these problems can be solved through multimodal biometric systems that involve using a combination of two or more biometric modalities in a single identification system. Identification based on multiple biometrics represents an emerging trend. The reason for combining different modalities is to improve the recognition rate. In practice, multi-biometric aims to reduce the False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) which are two standard metrics widely used in the accuracy of biometric systems. In this paper, we will examine the different possible scenario in multimodal biometric systems using RFID, fingerprint and facial recognition, that can be adopted to merge information and improve the overall accuracy of the system.
APA, Harvard, Vancouver, ISO, and other styles
2

Ye, Shuiming, Ying Luo, Jian Zhao, and Sen-ChingS Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009, no. 1 (2009): 865259. http://dx.doi.org/10.1186/1687-417x-2009-865259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, Shuiming, Ying Luo, Jian Zhao, and Sen-Ching S. Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/865259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

El Beqqal, Mohamed, Mostafa Azizi, and Jean Louis Lanet. "Multimodal access control system combining RFID, fingerprint and facial recognition." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 405. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp405-413.

Full text
Abstract:
<span>Monomodal biometry does not constitute an effective measure to meet the desired performance requirements for large-scale applications, due to limita-tions such as noisy data, restricted degree of freedom and unacceptable error rates. Some of these problems can be solved through multimodal biometric systems that involve using a combination of two or more biometric modali-ties in a single identification system. Identification based on multiple biomet-rics represents an emerging trend. The reason for combining different modal-ities is to improve the recognition rate. In practice, multi-biometric aims to reduce the False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) which are two standard metrics widely used in the accuracy of biometric sys-tems. In this paper, we will examine the different possible scenario in multi-modal biometric systems using RFID, fingerprint and facial recognition, that can be adopted to merge information and improve the overall accuracy of the system.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

O. O, Rejuaro, Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A., and Adebajo O. O. "Development of an Improved Access Control System using an Enhanced Bimodal Crypto-Biometric System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 752–68. http://dx.doi.org/10.22214/ijraset.2023.49548.

Full text
Abstract:
Abstract: Recently, biometric was being integrated with cryptography (crypto-biometric system) to alleviate the limitations of the biometric or cryptography system. However, the main shortcoming of cryptography is poorly-chosen or forgotten password while challenges with biometrics include interclass similarities in the feature sets used to represent traits. In this work, a combination of cryptography and bimodal biometric was developed, an Advanced Encryption Standard based Fast Fourier Transform (AES-FFT) was developed and used as the cryptography technique. Hence, an attempt was made to develop an improved access control system using an enhanced bimodal bio-cryptography. Biometric features was extracted from individual face and iris after application of suitable preprocessing techniques for each modality using Principal Component Analysis (PCA) while cryptography key was generated using fused features from the face and iris by Advanced Encryption System based Fast Fourier Transform (AES-FFT). The two captured biometric data at acquisition module via webcam were subjected to appropriate pre-processing and feature extraction module. The features extracted were fused at feature level using weighted average and optimal features were selected using genetic programming (GP). The classification technique used was Support Vector Machine (SVM).
APA, Harvard, Vancouver, ISO, and other styles
6

Troshkov, A. A., S. V. Bogdanova, A. N. Ermakova, and V. E. Rachkov. "Designing a biometric access control concept." IOP Conference Series: Materials Science and Engineering 1069, no. 1 (2021): 012028. http://dx.doi.org/10.1088/1757-899x/1069/1/012028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Буяков, К. Е., Д. А. Елизаров, М. Я. Епифанцева, Т. А. Мызникова, and А. В. Шилер. "Development of biometric access control system." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 2 (June 21, 2022): 43–51. http://dx.doi.org/10.18137/rnu.v9187.22.02.p.043.

Full text
Abstract:
Рассмотрены особенности современной архитектуры систем контроля и управления доступом, лучшие практики и тренды в области обеспечения безопасности посредством системы контроля и управления доступом, а также их основные характеристики. Доказана актуальность разработки программно-аппаратного комплекса контроля доступа с использованием биометрической системы аутентификации, основанной на распознавании отпечатков пальцев. Разработанная система обеспечивает гибкую интеграцию с корпоративными сервисами организации. The article discusses the features of the modern architecture of access control systems, best practices and trends in the field of security, as well as the main characteristics. The relevance of the development of a software and hardware complex for access control using a biometric authentication system based on fingerprint recognition. The developed system provides flexible integration with corporate services of the organization.
APA, Harvard, Vancouver, ISO, and other styles
8

Iyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. http://dx.doi.org/10.59324/ejaset.2024.2(3).18.

Full text
Abstract:
Safeguarding digital and physical premises against unauthorized entry is increasingly crucial in an era characterized by fast technological advancements and escalating security risks. Biometric security devices for controlling entry employ distinct form and behavioral attributes to authenticate persons and regulate access, hence offering innovative solutions. This paper offers a comprehensive review of the utilization of fingerprint recognition methods in the creation of an entry authorization device with biometrics. The material and methods section provides a detailed description of the hardware components used, including the Arduino UNO and fingerprint scanner module (SM 630), as well as an in-depth explanation of the construction process and performance evaluation. The text provides detailed explanations of the registration and operating methods, specifically emphasizing the gathering of biometric information, generation of templates, user registration, and the decision-making processes for controlling entry. This paper advocates for the utilization of fingerprint authentication for access control technology as crucial tool for improving safety and mitigating risks in different operational environments. It recommends a systematic approach that involves preparation, construction, testing, deployment, and future planning.
APA, Harvard, Vancouver, ISO, and other styles
9

Iyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. https://doi.org/10.59324/ejaset.2024.2(3).18.

Full text
Abstract:
Safeguarding digital and physical premises against unauthorized entry is increasingly crucial in an era characterized by fast technological advancements and escalating security risks. Biometric security devices for controlling entry employ distinct form and behavioral attributes to authenticate persons and regulate access, hence offering innovative solutions. This paper offers a comprehensive review of the utilization of fingerprint recognition methods in the creation of an entry authorization device with biometrics. The material and methods section provides a detailed description of the hardware components used, including the Arduino UNO and fingerprint scanner module (SM 630), as well as an in-depth explanation of the construction process and performance evaluation. The text provides detailed explanations of the registration and operating methods, specifically emphasizing the gathering of biometric information, generation of templates, user registration, and the decision-making processes for controlling entry. This paper advocates for the utilization of fingerprint authentication for access control technology as crucial tool for improving safety and mitigating risks in different operational environments. It recommends a systematic approach that involves preparation, construction, testing, deployment, and future planning.
APA, Harvard, Vancouver, ISO, and other styles
10

Siddappa M, DR. "Paper Presentation: Protection on Exam Paper Leakage Using Biometric." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50395.

Full text
Abstract:
ABSTRACT Examination paper leakage poses a serious threat to the integrity and fairness of academic evaluations. This paper presents a secure and innovative solution to prevent exam paper leakage using biometric authentication technology. The proposed system ensures that only authorized personnel can access, handle, and distribute exam papers by integrating biometric verification methods such as fingerprint or iris recognition. By replacing traditional manual or password-based access systems, biometrics provide a higher level of security, minimizing the risks of unauthorized access or identity fraud. Additionally, the system can maintain detailed logs of access attempts, further enhancing transparency and traceability. This approach not only strengthens the confidentiality of examination processes but also builds trust in academic institutions by upholding the sanctity of examinations. The implementation of biometric-based security in exam paper handling marks a significant step forward in modernizing and safeguarding educational assessments. Keywords: Biometric authentication, exam paper security, fingerprint recognition, iris recognition, data protection, academic integrity, paper leakage prevention, secure examination system, access control, identity verification.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Biometric access control"

1

Fransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Full text
Abstract:
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began to search for biometric methods that are available today to find them that would be best suited together with a mobile phone. After we had read information about them we did choose three methods for further investigation. These methods were Fingerprint Recognition, Iris Scan and Speaker Verification. Iris Scan is the method that is best suited to solve the authentication problem. The reasons for this are many. One of them is the uniqueness and stability of the iris, not even identical twins or the pair of the same individual has the same iris minutiae. The iris is also very protected behind eyelids, cornea and the aqueous humor and therefore difficult to damage. When it comes to the method itself, is it one of the most secure methods available today. One of the reasons for this is that the equal error rate is better than one in a million. However, this rate can be even better. It all depends on the Hamming Distance, which is a value that show how different the saved and temporarily template are, and what it is set to. To solve our session authentication, which was to make sure that no one else could take over a connected mobile phone, a sensor plate is the answer. This sensor will be able to sense for touch, heat and pulse. These three sensor measurements will together secure a validated session since the mobile phone will disconnect if the sensor looses its sensor data. There are, however, technological and other challenges to be solved before our proposed solutions will become viable. We address some of these issues in our thesis.
APA, Harvard, Vancouver, ISO, and other styles
2

Sumner, Kristine. "AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2475.

Full text
Abstract:
The terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the aviation system and U.S national security (9/11 Commission, 2004). Each U.S. airport is individually responsible for various aspects of security including the control of physical access to sensitive and secure areas and facilities (9/11 Commission, 2004). Biometric technology has been examined as one method of enhancing airport access control to mitigate the possibility of criminal acts against airports. However, successful implementation of biometric technology depends largely on how individual security directors at each airport perceive, understand, and accept that technology. Backgrounds, attitudes, and personal characteristics influence individual decisions about technology implementation (Rogers, 1995; Tornatzky and Fleischer, 1990). This study examines the problem of airport access control, as well as, the current trends in biometric technology. Utilizing a survey of airport security directors and security managers, this study draws upon innovation diffusion theory and organizational theories to determine what personal, organizational, and technical variables contribute to the propensity of airport security directors and managers to adopt biometric technology for airport access control.<br>Ph.D.<br>Department of Criminal Justice and Legal Studies<br>Health and Public Affairs<br>Public Affairs PhD
APA, Harvard, Vancouver, ISO, and other styles
3

Luo, Ying. "Efficient Anonymous Biometric Matching in Privacy-Aware Environments." UKnowledge, 2014. http://uknowledge.uky.edu/ece_etds/46.

Full text
Abstract:
Video surveillance is an important tool used in security and environmental monitoring, however, the widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. To identify these individuals for protection, the most reliable approach is to use biometric signals as they are immutable and highly discriminative. If misused, these characteristics of biometrics can seriously defeat the goal of privacy protection. In this dissertation, an Anonymous Biometric Access Control (ABAC) procedure is proposed based on biometric signals for privacy-aware video surveillance. The ABAC procedure uses Secure Multi-party Computational (SMC) based protocols to verify membership of an incoming individual without knowing his/her true identity. To make SMC-based protocols scalable to large biometric databases, I introduce the k-Anonymous Quantization (kAQ) framework to provide an effective and secure tradeoff of privacy and complexity. kAQ limits systems knowledge of the incoming individual to k maximally dissimilar candidates in the database, where k is a design parameter that controls the amount of complexity-privacy tradeoff. The relationship between biometric similarity and privacy is experimentally validated using a twin iris database. The effectiveness of the entire system is demonstrated based on a public iris biometric database. To provide the protected subjects with full access to their privacy information in video surveillance system, I develop a novel privacy information management system that allows subjects to access their information via the same biometric signals used for ABAC. The system is composed of two encrypted-domain protocols: the privacy information encryption protocol encrypts the original video records using the iris pattern acquired during ABAC procedure; the privacy information retrieval protocol allows the video records to be anonymously retrieved through a GC-based iris pattern matching process. Experimental results on a public iris biometric database demonstrate the validity of my framework.
APA, Harvard, Vancouver, ISO, and other styles
4

Norris-Jones, Lynne. "Demonstrate and document : the development of a best practice model for biometric access control management." Thesis, Cardiff Metropolitan University, 2011. http://hdl.handle.net/10369/6411.

Full text
Abstract:
This thesis investigates the social, legal and ethical perceptions of participants towards the implementation of biometric access control systems within a sample of United Kingdom work-based environments. It focuses on the application of fingerprint scanning and facial recognition systems, whilst alluding to the development of more advanced (bleeding edge) technologies in the future. The conceptual framework is based on a tripartite model in which Maslow's Hierarchy of Needs is applied to the workforce whilst the principles of Utilitarianism and the Psychological Contract are applied to both management strategies and workforce perceptions. A qualitative paradigm is used in which semi-structured interviews are conducted with management and workforce participants within a sample of United Kingdom-based organisations (represented by Case Studies A-D). Discourse from these interviews are analysed, leading to the development of a series of first-cut findings for suggested "Best Practice " in the social, legal and ethical management of biometric access control systems. This process is subsequently developed with a refined sample of respondents (Case Studies A and C) culminating in the presentation of a suggested "Best Practice Model" for application to all four case studies. The model is based upon elements of a pre-determined Code of Practice (ISO/IEC 27002lnformation Technology - Security techniques - Code of Practice for Information Security Management) towards fostering acceptance of biometric technology within the workplace, in answering the question: How should organisations using biometric access control systems address social, legal and ethical concerns in the management of specific working environments in the United Kingdom?
APA, Harvard, Vancouver, ISO, and other styles
5

Ribeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.

Full text
Abstract:
Em nossa vida diária, são utilizadas identidades digitais (IDDs) para acessar contas de e-mail, bancos e lojas virtuais, locais restritos, computadores compartilhados, e outros. Garantir que apenas usuários autorizados tenham o acesso permitido é um aspecto fundamental no desenvolvimento destas aplicações. Atualmente, os métodos de controle de acesso simples como senhas ou números de identificação pessoal não devem ser considerados suficientemente seguros, já que um impostor pode conseguir estas informações sem o conhecimento do usuário. Ainda, no caso de utilização de dispositivos físicos como cartões de identificação, estes podem ser roubados ou forjados. Para tornar estes sistemas mais confiáveis, técnicas de autenticação de identidades utilizando múltiplas verificações são propostas. A utilização de características biométricas surge como a alternativa mais confiável para tratar este problema, pois são, teoricamente, únicas para cada pessoa. Contudo, algumas características biométricas como a aparência facial podem variar com o tempo, implicando em um grande desafio para os sistemas de reconhecimento facial. Neste trabalho é combinado o acesso tradicional por senha com a análise da face para realizar a autenticação. Um método de aprendizagem supervisionada é apresentado e sua adaptação é baseada na melhora contínua dos modelos faciais, que são representados por misturas de gaussianas. Os resultados experimentais, obtidos sobre um conjunto de teste reduzido, são encorajadores, com 98% de identificação correta dos usuários e custo computacional relativamente baixo. Ainda, a comparação com um método apresentado na literatura indicou vantagens do método proposto quando usado como um pré-selecionador de faces.<br>In our daily life, we use digital identities (DIDs) to access e-mails, e-banks, e-shops, physical environments, shared computers, and so on. Guarantee that only authorized users are granted access is an important aspect in the development of such applications. Nowadays, the simple access control methods like passwords or personal identification numbers can not be considered secure enough, because an impostor can obtain and use these information without user knowledge. Also, physical devices like ID cards can be stolen. To make these systems more reliable, multimodal DID authentication techniques combining different verification steps are proposed. Biometric features appears as one of the most reliable alternatives to deal with this problem because, theoretically, they are unique for each person. Nevertheless, some biometric features like face appearances may change in time, posing a serious challenge for a face recognition system. In this thesis work, we use the traditional password access combined with human face analysis to perform the authentication task. An intuitive supervised appearance learning method is presented, and its adaptation is based on continuously improving face models represented using the Gaussian mixture modeling approach. The experimental results over a reduced test set show encouraging results, with 98% of the users correctly identified, with a relatively small computational effort. Still, the comparison with a method presented in the literature indicated advantages of the proposed method when used as a pre-selector of faces.
APA, Harvard, Vancouver, ISO, and other styles
6

McMillan, Stephen. "Design and analysis of a biometric access control system using an electronic olfactory device to identify human odour characteristics." Thesis, University of Greenwich, 2000. http://gala.gre.ac.uk/13136/.

Full text
Abstract:
The use of an electronic olfactory device, termed an electronic 'nose', was investigated for the detection of unique human odour characteristics. The detection of these unique odours was applied to the field of biometrics for access control, where a human's unique characteristics were used to authenticate a user of an access control system. An electronic odour sensing device was designed and constructed using an array of conducting polymer gas sensors in order to facilitate the regular screening of a group of human subjects over a period of six weeks. A static sampling method was used to measure odour levels from human hands, which were found to contain a reliable source of human odour. Human odour levels were low so dynamic sampling proved to be unsuitable for this application due to the dilution of the odour mixture. Feature analysis results revealed that the features of adsorption and desorption gradient contained discriminatory information in addition to the commonly used maximum divergence. Pattern recognition revealed that neural network architectures produced superior results when compared to statistical methods as a result of their ability to model the non-linearities in the data set. The highest recognition rate was 73% which was produced using a Multi-Layer Perceptron (MLP) neural network compared to 63% obtained using the best statistical method of Parzen windows. The majority of the recognition error was caused by a minority of the humans. Analysis of sensor data revealed that only 30% of the sensor array were contributing discriminatory information so it was deduced that performance would undoubtedly improve if a full array of effective sensors were available. Exploratory data analysis revealed that human odour changed from day to day and often an increasing divergence with time was observed. A time-adaptive method was devised which increased the recognition to 89%, but was still too low for use as a biometric recognition device. However, use as a verification device demonstrated acceptable levels of performance but resulted in high levels of user frustration caused by a high proportion of users being falsely rejected. This work demonstrated that an olfactory based biometric access control system could be a realistic proposition but requires further work, especially in the areas of sensor development and unique human odour research, before an operational system could be produced.
APA, Harvard, Vancouver, ISO, and other styles
7

Fiorese, Mauricio. "Uma Proposta de autenticação de usuários para ensino a distância." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2000. http://hdl.handle.net/10183/80127.

Full text
Abstract:
Este trabalho investiga diferentes estratégias e técnicas de autenticação de usuários visando determinar quais podem ser integradas em um ambiente de educação a distância. Diversas soluções de autenticação existentes no mercado foram analisadas para se determinar as mais adequadas. Buscou-se as soluções consideradas factíveis de utilização, seja pelo custo ou quantidade de equipamentos extras envolvidos, seja pela simplicidade operacional ou pelo grau de certeza das medidas efetuadas. A partir desta análise foi delineado um modelo de autenticação que integra várias técnicas de autenticação a fim de chegar a um nível de segurança maior que senhas, utilizadas na maioria dos sistemas de educação a distância. 0 sistema funciona como um proxy, cuja função é controlar o acesso a páginas Web através da combinação de senhas, perguntas randômicas, dispositivos biométricos e checagem randômica, ao mesmo tempo que gera logs da atividade do aluno no curso. Estes logs conterão informações como dia e hora do acesso, tempo dispendido em cada página, endereço IP da máquina do aluno, entre outras. Estas informações podem ser utilizadas tanto para avaliar o aluno, como para gerar seu perfil estatístico, que servirá para gerar alertas na medida em que os dados do perfil sofrerem mudanças acima dos limites estabelecidos, durante a atividade do aluno. Um protótipo do sistema foi implementado para validar a solução delineada ao longo do trabalho. A integração dos métodos de autenticação, que identificam o aluno e a máquina em que ele está trabalhando, com as rotinas de avaliação do procedimento de educação a distância, foi um dos principais resultados alcançados.<br>This work investigates different strategies and techniques of user authentication in order to determine which ones may be integrated in a distance learning environment. Several authentication solutions available on the market are analyzed in order to find the most appropriate. The criteria used to determine the best solutions involve cost or amount of equipments involved, operational simplicity, and degree of confidence or results obtained. Based on this analysis, an authentication model that integrates several authentication techniques is delineated in order to obtain greater security than those used in most distance learning systems, based only on passwords. This system works like a proxy whose function is to control access to Web pages through the combination of passwords, random queries, biometric devices and random checks, at the same time that it generates logs of student's activity during a course. These logs contain information about day and hour of access, time spent on each page, IP address of the student's machine and so on. This information can be used both to evaluate the student and to generate his/her statistical profile. This profile is used to give an alarm when the data of the profile undergo changes above the established limits, during the student's activity. A prototype of the system has been implemented to validate the solution designed. The integration of the authentication methods, which identifies both the student and the machine where he/she is working, with the evaluation routines of the distance learning procedure, is one of the main reached results.
APA, Harvard, Vancouver, ISO, and other styles
8

Brenner, Gabriel Pitágoras Silva e. "Integração de recursos das identificações por radiofrequência e biometria da impressão digital em aplicação direcionada para o controle de acesso de pessoas a áreas industriais." Universidade de Taubaté, 2012. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=575.

Full text
Abstract:
No presente trabalho são abordados estudos sobre elementos do projeto conceitual de um sistema de controle de acessos de pessoas a áreas industriais, voltado para o propósito de oferecer contribuição para o segmento particular daqueles tipos que exigem a utilização de automatização para atender a respectiva viabilização operacional relativa às atividades pertinentes ao controle de acessos em questão. Os testes práticos realizados com protótipos apresentaram resultados satisfatórios, validando os princípios de funcionamento dos elementos envolvidos, haja vista que foram verificadas as realizações das operações previstas pelo sistema que possui as características de: identificação por radiofrequência fundamentada em tecnologia voltada para aplicações de identificação à curta distância com leitor fixo e transponder read-only, identificação por biometria da impressão digital fundamentada em tecnologia de captura de imagem com utilização de leitura óptica; utilização de equipamentos para controle físico do acesso de pessoas, cujas previsões de instalação permitam atender fluxos nos sentidos unidirecional e bidirecional com relação a área controlada; aplicação de recursos disponíveis por Web Services para atendimento das necessidades afins exigidas para o desenvolvimento do sistema; segurança no transporte de dados fundamentada na utilização do protocolo SSL; estações de trabalho e servidores constituídos por computadores pessoais com arquitetura Intel ou compatível; utilização de elementos de integração de sistemas direcionados para a abrangência de sistemas computacionais empresariais empregados em indústrias. O objetivo proposto foi atingido, sendo que os testes práticos validaram os princípios de funcionamento dos elementos abordados, oferecendo contribuição para o mencionado segmento de sistemas de controle de acessos de pessoas.<br>The present work discusses studies about conceptual design elements to personal access control system to industrial areas. It aims at offering a contribution to enhance people control to areas with the use of automation resources. Practical template tests undertaken presented satisfactory results, thus validating their working principles and technological achievements of the operations previews of the system characteristics: radiofrequency identification based on the technology of short distance identification with fixed reader and `read-only transponder; biometric identification based on image capture using optical reading; equipment for controlling personal physical access , whose installation would permit unidirectional and bidirectional flows to the controlled area; use of resources available by Web Services to meet the needs to system development; data transport safety based on SSL protocol; work station and servers of the Intel type personal computers, or compatible; systems integration with corporate computer systems. The proposed goal has been achieved, and the practical tests confirmed the operational principles of the elements in question, offering contributions to the automated control systems of personal access in industrial areas.
APA, Harvard, Vancouver, ISO, and other styles
9

Lewit, Rozenfeld Rodrigo David. "Plan de Negocios: Control de Acceso Mediante Biometría de Rostro." Tesis, Universidad de Chile, 2010. http://repositorio.uchile.cl/handle/2250/103951.

Full text
Abstract:
El presente trabajo de título tiene como objetivo el desarrollo de un plan de negocios para MatchFace, empresa integradora de tecnología que comercializaría, en Chile, equipos de control de acceso a zonas y servicios restringidos, mediante biometría de rostro. La justificación del proyecto se basa en la detección de una necesidad insatisfecha: controlar el acceso de altos tráficos de individuos. Habiéndose aplicado una metodología acorde al desarrollo de un plan de negocios, los primeros capítulos corresponden al análisis externo de la industria e interno de la empresa. A continuación se realizó una investigación de mercado, con la cual se logró caracterizar y dimensionar el mercado meta. Luego se llevaron a cabo los planes de marketing, de recursos humanos, de operaciones, y finalmente, el financiero, del cual se obtuvieron los principales indicadores para evaluar el proyecto. Como resultado del trabajo se obtuvo, con respecto al análisis estratégico, un atractivo de carácter medio-alto de la industria, siendo el factor clave de éxito el desarrollo de un producto que dé solución a la necesidad de controlar el acceso de altos tráficos de individuos. Del plan de marketing se determinó, mediante una estrategia genérica de enfoque, que se comercializarían tres equipos de control de acceso a casinos de almuerzo, uno para cada segmento del mercado meta. Éste, dimensionado en 3.840 casinos, equivalente a 0.4% del mercado total, estará subdividido en los siguientes segmentos: grandes empresas mineras; restantes grandes empresas; y clínicas y hospitales. Con precios de USD$9.000, USD$4.000 y USD$6.000 respectivamente, los márgenes sobre costos de producción serían de 96, 75 y 91% respectivamente, implicando en un ahorro para el cliente del 30% del total facturado por concepto de almuerzos. La promoción se haría acorde al target del negocio, utilizándose por ende herramientas de marketing B2B. La plaza se caracterizará por trabajar únicamente con personal propio durante los primeros 2 años de ejercicio, siendo las ventas llevadas a cabo por ingenieros que se focalizarán en uno de los tres segmentos del mercado meta. A partir del tercer año se utilizarán además concesionarios en el canal de ventas. En el plan de recursos humanos se determinó que la estructura organizacional se adaptará a los requerimientos iniciales y futuros de MatchFace: 5 altos ejecutivos y 6 funcionarios de plana menor. Estos últimos se irán adecuando a los resultados operacionales, estimándose una plana no ejecutiva de 20 funcionarios para el quinto año de ejercicio. En cuanto al plan de operaciones, se logró definir y esquematizar aquellos procesos productivos, de ventas, y administrativos del negocio. En cuanto al plan financiero, se lograron definir aquellos indicadores de rentabilidad del negocio. Se obtuvo para el proyecto puro un VAN de $111 millones descontados al 15,3%, y una TIR del 36%, para un horizonte de evaluación de 5 años. Manteniendo las mismas condiciones, pero considerando una estructura de financiamiento acorde a los requerimientos de ATCOM, empresa cliente, se obtuvo un VAN de $111,2 millones, con una nueva TIR del 46%. Al sensibilizar el proyecto, se determinó que el punto de equilibrio que tornaría el VAN igual a cero, se lograría mediante la venta de 209 equipos para el 1er año, equivalentes al 83% de la demanda proyectada para dicho periodo. Las otras variables sensibilizadas fueron el tipo de cambio ($/USD), y la tasa anual de crecimiento de las ventas. Finalmente, y luego de haber cumplido con todos los objetivos planteados al inicio del trabajo de título, se aconseja la realización de MatchFace. Ésta, además de generar valor a los inversionistas, consistiría en el primer eslabón de una empresa de mayor tamaño. Se recomienda, por lo tanto, analizar la expansión hacia nuevos segmentos, abarcando negocios tales como el de control de acceso a servicios que vayan más allá del de casinos de almuerzo, además de una expansión hacia nuevos mercados, tales como el de países vecinos.
APA, Harvard, Vancouver, ISO, and other styles
10

Foltýn, Petr. "Návrh a realizace jednotek modulárního přístupového systému." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-229208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Biometric access control"

1

L, Wilson C. Simple test procedure for image-based biometric verification systems. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frost & Sullivan., ed. U.S. electronic access control system markets: High security requirements promote biometric identification. Frost & Sullivan, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Erdenreich, Sebastian. Negative Indentifizierung anhand des Tippverhaltens bei Verwendung fester und freier Textbestandteile. Springer Vieweg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

D, Woodward John. Biometrics. McGraw-Hill/Osborne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

D, Woodward John. Biometrics: Facing up to terrorism. RAND, Arroyo Center, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

D, Woodward John. Biometrics: Facing up to terrorism. RAND, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

David, Hutchison. Advances in Biometrics: Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings. Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mosk, Carl. Making health work: Human growth in modern Japan. University of California Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kelly, Daniel. Investigation into Biometric Access Control Systems and their use within the Construction Industry. Lulu Press, Inc., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hand-Based Biometrics: Methods and technology. The Institution of Engineering and Technology, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Biometric access control"

1

Boonkrong, Sirapat. "Biometric Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gao, Wen, and Shiguang Shan. "Face Verification for Access Control." In Biometric Solutions. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Shang-Hung, and S. Y. Kung. "Biometric Identification for Access Control." In Intelligent Methods in Signal Processing and Communications. Birkhäuser Boston, 1997. http://dx.doi.org/10.1007/978-1-4612-2018-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

García, Begoña, Amaia Méndez, Ibon Ruiz, and Javier Vicente. "Biometric Access Control System for AAL." In Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02481-8_123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhong, Shenghong, Xiaopeng Chen, Dejian Li, Wenxiong Kang, and Feiqi Deng. "An Intelligent Access Control System Based on Multi-biometrics of Finger." In Biometric Recognition. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12484-1_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pang, Ying Han, Ean Yee Khor, and Shih Yin Ooi. "Biometric Access Control with High Dimensional Facial Features." In Information Security and Privacy. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40367-0_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krishna Khanth, N., Sharad Jain, and Suman Madan. "Sentinel: An Enhanced Multimodal Biometric Access Control System." In Big Data Analytics in Astronomy, Science, and Engineering. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28350-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beattie, Michael, B. V. K. Vijaya Kumar, Simon Lucey, and Ozan K. Tonguz. "Automatic Configuration for a Biometrics-Based Physical Access Control System." In Advances in Biometric Person Authentication. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569947_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rodrigues, Ricardo N., Glauco F. G. Yared, Carlos R. do N. Costa, João B. T. Yabu-Uti, Fábio Violaro, and Lee Luan Ling. "Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics." In Advances in Biometrics. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11608288_85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aathilakshmi, S., A. Prasanth, K. K. Devi Sowndarya, and Pham Chien Thang. "Access Control Using AI Based Biometric Systems: Case Study." In AI Based Advancements in Biometrics and its Applications. CRC Press, 2024. http://dx.doi.org/10.1201/9781032702377-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometric access control"

1

R., Anusha, Shankari N., Sukhesh Kumar Kotemane, Surabhi S. Shetty, Srijan S. Uppoor, and Yashwin K. Shetty. "An IoT Based Access Control System Using R307 Optical Biometric Sensor." In 2025 International Conference on Machine Learning and Autonomous Systems (ICMLAS). IEEE, 2025. https://doi.org/10.1109/icmlas64557.2025.10968171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ravindran, Rahulkrishnan, Sabarinath Udayakumar, Yellanki Revanth, and Kalakunnath Namitha. "Enhancing Access Control: A Biometric Approach with Facial Recognition and Near-Field Communication Integration." In 2024 Second International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2024. http://dx.doi.org/10.1109/icici62254.2024.00051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baek, Young-Hyun, Jun Myung Lee, and Chang Hu Kim. "Development of a System for Measuring the Security Performance of Spoof Fingerprint Detection in Access Control Devices with Embedded Biometric Fingerprint Recognition." In 2025 International Conference on Electronics, Information, and Communication (ICEIC). IEEE, 2025. https://doi.org/10.1109/iceic64972.2025.10879705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spanovic, Milana M., Aleksej N. Makarov, and Vojislav Z. Lukic. "System for biometric access control." In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Althobaiti, Ohood, Mznah Al-Rodhaan, and Abdullah Al-Dhelaan. "Biometric access control for wireless nodes." In 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN). IEEE, 2012. http://dx.doi.org/10.1109/cason.2012.6412397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zeng, FuFu, Kuo-Kun Tseng, Ming Zhao, et al. "Biometric Electrocardiogram Card for Access Control System." In 2011 Fifth International Conference on Genetic and Evolutionary Computing (ICGEC). IEEE, 2011. http://dx.doi.org/10.1109/icgec.2011.92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Plotnikov, A., and Aleksandr Starikov. "CONTROL AND ACCESS MANAGEMENT SYSTEM USING BIOMETRIC PERSONAL CHARACTERISTICS." In MODERN ISSUES OF AUTOMATION, ROBOTICS AND MANAGEMENT IN TECHNICAL, ORGANIZATIONAL, ECONOMIC SYSTEMS. FSBE Institution of Higher Education Voronezh State University of Forestry and Technologies named after G.F. Morozov, 2024. http://dx.doi.org/10.58168/robotics2024_77-86.

Full text
Abstract:
The article discusses the basic concepts and capabilities of the access control and management system, the features of automating the process of personal identification using biometric characteristics.
APA, Harvard, Vancouver, ISO, and other styles
8

Daniel, David Marius, and Borda Monica. "Multimodal access control systems which combines classical access control methods with biometric methods." In 2010 9th International Symposium on Electronics and Telecommunications (ISETC 2010). IEEE, 2010. http://dx.doi.org/10.1109/isetc.2010.5679320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Kanv, Kishan Kumar, Shyam Nandan, Ashutosh Mishra, and V. K. Mittal. "Biometric access for a secure smart robot." In 2015 International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2015. http://dx.doi.org/10.1109/ispcc.2015.7374996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nick, William, Joseph Shelton, Cory Sabol, and Albert Esterline. "Federated protocol for biometric authentication and access control." In 2017 Computing Conference. IEEE, 2017. http://dx.doi.org/10.1109/sai.2017.8252195.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Biometric access control"

1

Treado, Stephen J., Steven C. Cook, and Michael Galler. Distributed biometric access control testbed. National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Koskelo, Markku, Steven Kadner, and Steven Horowitz. Biometric Access Control System Industrialization. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1763279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Тарасова, Олена Юріївна, and Ірина Сергіївна Мінтій. Web application for facial wrinkle recognition. Кривий Ріг, КДПУ, 2022. http://dx.doi.org/10.31812/123456789/7012.

Full text
Abstract:
Facial recognition technology is named one of the main trends of recent years. It’s wide range of applications, such as access control, biometrics, video surveillance and many other interactive humanmachine systems. Facial landmarks can be described as key characteristics of the human face. Commonly found landmarks are, for example, eyes, nose or mouth corners. Analyzing these key points is useful for a variety of computer vision use cases, including biometrics, face tracking, or emotion detection. Different methods produce different facial landmarks. Some methods use only basic facial landmarks, while others bring out more detail. We use 68 facial markup, which is a common format for many datasets. Cloud computing creates all the necessary conditions for the successful implementation of even the most complex tasks. We created a web application using the Django framework, Python language, OpenCv and Dlib libraries to recognize faces in the image. The purpose of our work is to create a software system for face recognition in the photo and identify wrinkles on the face. The algorithm for determining the presence and location of various types of wrinkles and determining their geometric determination on the face is programmed.
APA, Harvard, Vancouver, ISO, and other styles
4

New Access Control Technologies: Biometric Identification. Purdue University, 2007. http://dx.doi.org/10.5703/1288284315895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!