To see the other types of publications on this topic, follow the link: Biometric authentication.

Dissertations / Theses on the topic 'Biometric authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Biometric authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Polon, Thomas. "Attestation-based remote biometric authentication." Connect to this title online, 2007. http://etd.lib.clemson.edu/documents/1181666383/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Breedt, Morné. "Integrating biometric authentication into multiple applications." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-08282007-135540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Salaiwarakul, Anongporn. "Verification of secure biometric authentication protocols." Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/1166/.

Full text
Abstract:
The thesis presents verification of biometric authentication protocols. ProVerif is used as the verification tool for verifying and analysing the protocols. The protocol are analysed in ProVerif model. Various attacks to the protocols are generated in order to verify whether the protocols hold their intended properties. We have selected three biometric authentication protocols and proposed a remote biometric authentication protocol for on-line banking. Each of which has different intended purposes and properties. The first protocol is generic authentication using biometric data. This protocol
APA, Harvard, Vancouver, ISO, and other styles
4

Aronsson, Erik. "Biometric Authentication and Penetration of Smartphones." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713.

Full text
Abstract:
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. The function,vulnerabilities, and techniques associated with these systems are compiled usinga literature study of published papers and books on the subject. The performedexperiments apply these techniques in the form of presentation attacks directed atthe fingerprint-, face- and iris recognit
APA, Harvard, Vancouver, ISO, and other styles
5

Breedt, Morne. "Integrating biometric authentication into multiple applications." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/27605.

Full text
Abstract:
The Internet has grown from its modest academic beginnings into an important, global communication medium. It has become a significant, intrinsic part of our lives, how we distribute information and how we transact. It is used for a variety of purposes, including: banking; home shopping; commercial trade - using EDI (Electronic Data Interchange); and to gather information for market research and other activities. Owing to its academic origins, the early developers of the Internet did not focus on security. However, now that it has rapidly evolved into an extensively used, global commercial tra
APA, Harvard, Vancouver, ISO, and other styles
6

Bansal, Mamta. "Face based multimodal biometric authentication system." Thesis, IIT Delhi, 2015. http://eprint.iitd.ac.in:80//handle/2074/8179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hitchcock, David C. "Evaluation and combination of biometric authentication systems." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Poon, Hoi Ting. "Towards a practical and secure biometric authentication system." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/28017.

Full text
Abstract:
The idea of merging biometrics technology with cryptography brought interesting possibilities in enhancing the security and privacy of biometrics systems. Conventional systems generally require large databases, which represent a security risk and raise privacy concerns. Biometric encryption is a method devised to hide biometric features along with a cryptographic key, which could remove the need for such biometric databases. The Fuzzy Vault scheme is one of the promising candidates for biometric encryption. This thesis analyzes the scheme and attempts to provide solutions to problems impeding
APA, Harvard, Vancouver, ISO, and other styles
9

Merati, A. "Multi-modal biometric authentication with cohort-based normalization." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Balisane, Hewa. "Human gait analysis for biometric identification and authentication." Thesis, Manchester Metropolitan University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539385.

Full text
Abstract:
The study of biometrics is concerned with any human physiological or behavioural characteristic which is universal, unique and measurable. Biometric systems operate by acquiring biometric data from individuals, extracting feature sets from data and comparing this feature with the enrolment set in a database. The aIm of this research is to compare the performance of gait-based user recognition of children with adults. Existing analyses techniques in gait-based recognition using wearable sensors for adults are applied to gait analyses in children. This is the first known study to be conducted on
APA, Harvard, Vancouver, ISO, and other styles
11

Eyers, Brandy Marie. "An Analysis of Remote Biometric Authentication with Windows." Scholar Commons, 2011. http://scholarcommons.usf.edu/etd/3096.

Full text
Abstract:
One thing that everyone seems to be worried about when it comes to his or her computer is security. If your computer is not secure then private information could be stolen. Many people now use passwords to protect themselves though they are discovering that using multi-factor authentication is much more secure. It allows you to use multiple different proofs of who you are. Biometrics is one of the ways to prove identity. Using it, you could log into a system with just a fingerprint, which is something that is very difficult to steal. We present a suite of software tools that allows you to log
APA, Harvard, Vancouver, ISO, and other styles
12

Sarıer, Deniz Neyire [Verfasser]. "Biometric Cryptosystems : Authentication, Encryption and Signature for Biometric Identities [[Elektronische Ressource]] / Neyire Deniz Sarıer." Bonn : Universitäts- und Landesbibliothek Bonn, 2013. http://d-nb.info/1044870044/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Gancarčík, Lukáš. "Vicefaktorová autentizace elektronických dokumentů." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224008.

Full text
Abstract:
The aim of the thesis is to provide complete information regarding electronic documents and possibilities of their usage. The focus is concentrated on the area of authentication, which specifies the possibility of obtaining authentication information and describes the authentication processes itself. The diploma thesis also deals with the suggestion of multifactor authentication of electronic documents for the selected company.
APA, Harvard, Vancouver, ISO, and other styles
14

Al-Assam, Hisham. "Entropy evaluation and security measures for reliable single/multi-factor biometric authentication and biometric keys." Thesis, University of Buckingham, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.601453.

Full text
Abstract:
The growing deployment of biometrics as a proof of identity has generated a great deal of research into biometrics in recent years, and widened the scope of investigations beyond improving accuracy into mechanisms to deal with serious concerns raised about security and privacy due to the potential misuse. of the collected biometric data along with possible attacks on biometric systems. The focus on improving performance of biometric authentication has been more on multi-modal and multi-factor biometric authentication in conjunction with designing recognition techniques to mitigate the adverse
APA, Harvard, Vancouver, ISO, and other styles
15

Han, Wei. "An integrated and distributed biometric-based user authentication architecture." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27851.

Full text
Abstract:
Biometric authentication systems are used to guide the system security for many years in the computer world and make the user's identification easier and more convenient. Meanwhile, the systems encounter lots of challenges, attacks and threats, privacy protection and system management requirements, which affect the user's acceptance. Differing from the commonly used solutions, in this thesis the approach is to modify the system to meet these requirements, which results in a distributed architecture which can be composed in real time, and resolves the above challenges in one solution. A system
APA, Harvard, Vancouver, ISO, and other styles
16

Rashid, Rasber Dhahir. "Robust steganographic techniques for secure biometric-based remote authentication." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/236/.

Full text
Abstract:
Biometrics are widely accepted as the most reliable proof of identity, entitlement to services, and for crime-related forensics. Using biometrics for remote authentication is becoming an essential requirement for the development of knowledge-based economy in the digital age. Ensuring security and integrity of the biometric data or templates is critical to the success of deployment especially because once the data compromised the whole authentication system is compromised with serious consequences for identity theft, fraud as well as loss of privacy. Protecting biometric data whether stored in
APA, Harvard, Vancouver, ISO, and other styles
17

Yang, Shenglin. "Design and implementation for secure enbedded biometric authentication systems." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1317343341&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

ALI, ARSLAN. "Deep learning techniques for biometric authentication and robust classification." Doctoral thesis, Politecnico di Torino, 2021. http://hdl.handle.net/11583/2910084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Emambakhsh, Mehryar. "Using the 3D shape of the nose for biometric authentication." Thesis, University of Bath, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.665386.

Full text
Abstract:
This thesis is dedicated to exploring the potential of the 3D shape of the nasal region for face recognition. In comparison to other parts of the face, the nose has a number of distinctive features that make it attractive for recognition purposes. It is relatively stable over different facial expressions, easy to detect because of its salient convexity, and difficult to be intentionally cover up without attracting suspicion. In addition compared to other facial parts, such as forehead, chin, mouth and eyes, the nose is not vulnerable to unintentional occlusions caused by scarves or hair. Prior
APA, Harvard, Vancouver, ISO, and other styles
20

Assaad, Firas Souhail. "Biometric Multi-modal User Authentication System based on Ensemble Classifier." University of Toledo / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1418074931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Carrillo, Cassandra M. "Continuous biometric authentication for authorized aircraft personnel : a proposed design." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FCarrillo.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Abbadi, Laith. "Multi-factor Authentication Techniques for Video Applications over the Untrusted Internet." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23413.

Full text
Abstract:
Designing a completely secure and trusted system is a challenge that still needs to be addressed. Currently, there is no online system that is: (i) easy to use, (ii) easy to deploy, (iii) inexpensive, and (iv) completely secure and trusted. The proposed authentication techniques aim to enhance security and trust for video applications in the untrustworthy online environments. We propose a transparent multimodal biometric authentication (TMBA) for video conferencing applications. The user is identified based on his/her physiological and behavioral biometrics. The technique is based on a ‘Steps-
APA, Harvard, Vancouver, ISO, and other styles
23

Arakala, Arathi, and arathi arakala@ems rmit edu au. "Secure and Private Fingerprint-based Authentication." RMIT University. Mathematical and Geospatial Sciences, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081128.102017.

Full text
Abstract:
This thesis studies the requirements and processes involved in building an authentication system using the fingerprint biometric, where the fingerprint template is protected during storage and during comparison. The principles developed in this thesis can be easily extended to authentication systems using other biometric modalities. Most existing biometric authentication systems store their template securely using an encryption function. However, in order to perform matching, the enrolled template must be decrypted. It is at this point that the authentication system is most vulnerable as the
APA, Harvard, Vancouver, ISO, and other styles
24

Aljeaid, D. "A novel authentication protocol based on biometric and identity-based cryptography." Thesis, Nottingham Trent University, 2015. http://irep.ntu.ac.uk/id/eprint/28041/.

Full text
Abstract:
Recently, considerable attention has been devoted to distributed systems. It has become obvious that a high security level should be a fundamental prerequisite for organisations' processes, both in the commercial and public sectors. A crucial foundation for securing a network is the ability to reliably authenticate ommunication parties. However, these systems face some critical security risks and challenges when they attempt to stabilise between security, efficiency and functionality. Developing a secure authentication protocol can be challenging; this thesis proposes an authentication scheme
APA, Harvard, Vancouver, ISO, and other styles
25

Laux, Dawn Delaine. "A study of biometric authentication adoption in the credit union industry." [Ames, Iowa : Iowa State University], 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Full text
Abstract:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication me
APA, Harvard, Vancouver, ISO, and other styles
27

Nelte, Michael Andrew. "Distributed authentication to preserve privacy through smart card based biometric matching." Master's thesis, University of Cape Town, 2000. http://hdl.handle.net/11427/6424.

Full text
Abstract:
Bibliography: pages 135-139.<br>This thesis focuses on privacy concerns, specifically those relating to the storage and use of biometrics. These concerns result from the fact that biometric information is unique. This uniqueness makes the biometric a very strong identifier increasing the possibility that it could be used to monitor an individual's activities. An expert can extract considerable information from a biometric scan, ranging from the age or gender to whether the individual has certain diseases.
APA, Harvard, Vancouver, ISO, and other styles
28

Abernethy, Mark. "User Authentication Incorporating Feature Level Data Fusion of Multiple Biometric Characteristics." Thesis, Abernethy, Mark (2011) User Authentication Incorporating Feature Level Data Fusion of Multiple Biometric Characteristics. PhD thesis, Murdoch University, 2011. https://researchrepository.murdoch.edu.au/id/eprint/10609/.

Full text
Abstract:
This PhD research project developed and evaluated innovative approaches to computer system user authentication, using biometric characteristics. It involved experiments with a significant number of participants and development of new approaches to biometric data representation and analysis. The initial authentication procedure, that we all perform when we log onto a computer system, is considered to be the first line of protection for computer systems. The password is the most common verification token used in initial authentication procedures. Unfortunately, passwords are subject to numer
APA, Harvard, Vancouver, ISO, and other styles
29

Alhussain, Thamer Omar. "Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security." Thesis, Griffith University, 2012. http://hdl.handle.net/10072/366143.

Full text
Abstract:
This dissertation presents a new substantive theory that identifies and describes the factors that influence the adoption of biometrics in the security of m-government applications. The developed theory is specific to a particular context and area of the application of biometric authentication into mobile devices for government services in the Kingdom of Saudi Arabia (KSA). Given the continuing growth of mobile phone and Internet services, this dissertation is significant since it adds to current knowledge on how biometric authentication can play an integral role in providing secure m-governme
APA, Harvard, Vancouver, ISO, and other styles
30

Arteaga, Falconi Juan Sebastian. "Towards an Accurate ECG Biometric Authentication System with Low Acquisition Time." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40129.

Full text
Abstract:
Biometrics is the study of physical or behavioral traits that establishes the identity of a person. Forensics, physical security and cyber security are some of the main fields that use biometrics. Unlike traditional authentication systems—such as password based—biometrics cannot be lost, forgotten or shared. This is possible because biometrics establishes the identity of a person based on a physiological/behavioural characteristic rather than what the person possess or remembers. Biometrics has two modes of operation: identification and authentication. Identification finds the identity of a pe
APA, Harvard, Vancouver, ISO, and other styles
31

Hortai, František. "DYNAMICKÝ BIOMETRICKÝ PODPIS JAKO EFEKTIVNÍ NÁSTROJ PRO VNITROPODNIKOVOU KOMUNIKACI." Doctoral thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402115.

Full text
Abstract:
The aim of this thesis is to provide comprehensive information on the possibilities of authentication, combination of authentication factors and the integration of this issue into corporate communication. The work focuses on this issue and specifies the possibilities for obtaining authentication information, analyses the authentication methods, identification and authorization. It examines the applicability of biometric technologies, the principle of their functionality, examples of their use, their impact, the advantages and disadvantages they bring. A natural, easy-to-use, convenient tool fo
APA, Harvard, Vancouver, ISO, and other styles
32

Al, Abdulwahid Abdulwahid Abdullah. "Federated authentication using the Cloud (Cloud Aura)." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9596.

Full text
Abstract:
Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorised user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. Traditionally deployed in a
APA, Harvard, Vancouver, ISO, and other styles
33

Bin, Safie Sairul Izwan. "Pulse domain novel feature extraction methods with application to ecg biometric authentication." Thesis, University of Strathclyde, 2012. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=17829.

Full text
Abstract:
This thesis presents the concept of representing finite signals in terms of sequential output pulses called pulse domain to extract Electrocardiogram (ECG) features for biometric authentication systems. Two novel methods based on the pulse domain philosophy namely Pulse Active (PA) and Adaptive Pulse Active (APA) techniques are presented in this thesis. A total of 11 algorithms are derived from these two methods and used to generate novel ECG feature vectors. Six algorithms of the PA technique are named as Pulse Active Bit (PAB), Pulse Active Width (PAW), Pulse Active Area (PAA), Pulse Active
APA, Harvard, Vancouver, ISO, and other styles
34

Huang, Xuan. "Mobile security and smart systems : multi-modal biometric authentication on mobile devices." Thesis, Abertay University, 2013. https://rke.abertay.ac.uk/en/studentTheses/ce2dec7b-fdcf-496e-81c4-fb98d0033c78.

Full text
Abstract:
With increased use of mobile phones that support mobile commerce, there is a need to examine the authentication of users. The password-based authentication techniques are not reliable with many passwords being too simple. A biometric authentication system is becoming more commonplace and is widely used in security fields because of its special stability and uniqueness. Within this context, the researcher has developed a fuzzy logic based multi-modal biometric authentication system to verify the identity of a mobile phone user. The research presented in this thesis involves three parts of work.
APA, Harvard, Vancouver, ISO, and other styles
35

Karlsson, Anna. "Device Sensor Fingerprinting : Mobile Device Sensor Fingerprinting With A Biometric Approach." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119341.

Full text
Abstract:
The number of connected devices connected to the Internet is growing rapidly. When talking about devices it also covers the ones not having any contact with humans. This type of devices are the ones that are expected to increase the most. That is why the field of device fingerprinting is an area that requires further investigation. This thesis measures and evaluates the accelerometer, camera and gyroscope sensor of a mobile device to the use as device fingerprinting. The method used is based on previous research in sensor identification together with methods used for designing a biometric syst
APA, Harvard, Vancouver, ISO, and other styles
36

Luo, Ying. "Efficient Anonymous Biometric Matching in Privacy-Aware Environments." UKnowledge, 2014. http://uknowledge.uky.edu/ece_etds/46.

Full text
Abstract:
Video surveillance is an important tool used in security and environmental monitoring, however, the widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. To identify these individuals for protection, the most reliable approach is to use biometric signals as they are immutable and highly discriminative. If misused, these characteristics of biometrics can seriously defeat the goal of privacy protection. In this di
APA, Harvard, Vancouver, ISO, and other styles
37

Tran, Quang Duc. "One-class classification : an approach to handle class imbalance in multimodal biometric authentication." Thesis, City, University of London, 2014. http://openaccess.city.ac.uk/19662/.

Full text
Abstract:
Biometric verification is the process of authenticating a person‟s identity using his/her physiological and behavioural characteristics. It is well-known that multimodal biometric systems can further improve the authentication accuracy by combining information from multiple biometric traits at various levels, namely sensor, feature, match score and decision levels. Fusion at match score level is generally preferred due to the trade-off between information availability and fusion complexity. However, combining match scores poses a number of challenges, when treated as a two-class classification
APA, Harvard, Vancouver, ISO, and other styles
38

Heath, Jacob. "Biometric Classification of Human Subjects Using Electroencephalography Auditory Event-Related Potentials." University of Cincinnati / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1439300974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Spadaccini, Andrea. "Innovative Traits, Algorithms and Application Scenarios for Mono-multimodal Biometric Recognition." Doctoral thesis, Università di Catania, 2012. http://hdl.handle.net/10761/1096.

Full text
Abstract:
Identity verification is one of the most common and important processes in our daily lives. For centuries, humans have relied on the visual appearance of their peers - or other distinctive traits - to recognize them. Currently, most of the traditional authentication methods infer one s identity by either verifying the knowledge of a shared secret (i.e., password) or the possession of a given object (i.e., token); both methods are sub-optimal, since they do not directly verify the person s identity, but an alternate and less rich representation that could also very easily stolen or inadvertentl
APA, Harvard, Vancouver, ISO, and other styles
40

Abraham, Arya. "It is I: An Authentication System for a Reconfigurable Radio." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/34353.

Full text
Abstract:
The security of a radio system hinges on its ability to effectively authenticate a user. This work proposes a two-factor authentication scheme using a token and a biometric. The users' access rights are determined during authentication and the users are served only those channels of data that they are privileged to receive. The strengths and the weaknesses of the implementation in reconfigurable hardware are identified. The capabilities of the scheme are put into perspective by comparing it to a high-end authentication system and by evaluating the use of standardized APIs and low-end authentic
APA, Harvard, Vancouver, ISO, and other styles
41

Batie, Robert B. "Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.

Full text
Abstract:
The issue of traditional user authentication methods, such as username/passwords, when accessing information systems, the Internet, and Web-based applications still pose significant vulnerabilities. The problem of user authentication including physical and logical access appears to have limited, if any, coverage in research from the perspective of biometric as ‘something the user knows.’ Previous methods of establishing ones’ identity by using a password, or presenting a token or identification (ID) card are vulnerable to circumvention by misplacement or unauthorized sharing. The need for reli
APA, Harvard, Vancouver, ISO, and other styles
42

Janahi, Yusuf M. A. M. "Factors affecting the adoption of Internet banking in the Kingdom of Bahrain." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15884.

Full text
Abstract:
The emergence of the Internet in business as a marketing tool and as a communication medium is one of the existing challenges for the banking industry. Because of this evolution, the banking industry has adopted Internet banking both for financial transactions and for the provision of information about products and services. Based on the ideas mentioned, this study aimed to examine the factors which may affect the intention to use Internet banking in the Kingdom of Bahrain with the following research objectives to be achieved: first, to identify the factors which affect the intention to use an
APA, Harvard, Vancouver, ISO, and other styles
43

Tambay, Alain Alimou. "Testing Fuzzy Extractors for Face Biometrics: Generating Deep Datasets." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/41429.

Full text
Abstract:
Biometrics can provide alternative methods for security than conventional authentication methods. There has been much research done in the field of biometrics, and efforts have been made to make them more easily usable in practice. The initial application for our work is a proof of concept for a system that would expedite some low-risk travellers’ arrival into the country while preserving the user’s privacy. This thesis focuses on the subset of problems related to the generation of cryptographic keys from noisy data, biometrics in our case. This thesis was built in two parts. In the first,
APA, Harvard, Vancouver, ISO, and other styles
44

Dimitrov, Emanuil. "Fingerprints recognition." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.

Full text
Abstract:
<p>Nowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sampl
APA, Harvard, Vancouver, ISO, and other styles
45

Bin, Mohd Isa Mohd Rizal. "Watermarked face recognition scheme : enhancing the security while maintaining the effectiveness of biometric authentication systems." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/watermarked-face-recognition-scheme(a242609e-ba02-4cca-bfae-3615793fd018).html.

Full text
Abstract:
Biometric authentication systems provide alternative solutions to traditional methods that are based on knowledge (e.g. password) or physical tokens (e.g., smart card). Many studies now focus on getting high accuracy rates for biometric verification. However,with advances in technology, biometric data (e.g. fingerprint, face, iris) can be captured/sniffed, duplicated, modified, and then resubmitted in the same or in other applications that utilize the same biometric features. Watermarking techniques can be used effectively to protect the genuine ownership of biometric data, either to accept or
APA, Harvard, Vancouver, ISO, and other styles
46

Hedberg, David. "Autentisiering av användare i datoriserade miljöer hos SMF - biometri kontra tokens : En jämförelse av två sätt att implementera autentisering av användare." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18816.

Full text
Abstract:
Allt eftersom mer och mer information sparas på datorer så ökar även trycket på att denna information sparas säkert, och att endast behöriga personer kommer åt den.Syftet med arbetet var att se vilka skillnader som finns mellan biometri och tokens, och vilka skillnader som små till medelstora företag borde ta i beaktande när de väljer en autentiseringsmetod. Det förväntade resultatet var då en beskrivning, i form av ett ramverk, över vilka för- och nackdelar som finns med de två metoderna, och således vilken metod som ett enskilt företag som använder ramverket borde använda sig utav.Arbetet ge
APA, Harvard, Vancouver, ISO, and other styles
47

Ribeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.

Full text
Abstract:
Em nossa vida diária, são utilizadas identidades digitais (IDDs) para acessar contas de e-mail, bancos e lojas virtuais, locais restritos, computadores compartilhados, e outros. Garantir que apenas usuários autorizados tenham o acesso permitido é um aspecto fundamental no desenvolvimento destas aplicações. Atualmente, os métodos de controle de acesso simples como senhas ou números de identificação pessoal não devem ser considerados suficientemente seguros, já que um impostor pode conseguir estas informações sem o conhecimento do usuário. Ainda, no caso de utilização de dispositivos físicos com
APA, Harvard, Vancouver, ISO, and other styles
48

Nickel, Claudia [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Christoph [Akademischer Betreuer] Busch. "Accelerometer-based Biometric Gait Recognition for Authentication on Smartphones / Claudia Nickel. Betreuer: Johannes Buchmann ; Christoph Busch." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://d-nb.info/1106116119/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Koppikar, Samir Dilip. "Privacy Preserving EEG-based Authentication Using Perceptual Hashing." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc955127/.

Full text
Abstract:
The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for over a decade. In addition to exhibiting qualities of biometric-based authentication, they are revocable, impossible to mimic, and resistant to coercion attacks. However, EEG signals carry a wealth of information about an individual and can reveal private information about the user. This brings significant privacy issues to EEG-based authentication systems as they have access to raw EEG signals. This thesis proposes
APA, Harvard, Vancouver, ISO, and other styles
50

Alsolami, Eesa. "An examination of keystroke dynamics for continuous user authentication." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/54730/1/Eesa_Alsolami_Thesis.pdf.

Full text
Abstract:
Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric auth
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!