To see the other types of publications on this topic, follow the link: Biometric access control.

Journal articles on the topic 'Biometric access control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Biometric access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mohamed, El Beqqal, Azizi Mostafa, and Louis Lanet Jean. "Multimodal access control system combining RFID, fingerprint and facial recognition." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 405–13. https://doi.org/10.11591/ijeecs.v20.i1.pp405-413.

Full text
Abstract:
Monomodal biometry does not constitute an effective measure to meet the desired performance requirements for large-scale applications, due to limitations such as noisy data, restricted degree of freedom and unacceptable error rates. Some of these problems can be solved through multimodal biometric systems that involve using a combination of two or more biometric modalities in a single identification system. Identification based on multiple biometrics represents an emerging trend. The reason for combining different modalities is to improve the recognition rate. In practice, multi-biometric aims to reduce the False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) which are two standard metrics widely used in the accuracy of biometric systems. In this paper, we will examine the different possible scenario in multimodal biometric systems using RFID, fingerprint and facial recognition, that can be adopted to merge information and improve the overall accuracy of the system.
APA, Harvard, Vancouver, ISO, and other styles
2

Ye, Shuiming, Ying Luo, Jian Zhao, and Sen-ChingS Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009, no. 1 (2009): 865259. http://dx.doi.org/10.1186/1687-417x-2009-865259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, Shuiming, Ying Luo, Jian Zhao, and Sen-Ching S. Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/865259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

El Beqqal, Mohamed, Mostafa Azizi, and Jean Louis Lanet. "Multimodal access control system combining RFID, fingerprint and facial recognition." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 405. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp405-413.

Full text
Abstract:
<span>Monomodal biometry does not constitute an effective measure to meet the desired performance requirements for large-scale applications, due to limita-tions such as noisy data, restricted degree of freedom and unacceptable error rates. Some of these problems can be solved through multimodal biometric systems that involve using a combination of two or more biometric modali-ties in a single identification system. Identification based on multiple biomet-rics represents an emerging trend. The reason for combining different modal-ities is to improve the recognition rate. In practice, multi-biometric aims to reduce the False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) which are two standard metrics widely used in the accuracy of biometric sys-tems. In this paper, we will examine the different possible scenario in multi-modal biometric systems using RFID, fingerprint and facial recognition, that can be adopted to merge information and improve the overall accuracy of the system.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

Tsibong, Selvia Lem. "Biometric Identification System: A Step Towards Better Crime Control in Cameroon." Scholars International Journal of Law, Crime and Justice 8, no. 06 (2025): 116–28. https://doi.org/10.36348/sijlcj.2025.v08i06.001.

Full text
Abstract:
This study examines biometric identification system as a step towards better crime control in Cameroon, with particular interest to fingerprint biometrics, DNA identification, facial recognition as well as their respective data bases. Cameroon’s biometric identification system is a government initiative aimed at enhancing identity management, security, and access to services through the use of biometric technologies. Fingerprint biometrics, DNA identification and facial recognition technologies are used in Cameroon for crime control. Their respective databases are, however, not well developed but for AFIS (Automated Fingerprint Identification System), adopted by Cameroon government as a centralized biometric identification system for managing and authenticating identity documents. International governance on the use of biometrics for crime control has also provided Cameroon with a framework to incorporate the following in its biometric identification system: human right protection, standardization and best practices, accountability, and cross-border crime and cooperation. Legal and institutional frameworks exist that aid in biometric data collection and storage. While biometric identification systems have significant potential for crime control in Cameroon, their current effectiveness is moderate, hampered by infrastructural, legal, and operational challenges. Strengthening legal frameworks, improving infrastructure, ensuring ethical use, and fostering interagency collaboration are essential steps toward maximizing the benefits of biometric technologies in promoting security and justice.
APA, Harvard, Vancouver, ISO, and other styles
6

O. O, Rejuaro, Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A., and Adebajo O. O. "Development of an Improved Access Control System using an Enhanced Bimodal Crypto-Biometric System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 752–68. http://dx.doi.org/10.22214/ijraset.2023.49548.

Full text
Abstract:
Abstract: Recently, biometric was being integrated with cryptography (crypto-biometric system) to alleviate the limitations of the biometric or cryptography system. However, the main shortcoming of cryptography is poorly-chosen or forgotten password while challenges with biometrics include interclass similarities in the feature sets used to represent traits. In this work, a combination of cryptography and bimodal biometric was developed, an Advanced Encryption Standard based Fast Fourier Transform (AES-FFT) was developed and used as the cryptography technique. Hence, an attempt was made to develop an improved access control system using an enhanced bimodal bio-cryptography. Biometric features was extracted from individual face and iris after application of suitable preprocessing techniques for each modality using Principal Component Analysis (PCA) while cryptography key was generated using fused features from the face and iris by Advanced Encryption System based Fast Fourier Transform (AES-FFT). The two captured biometric data at acquisition module via webcam were subjected to appropriate pre-processing and feature extraction module. The features extracted were fused at feature level using weighted average and optimal features were selected using genetic programming (GP). The classification technique used was Support Vector Machine (SVM).
APA, Harvard, Vancouver, ISO, and other styles
7

Troshkov, A. A., S. V. Bogdanova, A. N. Ermakova, and V. E. Rachkov. "Designing a biometric access control concept." IOP Conference Series: Materials Science and Engineering 1069, no. 1 (2021): 012028. http://dx.doi.org/10.1088/1757-899x/1069/1/012028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Буяков, К. Е., Д. А. Елизаров, М. Я. Епифанцева, Т. А. Мызникова, and А. В. Шилер. "Development of biometric access control system." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 2 (June 21, 2022): 43–51. http://dx.doi.org/10.18137/rnu.v9187.22.02.p.043.

Full text
Abstract:
Рассмотрены особенности современной архитектуры систем контроля и управления доступом, лучшие практики и тренды в области обеспечения безопасности посредством системы контроля и управления доступом, а также их основные характеристики. Доказана актуальность разработки программно-аппаратного комплекса контроля доступа с использованием биометрической системы аутентификации, основанной на распознавании отпечатков пальцев. Разработанная система обеспечивает гибкую интеграцию с корпоративными сервисами организации. The article discusses the features of the modern architecture of access control systems, best practices and trends in the field of security, as well as the main characteristics. The relevance of the development of a software and hardware complex for access control using a biometric authentication system based on fingerprint recognition. The developed system provides flexible integration with corporate services of the organization.
APA, Harvard, Vancouver, ISO, and other styles
9

Iyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. http://dx.doi.org/10.59324/ejaset.2024.2(3).18.

Full text
Abstract:
Safeguarding digital and physical premises against unauthorized entry is increasingly crucial in an era characterized by fast technological advancements and escalating security risks. Biometric security devices for controlling entry employ distinct form and behavioral attributes to authenticate persons and regulate access, hence offering innovative solutions. This paper offers a comprehensive review of the utilization of fingerprint recognition methods in the creation of an entry authorization device with biometrics. The material and methods section provides a detailed description of the hardware components used, including the Arduino UNO and fingerprint scanner module (SM 630), as well as an in-depth explanation of the construction process and performance evaluation. The text provides detailed explanations of the registration and operating methods, specifically emphasizing the gathering of biometric information, generation of templates, user registration, and the decision-making processes for controlling entry. This paper advocates for the utilization of fingerprint authentication for access control technology as crucial tool for improving safety and mitigating risks in different operational environments. It recommends a systematic approach that involves preparation, construction, testing, deployment, and future planning.
APA, Harvard, Vancouver, ISO, and other styles
10

Iyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. https://doi.org/10.59324/ejaset.2024.2(3).18.

Full text
Abstract:
Safeguarding digital and physical premises against unauthorized entry is increasingly crucial in an era characterized by fast technological advancements and escalating security risks. Biometric security devices for controlling entry employ distinct form and behavioral attributes to authenticate persons and regulate access, hence offering innovative solutions. This paper offers a comprehensive review of the utilization of fingerprint recognition methods in the creation of an entry authorization device with biometrics. The material and methods section provides a detailed description of the hardware components used, including the Arduino UNO and fingerprint scanner module (SM 630), as well as an in-depth explanation of the construction process and performance evaluation. The text provides detailed explanations of the registration and operating methods, specifically emphasizing the gathering of biometric information, generation of templates, user registration, and the decision-making processes for controlling entry. This paper advocates for the utilization of fingerprint authentication for access control technology as crucial tool for improving safety and mitigating risks in different operational environments. It recommends a systematic approach that involves preparation, construction, testing, deployment, and future planning.
APA, Harvard, Vancouver, ISO, and other styles
11

Siddappa M, DR. "Paper Presentation: Protection on Exam Paper Leakage Using Biometric." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50395.

Full text
Abstract:
ABSTRACT Examination paper leakage poses a serious threat to the integrity and fairness of academic evaluations. This paper presents a secure and innovative solution to prevent exam paper leakage using biometric authentication technology. The proposed system ensures that only authorized personnel can access, handle, and distribute exam papers by integrating biometric verification methods such as fingerprint or iris recognition. By replacing traditional manual or password-based access systems, biometrics provide a higher level of security, minimizing the risks of unauthorized access or identity fraud. Additionally, the system can maintain detailed logs of access attempts, further enhancing transparency and traceability. This approach not only strengthens the confidentiality of examination processes but also builds trust in academic institutions by upholding the sanctity of examinations. The implementation of biometric-based security in exam paper handling marks a significant step forward in modernizing and safeguarding educational assessments. Keywords: Biometric authentication, exam paper security, fingerprint recognition, iris recognition, data protection, academic integrity, paper leakage prevention, secure examination system, access control, identity verification.
APA, Harvard, Vancouver, ISO, and other styles
12

Szűcs, Kata Rebeka, Arnold Őszi, and Tibor Kovács. "Mobile Biometrics and their Risks." Hadmérnök 15, no. 4 (2020): 15–28. http://dx.doi.org/10.32567/hm.2020.4.2.

Full text
Abstract:
The present article aims to introduce the ways of secure access control, with a special emphasis on biometric solutions on mobile devices. Apart from secure biometric data storage, which is also a very important aspect of this topic, there are several other types of threats. On the following pages we provide a short description of the possible risks of biometric systems. In order to understand the current status and attitude towards biometrics, we introduce our own survey as well.
APA, Harvard, Vancouver, ISO, and other styles
13

Strelkovskaya, Irina, Oleksiy Onatskiy, and Larysa Yona. "TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS." Information and Telecommunication Sciences, no. 2 (December 21, 2023): 17–25. http://dx.doi.org/10.20535/2411-2976.22023.17-25.

Full text
Abstract:
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper proposes a cryptographic protocol of two-factor authentication with the zero-knowledge over the extended field GF(2m) on elliptic curves using biometric data and the private key of the user.
 Objective. The aim of the article is to develop a cryptographic protocol for zero-knowledge two-factor authentication based on elliptic curves using biometric data and the user’s private key, which allows increasing cryptographic strength and reducing the duration of the authentication process.
 Methods. The process of implementing zero-knowledge proof protocols is as follows: one user (proofer) can convince another user (verifier) that he has some secret without disclosing the secret itself.
 Results. A cryptographic protocol for two-factor authentication with zero-knowledge over the extended field GF(2m) of elliptic curves using user biometric data is proposed, which significantly reduces the size of the protocol parameters and increases cryptographic strength (computational complexity of the breaking). There is no leakage of private key information and biometric data of the user during the execution of the zero-knowledge proof protocol.
 Conclusions. The implementation of a cryptographic protocol with zero-knowledge proof two-factor authentication based on elliptic curves allows significantly reducing the size of protocol parameters and increasing the cryptographic strength (computational complexity of the breaking).
APA, Harvard, Vancouver, ISO, and other styles
14

Rai, Ankush, and Jagadeesh Kannan R. "SURVEY OF SOFT BIOMETRIC TECHNIQUES FOR GENDER IDENTIFICATION." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 296. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19741.

Full text
Abstract:
Biometrics checks can be productively utilized for localization of intrusion in access control systems by utilizing soft computing frameworks.Biometrics procedures can be to a great extent separated into conventional and soft biometrics. The study presents a survey of the available softtechniques and comparison for gender identification from biometric techniques.
APA, Harvard, Vancouver, ISO, and other styles
15

H, Dr Ravishankar, Vishal Yogish Rao, Nishant Rawat, and Sindhuja Chowdhary. "Biometric Access Control: Facial Recognition & QR Code Based Security System." International Journal of Research Publication and Reviews 6, no. 2 (2025): 3585–91. https://doi.org/10.55248/gengpi.6.0225.0959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Elmir, Youssef, Abdeldjalil Abdelaziz, and Mohammed Haidas. "Design and Implementation of Embedded Biometric-Based Access Control System with Electronic Lock using Raspberry Pi." Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 9, no. 2 (2023): 429–43. https://doi.org/10.26555/jiteki.v9i2.26162.

Full text
Abstract:
This paper presents the design and implementation of an improved access control system based on biometric recognition, utilising Raspberry Pi technology. The proposed system aims to enhance the security of the existing electronic lock-based system at the SGRE-Lab of University Tahri Mohammed of Bechar in Algeria. The proposed system employs multimodal biometrics, integrating facial recognition and speaker verification for personal identification. Following initial verification by the electronic lock, the system captures the user's face through a camera to perform facial recognition. In cases where the user's identity is uncertain, a voice recognition module prompts the user to say a secret word, confirming their identity through the microphone. The combination of these two biometric techniques ensures access is granted, and an access log is recorded, with an accompanying notification sent to the administrator via SMS. As technical contribution, this paper presents the design and implementation of an embedded biometric-based access control system using Raspberry Pi, which includes the integration with an electronic lock and digicode, in the other hand, a second innovation contribution by combining biometric-based authentication with Raspberry Pi technology, this paper introduces an innovative approach to access control systems that provides a more secure and reliable means of access control than traditional methods based on keys or passwords. An overview of the proposed system's architecture is provided, its operation modes, and necessary hardware and software requirements. The promising obtained results of demonstrations show a notable improvement in security levels, characterized by reduction of false acceptances, however, the paper acknowledges that users unfamiliar with the biometric system may face challenges, potentially leading to false rejections. Future work should focus on mitigating these challenges and addressing user familiarity issues.
APA, Harvard, Vancouver, ISO, and other styles
17

Boluwatife, Christianah Abe, Olajumoke Araromi Haonat, Segun Shokenu Emmanuel, et al. "Biometric Access Control Using Voice and Fingerprint." Engineering and Technology Journal 07, no. 07 (2022): 1376–82. https://doi.org/10.5281/zenodo.6922206.

Full text
Abstract:
In security-related systems, such as access control systems, authentication is extremely important. There are several ways to carry out this crucial activity, but biometrics is currently attracting more attention. After realizing the usefulness of biometrics, security systems use them for one of two fundamental functions: user identification or user verification. Multiple biometrics exist, and various access control systems require various biometrics. As a result of their impossibility to be lost, stolen, or forgotten, biometrics have been deemed the most secure and practical authentication method. Therefore, the design and development of the voice and fingerprint-based magic access control system. This research explores the idea of increasing access control door security by replacing a door key with a trustworthy electromagnetic door lock system that allows only authorized people to access a location using voice recognition or a fingerprint device. The voice sensor and fingerprint sensor were able to scan the user’s voice or fingerprint to open a prototype door when a valid user try to access the door. The motor closes the door after a preset 5 seconds delay.
APA, Harvard, Vancouver, ISO, and other styles
18

Oladimeji, Ismaila W., Omidiora E. Olusayo, Ismaila Folasade M., and Falohun Adeleye S.. "Multi-Level Access Control System in Automated Teller Machines." International Journal of Computer Science and Mobile Computing 10, no. 4 (2021): 146–55. http://dx.doi.org/10.47760/ijcsmc.2021.v10i04.020.

Full text
Abstract:
E-commerce theft involves using lost/stolen debit/credit cards, forging checks, misleading accounting practices, etc. Due to carelessness of cardholders and criminality activities of fraudsters, the personal identification number (PIN) and using account level based fraud detection techniques methods are inadequate to cub the activities of fraudsters. In recent times, researchers have made efforts of improving cyber-security by employing biometrics traits based security system for authentication. This paper proposed a multi-level fraud detection system in automated teller machine (ATM) operations. The system included PIN level, account-level and biometric level. Acquired RealScan-F scanner was used to capture liveness fingers. Transactional data were generated for each individual fingerprint with unique PIN. The results of the simulation showed that (i) the classification at account level only yielded averages 84.3% precision, 94.5% accuracy and 5.25% false alarm rate; (ii) matching at biometric level using liveness fingerprints samples yielded 0% APCER , 0% NPCER and 100% accuracy better than using fingerprints samples that produced 4.25% APCER , 2.33% NPCER and 93.42% accuracy; (iii) combining the three levels with the condition that all the levels must be positive produced 87.5% precision,84.9% accuracy and 2.65% false alarm rate; (iv) while the classification using voting technique yielded 99.15% precision, 97.35% accuracy and 0.47% false alarm.
APA, Harvard, Vancouver, ISO, and other styles
19

Karthik, Tripurari Vinay. "Encryption of Biometric Traits to Avoid Privacy Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40945.

Full text
Abstract:
In the modern digital world, biometric systems are a significant part of personal identification and access control. The use of sensitive biometric data such as iris and facial features raises huge privacy concerns because of the possibilities of data breaches and misuse. Therefore, this project focuses on the enhancement of the security of multimodal biometric systems through encryption mechanisms. The idea is to generate a strong biometric key based on features produced from iris and face biometric systems through advanced machine learning techniques. The features are then employed to produce a strong biometric key capable of encrypting the secret value using the AES algorithm. AES is a widely adopted symmetric encryption algorithm that ensures high efficiency in its software implementation and seamless processing capabilities of image data. This provides not only the reinforcement of authentication but also maintains confidentiality of biometric characteristics and mitigates the risks of privacy attacks and unauthorized access. Thus, this multimodal biometric encryption improves reliability, robustness, and the resistance power of the system against potential attacks, making it a promising step forward in the realm of secure biometric authenticationsystems. Keywords- Biometric encryption,Multimodal biometrics, ,Privacy attacks,Advanced Encryption Standard (AES), Biometric key generation,Iris recognition,Face recognition,Machine learning,Bio-crypto systems, Data security.
APA, Harvard, Vancouver, ISO, and other styles
20

Tamirah, Sharieff, Harmain Zoya, Smyrline R. Sarah, and Noorain Shafiya. "Redefining Security- Biometric Authentication System." Journal of Advances in Cryptography and Network Security 1, no. 1 (2025): 3–8. https://doi.org/10.5281/zenodo.14874057.

Full text
Abstract:
<em>Biometric security has developed into a cutting- edge technology in security enhancement, particularly excelling in authentication and access control within the banking, healthcare, and government sectors. This innovative approach utilizes unique anatomical and behavioural characteristics, biometric imprints, facial analysis, iris patterns, and voice processing, rendering it more effective and practical than traditional password systems. The ongoing study focuses to assess the fundamental principles underlying security using biometric systems and examine their effectiveness in preventing unauthorized access and identity theft while facilitating user authentication. Additionally, it addresses critical concerns related to privacy, the necessity for data protection, and the risks posed by spoofing attacks. The discussion includes countermeasures against these threats, highlighting recent advancements in encryption, multimodal biometrics, and artificial intelligence. Furthermore, it explores emerging trends in the development of security using biometric systems as a foundational element of contemporary cybersecurity outlines.</em>
APA, Harvard, Vancouver, ISO, and other styles
21

Chandra, Akhilesh, and Thomas G. Calderon. "Toward a Biometric Security Layer in Accounting Systems." Journal of Information Systems 17, no. 2 (2003): 51–70. http://dx.doi.org/10.2308/jis.2003.17.2.51.

Full text
Abstract:
This paper discusses theoretical and practical issues related to the use of a biometric-enabled security layer in accounting systems aimed at enhancing user authentication and reducing control risk. Originating in criminology, biometric technology has matured over the years with applications in diverse disciplines. However, its use in business and accounting is still in its infancy, and many issues about its role in information systems security are unresolved. The paper proposes an access decision framework that draws from the strategy and risk assessment literature to model processes where biometrics might be used to reduce control risk. Despite its potential strengths, biometric technology is not a panacea and represents one element in a portfolio of security mechanisms needed to protect information resources. The paper discusses challenges in implementing biometric technology and identifies avenues for future research.
APA, Harvard, Vancouver, ISO, and other styles
22

Barthe, Dr Gilles Alonso,Marcos. "IMPROVING SECURITY AND OPERATIONAL EFFICIENCY: FACIAL RECOGNITION-BASED ACCESS CONTROL AT AL-IMAN WORKSHOP." International journal of networks and security 5, no. 3 (2025): 06–12. https://doi.org/10.55640/ijns-05-01-01.

Full text
Abstract:
This study explores the implementation of a facial recognition-based access control system for the Al-Iman Workshop to enhance security and efficiency in managing access. The use of biometric systems, particularly facial recognition, has become a popular solution for secure access in various sectors. This paper assesses the design and effectiveness of integrating facial recognition technology in an industrial workshop setting, addressing concerns such as accuracy, security, and user privacy. Data was collected from the system’s performance, including its ability to identify workers, control access, and reduce human error. Results indicate that the facial recognition system significantly improved security and streamlined the access process, with a marked decrease in unauthorized entries. The paper concludes with recommendations for further improvements and the potential broader application of biometric access control systems in similar settings.
APA, Harvard, Vancouver, ISO, and other styles
23

Esekhaigbe, Emmanuel, and Emmanuel O. Okoduwa. "Design and implementation of a fingerprint-based biometric access control system." Journal of Advances in Science and Engineering 7, no. 1 (2022): 18–23. http://dx.doi.org/10.37121/jase.v7i1.183.

Full text
Abstract:
Security systems are often penetrated by sophisticated criminals, thus there is always a need for new solutions to be devised to give sufficient security to houses and other locations. The goal of this project is to build and deploy a fingerprint-based biometric access control system. The fingerprint is a pattern of ridges and valleys on the surface of a fingertip. Among various biometrics, fingerprint recognition is the most extensively and internationally accepted biometric because of its uniqueness, accuracy, cost-effectiveness, non-transferability, and ease of use. Presented is the system architecture for the system development that demonstrates component augmentation, detail extraction, and matching methodologies. MATLAB and the programming language C were used to develop a software application that was used to build algorithms for improvement, minutiae extraction, and matching processing. The software works by extracting meaningful features known as minutiae points from the person’s fingerprint, then records and stores these minutiae points to verify the person’s identity in the future. The resulting minutiae information is used to find matching fingerprints and to register these fingerprints in the system database. Finally, a verification system and identification system were realized. The proposed automatic door access control system was implemented using the Arduino Atmega 328p microcontroller. The proposed system was tried-out in real-time, and its performance was deemed adequate.
APA, Harvard, Vancouver, ISO, and other styles
24

N, Nithiya. "Automatic License Checking Using Fingerprint." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3440–42. https://doi.org/10.22214/ijraset.2025.68994.

Full text
Abstract:
Driving license verification framework is a serious issue in many countries. therefore, the biometric based driving license verification framework is employed because it's exceedingly simple and beneficial to screen. Biometrics suggests approximation regarding mortal traits. Biometrics proof (or reasonable countersign) is utilized in programming as a type of ID and access control. It's also used to perceive individuals in groups that are in perception. Biometric identifiers are also visible, quantifiable characteristics used to marker and characterize individuals. Biometric identifiers are continually requested as physical instead of social characteristics. Physiological characteristics are related to the state of the body. Biometrics studies typically consist of discrete cutlet print, face, iris, voice, mark, and hand computation identification and authentication. Out of these open biometric features special cutlet print emerges perhaps the best point providing superior mismatch rate as well as durable. Other characters are face, iris, voice, hand, and hand figure identification varying with times but point remaining the same as age persists. Thus point becomes reliable. Through imposing this biometric rooted system i.e. point technology to identify driving license bone can rule out additional time operation to support all cars.
APA, Harvard, Vancouver, ISO, and other styles
25

Werner, Gabor, and Laszlo Hanka. "Risk-Adapted Access Control with Multimodal Biometric Identification." Interdisciplinary Description of Complex Systems 18, no. 3 (2020): 327–36. http://dx.doi.org/10.7906/indecs.18.3.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Mon, Chit Su, Amir ‘Aatieff Amir Hussin, and Toh Kai Sin. "Analyzing the periocular biometric-based access control systems." Journal of Physics: Conference Series 1529 (April 2020): 032024. http://dx.doi.org/10.1088/1742-6596/1529/3/032024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Tripathi, Diwakar R., and Dipesh Kumar Nishad. "Biometric Authentication Systems: A Survey." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2878–84. http://dx.doi.org/10.61841/turcomat.v11i3.14653.

Full text
Abstract:
Biometric authentication systems offer a secure and convenient method of verifying the identity of individuals based on their unique physiological or behavioral traits. This paper presents a comprehensive survey of biometric authentication systems, focusing on the principles, technologies, applications, challenges, and future directions in the field. The survey covers various biometric modalities, including fingerprint recognition, iris recognition, facial recognition, keystroke dynamics, voice recognition, and gait analysis. Key topics discussed include the use of multi-modal biometric systems, continuous authentication, machine learning, and AI in biometrics, and biometric encryption. The paper also explores the implementation of biometric authentication in access control systems, financial transactions, healthcare systems, and government and law enforcement. Challenges such as security and privacy concerns, spoofing and impersonation, scalability and integration, and ethical and legal issues are addressed. Future research opportunities include improving accuracy and reliability, enhancing security and privacy, addressing societal and ethical concerns, and integrating biometric authentication with the Internet of Things (IoT).
APA, Harvard, Vancouver, ISO, and other styles
28

Otti, Csaba, and László Hanka. "Analisys of Access Points with the Queue Model for Biometric Access Control in Large Headcount Plants." Land Forces Academy Review 24, no. 2 (2019): 164–74. http://dx.doi.org/10.2478/raft-2019-0020.

Full text
Abstract:
Abstract The scaling of access control systems is usually done with respect to the life protection requirements regarding escape routes. At large headcount areas, the need for biometric identification arises from the security and business needs. Biometric systems can be characterized by probability variables, which can significantly affect the access process. Mathematically, access control is a discrete state space, stochastic process without memory, that can be described by a queue model. This study demonstrates the process model of access control systems and describes the mathematical model that allows for accurate planning and can ensure a successful introduction for access control systems.
APA, Harvard, Vancouver, ISO, and other styles
29

Gorski, Maksymilian, and Wojciech Wodo. "Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE." Cryptography 8, no. 2 (2024): 14. http://dx.doi.org/10.3390/cryptography8020014.

Full text
Abstract:
Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their application in cryptographic solutions, which allow the biometrically authenticated exchange of cryptographic keys between users and services on the internet, despite the fuzziness of biometric data. Such solutions are BAKE (biometrics-authenticated key exchange) and BRAKE (biometric-resilient authenticated key exchange) protocols, upon which our work is based. However, the direct application of fuzzy biometrics in cryptography, which relies heavily on the accuracy of single-bit secret values, is not trivial. Therefore, this paper is devoted to analyzing the security of this idea and the feasibility of implementing biometric AKE (authenticated key exchange) protocols, with an emphasis on the BRAKE protocol. As the results of our analysis, we discuss BRAKE’s limitations and vulnerabilities, which need to be appropriately addressed to implement the protocol in modern systems.
APA, Harvard, Vancouver, ISO, and other styles
30

Manikis, Georgios C., Marios Spanakis, and Emmanouil G. Spanakis. "Personalized Mobile eHealth Services for Secure User Access Through a Multi Feature Biometric Framework." International Journal of Reliable and Quality E-Healthcare 8, no. 1 (2019): 40–51. http://dx.doi.org/10.4018/ijrqeh.2019010104.

Full text
Abstract:
Humans have various features that differentiates one person from another which can be used to identify an individual for security purposes. These biometrics can authenticate or verify a person's identity and can be sorted in two classes, physiological and behavioural. In this article, the authors present their results of experimentation on publicly available facial images and the efficiency of a prototype version of SpeechXRays, a multi-modal biometric system that uses audio-visual characteristics for user authentication in eHealth platforms. Using the privacy and security mechanism provided, based on audio and video biometrics, medical personnel are able to be verified and subsequently identified for two different eHealth applications. These verified persons are then able to access control, identification, workforce management or patient record storage. In this work, the authors argue how a biometric identification system can greatly benefit healthcare, due to the increased accuracy of identification procedures.
APA, Harvard, Vancouver, ISO, and other styles
31

Rassolov, I. M., S. G. Chubukova, and I. V. Mikurova. "Biometrics in the Context of Personal Data and Genetic Information: Legal Issues." Lex Russica, no. 1 (January 1, 2019): 108–18. http://dx.doi.org/10.17803/1729-5920.2019.146.1.108-118.

Full text
Abstract:
In modern society, methods of identification of persons on the basis of their physical, biological or behavioral characteristics are actively developing. European countries are in the process of developing a holistic doctrine on biometric control and are clarifying their position on situations where biometric data are used by individuals.From the position of information law, the paper presents a new author’s approach to the problem of processing biometric data and genetic information. The division of biometrics into “trace” and “non-trace” is losing its meaning. A new classification of biometrics into digital and analog is proposed.Biometric access control should not become a routine phenomenon in the framework of the organization of the company and without any reason to replace other existing types of control. The interested person can be entrusted with the storage of their own biometric data to reduce the risks of leakage and the consequences of exposure to them. Biometric data must be stored on the company’s servers in encrypted form, which makes it impossible to use them without the consent of the person concerned.Biometric data should be protected by a special legal regime. The analysis of the European and Russian legislation made it possible to draw the following conclusions: biometric data is a special type of personal data, a special legal regime and regulation should be established; digital biometrics needs special legal regulation, since it is the most vulnerable type; genetic information does not fully correspond to the concept of personal data, as it can relate to an unlimited number of persons. This determines the need to develop a special law “on genetic information”.
APA, Harvard, Vancouver, ISO, and other styles
32

Kalbande, Yash A., and Prof. Snehal V. Raut. "Study of Biometric World." International Journal of Ingenious Research, Invention and Development (IJIRID) 3, no. 6 (2024): 593–98. https://doi.org/10.5281/zenodo.14555667.

Full text
Abstract:
<em>Rapid advances in biometric technology have revolutionized security, identification, and access in many areas. This article explores the current state of biometric technology and focuses on innovations, challenges, and future prospects in this area. It discusses the integration of biometric systems such as fingerprint recognition, facial recognition, iris scanning, and voice recognition into everyday applications, from smartphones to border security. It also explores the ethical and privacy issues surrounding the collection and storage of biometric data, and highlights the importance of effective security measures to protect sensitive information. Reviewing the latest trends and emerging technologies, including intelligence-driven biometric systems, this article also provides insight into the potential development of biometric solutions in the coming year. The aim is to better understand the impact of biometric technology on modern life, the balance between convenience, security and privacy.</em>
APA, Harvard, Vancouver, ISO, and other styles
33

Raia, Maria, Thomas Stogiannopoulos, Nikolaos Mitianoudis, and Nikolaos V. Boulgouris. "Person Identification Using Temporal Analysis of Facial Blood Flow." Electronics 13, no. 22 (2024): 4499. http://dx.doi.org/10.3390/electronics13224499.

Full text
Abstract:
Biometrics play an important role in modern access control and security systems. The need of novel biometrics to complement traditional biometrics has been at the forefront of research. The Facial Blood Flow (FBF) biometric trait, recently proposed by our team, is a spatio-temporal representation of facial blood flow, constructed using motion magnification from facial areas where skin is visible. Due to its design and construction, the FBF does not need information from the eyes, nose, or mouth, and, therefore, it yields a versatile biometric of great potential. In this work, we evaluate the effectiveness of novel temporal partitioning and Fast Fourier Transform-based features that capture the temporal evolution of facial blood flow. These new features, along with a “time-distributed” Convolutional Neural Network-based deep learning architecture, are experimentally shown to increase the performance of FBF-based person identification compared to our previous efforts. This study provides further evidence of FBF’s potential for use in biometric identification.
APA, Harvard, Vancouver, ISO, and other styles
34

x, Bisiriyu, Akeem Olawale, Olawale x, and Babatunde Olumide. "Sequential Face and Voice Biometric System for Access Control into a Security Safe." International Journal of Science and Research (IJSR) 11, no. 6 (2022): 1234–38. http://dx.doi.org/10.21275/sr22528120038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Salama, Gerges M., Safaa El-Gazar, Basma Omar, et al. "Cancelable biometric system for IoT applications based on optical double random phase encoding." Optics Express 30, no. 21 (2022): 37816. http://dx.doi.org/10.1364/oe.466101.

Full text
Abstract:
The security issue is essential in the Internet-of-Things (IoT) environment. Biometrics play an important role in securing the emerging IoT devices, especially IoT robots. Biometric identification is an interesting candidate to improve IoT usability and security. To access and control sensitive environments like IoT, passwords are not recommended for high security levels. Biometrics can be used instead, but more protection is needed to store original biometrics away from invaders. This paper presents a cancelable multimodal biometric recognition system based on encryption algorithms and watermarking. Both voice-print and facial images are used as individual biometrics. Double Random Phase Encoding (DRPE) and chaotic Baker map are utilized as encryption algorithms. Verification is performed by estimating the correlation between registered and tested models in their cancelable format. Simulation results give Equal Error Rate (EER) values close to zero and Area under the Receiver Operator Characteristic Curve (AROC) equal to one, which indicates the high performance of the proposed system in addition to the difficulty to invert cancelable templates. Moreover, reusability and diversity of biometric templates is guaranteed.
APA, Harvard, Vancouver, ISO, and other styles
36

Abundiz-Pérez, F., C. Cruz-Hernández, M. A. Murillo-Escobar, R. M. López-Gutiérrez, and A. Arellano-Delgado. "A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map." Mathematical Problems in Engineering 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/2670494.

Full text
Abstract:
Currently, biometric identifiers have been used to identify or authenticate users in a biometric system to increase the security in access control systems. Nevertheless, there are several attacks on the biometric system to steal and recover the user’s biometric trait. One of the most powerful attacks is extracting the fingerprint pattern when it is transmitted over communication lines between modules. In this paper, we present a novel fingerprint image encryption scheme based on hyperchaotic Rössler map to provide high security and secrecy in user’s biometric trait, avoid identity theft, and increase the robustness of the biometric system. A complete security analysis is presented to justify the secrecy of the biometric trait by using our proposed scheme at statistical level with 100% of NPCR, low correlation, and uniform histograms. Therefore, it can be used in secure biometric access control systems.
APA, Harvard, Vancouver, ISO, and other styles
37

Gaikwad, Aditya, Vaishanavi Bundele, Diksha Borade, and Sayali Nannaware. "Advancements in ATM Security: A Biometric Approach for Fingerprint and Face Recognition Access Control System." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 1284–87. http://dx.doi.org/10.22214/ijraset.2024.58159.

Full text
Abstract:
Abstract: The project, introduces an innovative approach to enhance the security and accessibility of Automated Teller Machines (ATMs). In an era where financial transactions are increasingly digital and essential, safeguarding ATM access is of paramount importance. This project leverages the power of biometric authentication, combining fingerprint and face recognition technologies to create a robust and reliable access control system. The proposed system allows ATM users to authenticate their identity with a seamless and secure process. Fingerprint recognition provides a high-precision, individualized identification method, while face recognition adds an additional layer of security, ensuring the users identity matches the stored biometric data. This dual-biometric approach significantly reduces the risk of unauthorized access and fraudulent activities at ATMs. Beyond enhancing security, the project contributes to user convenience by streamlining the authentication process, eliminating the need for traditional ATM cards or PINs. Users can access their accounts swiftly and securely, thereby improving the overall ATM experience. Furthermore, the project’s incorporation of state-of-the-art biometric technologies underscores its potential to set a standard for secure ATM access not only in the financial sector but also in various other domains where access control is critical.
APA, Harvard, Vancouver, ISO, and other styles
38

Rajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.

Full text
Abstract:
Biometrics refers to the automatic identification of a living person based on physiological or behavioural characteristics for authentication purpose. Among the existing biometric technologies are the face recognisation, fingerprint recognition, finger-geometry, hand geometry, iris recognition, vein recognition, voice recognition and signature recognition, Biometric method requires the physical presence of the person to be identified. This emphasizes its preference over the traditional method of identifying what you have such as, the use of password, a smartcard etc. Also, it potentially prevents unauthorized admittance to access control systems or fraudulent use of ATMs, Time Attendance Systems, cellular phones, smart cards, desktop PCs, Workstations, vehicles and computer networks. Biometric recognition systems offer greater security and convenience than traditional methods of personal recognition.
APA, Harvard, Vancouver, ISO, and other styles
39

J, Paul Rajasingh, and Sai Yaswanth D. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 5 (2021): 87–89. https://doi.org/10.35940/ijeat.E2651.0610521.

Full text
Abstract:
Biometrics refers to the automatic identification of a living person based on physiological or behavioural characteristics for authentication purpose. Among the existing biometric technologies are the face recognisation, fingerprint recognition, finger-geometry, hand geometry, iris recognition, vein recognition, voice recognition and signature recognition, Biometric method requires the physical presence of the person to be identified. This emphasizes its preference over the traditional method of identifying what you have such as, the use of password, a smartcard etc. Also, it potentially prevents unauthorized admittance to access control systems or fraudulent use of ATMs, Time Attendance Systems, cellular phones, smart cards, desktop PCs, Workstations, vehicles and computer networks. Biometric recognition systems offer greater security and convenience than traditional methods of personal recognition.
APA, Harvard, Vancouver, ISO, and other styles
40

Boluma Mangata, Bopatriciat, Dominique Ilunga Nakashama, Donatien Kadima Muamba, and Parfum Bukanga Christian. "Implementation of an access control system based on bimodal biometrics with fusion of global decisions: Application to facial recognition and fingerprints." Journal of Computing Research and Innovation 7, no. 2 (2022): 43–53. http://dx.doi.org/10.24191/jcrinn.v7i2.289.

Full text
Abstract:
Single-mode biometric systems suffer from several problems that make them unsuitable for current biometric applications that require high levels of reliability and security. These problems include the use of a single biometric trait that is prone to noise, poor capture, lack of biometric points, and deterioration of biometric input quality. In this paper, we are interested in decision fusion access control on a biometric bimodal pattern recognition system based on fingerprints and facial recognition. To realize this access control system based on facial recognition and fingerprints, we used an embedded system under Arduino, we programmed electronic systems for the automatic opening of doors without human action being. The performance evaluation of decision fusion access control on a biometric bimodal pattern recognition system is realized by means of the confusion matrix, the calculations of the evaluation parameters (Sensitivity, Specificity, Positive Predictive Value, Negative Predictive Value and False Negative). From a sample of 500 individuals, 250 of whom were registered and 250 non-registered, our access control system obtained the results of 248 true positives, 2 false negative, 1 false positive and 249 true negatives which constitute our confusion matrix. However, from the set of tests performed we can conclude that by taking advantage of the fusion of these two modalities, we increase the verification performance of system as the verification performance of bimodal system (fingerprint decision fusion and facial recognition) is applied to give even better results compared to single mode systems.
APA, Harvard, Vancouver, ISO, and other styles
41

McAteer, Ian, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, and Craig Valli. "Integration of Biometrics and Steganography: A Comprehensive Review." Technologies 7, no. 2 (2019): 34. http://dx.doi.org/10.3390/technologies7020034.

Full text
Abstract:
The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has the potential to augment both access control parameters and the secure transmission of sensitive biometric data. However, despite these efforts, the amalgamation of biometric and steganographic methods has failed to transition from the research lab into real-world applications. In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing exchange of steganography keys, identifying and address legal implications, and developing industry standards.
APA, Harvard, Vancouver, ISO, and other styles
42

Shabala, Yevheniia, Borys Korniichuk, and Dmytro Humennyi. "Disadvantages of using biometric identifiers in access restriction systems." Management of Development of Complex Systems, no. 59 (September 27, 2024): 131–37. http://dx.doi.org/10.32347/2412-9933.2024.59.131-137.

Full text
Abstract:
Biometric systems identify a person based on their unique physical characteristics, such as fingerprints, facial recognition, iris, voice, etc. These systems are widely used in various fields, including security, access control, banking and healthcare. However, they also face a number of technical, ethical and legal challenges that need to be addressed to ensure their effective implementation and use. The advantages of biometric systems include high accuracy and reliability of identification, which is ensured by the uniqueness of each person's biometric data. This makes them effective in ensuring the security of objects and information, access control and automation of various processes. Biometric systems are also known for their convenience for users, who can avoid the need to remember complex passwords or carry keys. However, there are also serious limitations. One of the biggest issues is privacy and data security. Biometric data, which at the same time are immutable, can become the object of theft or misuse. This can lead to serious consequences for users, including identity fraud and crime. In addition, it is important to consider that not all people can comfortably use biometric systems due to physical or medical limitations. The second key aspect is technical problems, such as insufficient accuracy of systems, vulnerability to falsification and instability in different operating conditions. For example, facial recognition systems may not work accurately enough when emotions or lighting change. To solve these problems, it is necessary to develop comprehensive approaches that include not only technical, but also ethical and legal data protection mechanisms. It is also important to ensure a high level of user education regarding the security and privacy of the use of biometric systems. In conclusion, biometric systems represent a powerful tool for security and identification in various fields, but their effective implementation requires attention to technical, ethical and legal aspects.
APA, Harvard, Vancouver, ISO, and other styles
43

NWOYE, Chinedu J. "Cybercrime Prevention in Online Transaction Using Biometric Access Control." International Journal of Information Security and Cybercrime 4, no. 2 (2015): 61–72. http://dx.doi.org/10.19107/ijisc.2015.02.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Jones, Lynne Norris. "Biometric access control in the workplace: benefit or bind?" International Journal of Information Technology and Management 11, no. 1/2 (2012): 61. http://dx.doi.org/10.1504/ijitm.2012.044064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

B, Smitha Shekar, Harish G, Aaditya Pandit, Abdul Rayan, Abhishek Singha, and Binyul Shrestha. "IoT based Biometric Student Access Control and Attendance Management." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5730–35. http://dx.doi.org/10.22214/ijraset.2024.61370.

Full text
Abstract:
Abstract: The Fingerprint-Based Attendance Management System offers an innovative solution for automating attendance tracking in educational institutions. Utilizing an ATmega328 microcontroller and fingerprint sensor, the system enables efficient capture of student attendance data. Real-time feedback is provided through an LCD display, ensuring users are promptly informed of authentication status. Captured fingerprint IDs are transmitted to a cloud-based server for comparison with stored student records. Upon successful matching, attendance is marked, and SMS notifications are sent to parents, enhancing communication and transparency. Additionally, a teacher management interface within the cloud system allows for recording student internal marks and managing attendance records. The system prioritizes security, reliability, and accuracy to maintain the integrity of attendance data. By streamlining attendance tracking processes and improving communication between schools and parents, the system contributes to enhanced efficiency and accountability in educational institutions.
APA, Harvard, Vancouver, ISO, and other styles
46

Qilichev, Elmurad Jamuradovich, Baxodir Saydullaevich Achilov, Ismoil Ergash oʻgʻli Isroilov, and Mirshod Mirkomil o'g'li Ahmadov. "SECURITY IN BIOMETRIC ACCESS CONTROL SYSTEMS BASED ON FINGERPRINTS." Chemical Technology, Control and Management 2025, no. 2 (2025): 73–83. https://doi.org/10.59048/2181-1105.1667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

OMOTOSHO, LAWRENCE, IBRAHIM OGUNDOYIN, OLAJIDE ADEBAYO, and JOSHUA OYENIYI. "AN ENHANCED MULTIMODAL BIOMETRIC SYSTEM BASED ON CONVOLUTIONAL NEURAL NETWORK." Journal of Engineering Studies and Research 27, no. 2 (2021): 73–81. http://dx.doi.org/10.29081/jesr.v27i2.276.

Full text
Abstract:
Multimodal biometric system combines more than one biometric modality into a single method in order, to overcome the limitations of unimodal biometrics system. In multimodal biometrics system, the utilization of different algorithms for feature extraction, fusion at feature level and classification often to complexity and make fused biometrics features larger in dimensions. In this paper, we developed a face-iris multimodal biometric recognition system based on convolutional neural network for feature extraction, fusion at feature level, training and matching to reduce dimensionality, error rate and improve the recognition accuracy suitable for an access control. Convolutional Neural Network is based on deep supervised learning model and was employed for training, classification, and testing of the system. The images are preprocessed to a standard normalization and then flow into couples of convolutional layers. The developed multimodal biometrics system was evaluated on a dataset of 700 iris and facial images, the training database contain 600 iris and face images, 100 iris and face images were used for testing. Experimental result shows that at the learning rate of 0.0001, the multimodal system has a performance recognition accuracy (RA) of 98.33% and equal error rate (ERR) of 0.0006%.
APA, Harvard, Vancouver, ISO, and other styles
48

Alkasimi, Ahmad, Tyler Shepard, Samuel Wagner, et al. "Dual-Biometric Human Identification Using Radar Deep Transfer Learning." Sensors 22, no. 15 (2022): 5782. http://dx.doi.org/10.3390/s22155782.

Full text
Abstract:
Accurate human identification using radar has a variety of potential applications, such as surveillance, access control and security checkpoints. Nevertheless, radar-based human identification has been limited to a few motion-based biometrics that are solely reliant on micro-Doppler signatures. This paper proposes for the first time the use of combined radar-based heart sound and gait signals as biometrics for human identification. The proposed methodology starts by converting the extracted biometric signatures collected from 18 subjects to images, and then an image augmentation technique is applied and the deep transfer learning is used to classify each subject. A validation accuracy of 58.7% and 96% is reported for the heart sound and gait biometrics, respectively. Next, the identification results of the two biometrics are combined using the joint probability mass function (PMF) method to report a 98% identification accuracy. To the best of our knowledge, this is the highest reported in the literature to date. Lastly, the trained networks are tested in an actual scenario while being used in an office access control platform to identify different human subjects. We report an accuracy of 76.25%.
APA, Harvard, Vancouver, ISO, and other styles
49

Zyryanova, Svetlana A., Yuliya Yu Vassunova, and Irina V. Chumak. "INNOVATIVE AUTHENTICATION AND ACCESS CONTROL TECHNOLOGIES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 4/9, no. 145 (2024): 115–21. http://dx.doi.org/10.36871/ek.up.p.r.2024.04.09.018.

Full text
Abstract:
The scientific article explores innovative authentication and access control technologies in the modern information society. The article analyzes the existing authentication and access control methods, as well as examines the latest trends and developments in this area. Special attention is paid to the use of biometric data, machine learning and artificial intelligence to ensure the safety and convenience of users. The article also discusses the advantages, challenges and prospects of using innovative authentication and access control technologies in various fields, including information security, financial services, healthcare and others.
APA, Harvard, Vancouver, ISO, and other styles
50

BOLUMA MANGATA, Bopatriciat, Odette Sangupamba Mwilu, Patience Ryan Tebua Tene, and Gilgen Mate Landry. "Evaluation of two biometric access control systems using the Susceptible-Infected-Recovered model." Journal of Electronics, Electromedical Engineering, and Medical Informatics 5, no. 2 (2023): 119–24. http://dx.doi.org/10.35882/jeemi.v5i2.288.

Full text
Abstract:
This paper evaluates the effectiveness of decisions made on two single-mode biometric systems based on facial recognition and fingerprints for access control. To achieve this, we first implemented an embedded system under Arduino to allow us to open and close doors, then we programmed two biometric recognition systems, namely facial recognition and fingerprint recognition, and finally we exploited the Susceptible-Infected-Covered model without demographics to evaluate the efficiency of these two access control systems. The variables used in the analysis were the number of individuals enrolled in the biometric system to be subject to access control (Susceptible), the number of individuals enrolled in the biometric system and denied access by the system, as well as the number of individuals not enrolled in the biometric system and allowed access by the system (Infected), and the number of false acceptance rates and false rejection rates at time t in the systems (Retrieved). In a sample of 600 individuals, of which 300 were enrolled and 300 were not, our two simple modal access control systems each obtained the following results: 270 true positives, 30 false negatives, 48 false positives and 252 true negatives for the facial recognition system, compared to 288 true positives, 12 false negatives, 24 false positives and 276 true negatives for the fingerprint recognition system, which constitute our confusion matrix. Based on this confusion matrix, we were able to exploit the false rejection rates and false acceptance rates to correct for these inconveniences using the SIR model, i.e. 78 infected individuals for the facial recognition system, compared to 36 infected individuals for the fingerprint recognition system over a period of 216 days. The results show that the fingerprint recognition system is more efficient than the facial recognition system, according to the SIR model without demographic formulation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!