Academic literature on the topic 'Biometric software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Biometric software"
Alam*, Varisha, and Dr Mohammad Arif. "Classification of Large Biometric Data in Database System." International Journal of Innovative Technology and Exploring Engineering 10, no. 10 (August 30, 2021): 1–8. http://dx.doi.org/10.35940/ijitee.d8592.08101021.
Full textNAZAR, AKIF, ISSA TRAORÉ, and AHMED AWAD E. AHMED. "INVERSE BIOMETRICS FOR MOUSE DYNAMICS." International Journal of Pattern Recognition and Artificial Intelligence 22, no. 03 (May 2008): 461–95. http://dx.doi.org/10.1142/s0218001408006363.
Full textMaiorana, Emanuele, Patrizio Campisi, and Alessandro Neri. "Template Protection and Renewability for Dynamic Time Warping Based Biometric Signature Verification." International Journal of Digital Crime and Forensics 1, no. 4 (October 2009): 40–57. http://dx.doi.org/10.4018/jdcf.2009062404.
Full textLI, Peng, Jie TIAN, Xin YANG, Peng SHI, and Yang-Yang ZHANG. "Biometric Template Protection." Journal of Software 20, no. 6 (July 14, 2009): 1553–73. http://dx.doi.org/10.3724/sp.j.1001.2009.03528.
Full textBayly, Duncan, Maurice Castro, Arathi Arakala, Jason Jeffers, and Kathy Horadam. "Fractional biometrics: safeguarding privacy in biometric applications." International Journal of Information Security 9, no. 1 (December 1, 2009): 69–82. http://dx.doi.org/10.1007/s10207-009-0096-z.
Full textPeer, P., Ž. Emeršič, J. Bule, J. Žganec-Gros, and V. Štruc. "Strategies for Exploiting Independent Cloud Implementations of Biometric Experts in Multibiometric Scenarios." Mathematical Problems in Engineering 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/585139.
Full textMing, Anlong, and Huadong Ma. "The Biometrics Grid: A Solution to Biometric Technologies." IEEE Distributed Systems Online 8, no. 9 (September 2007): 1. http://dx.doi.org/10.1109/mdso.2007.4370097.
Full textGu, Datong, Minh Nguyen, and Weiqi Yan. "Cross Models for Twin Recognition." International Journal of Digital Crime and Forensics 8, no. 4 (October 2016): 26–36. http://dx.doi.org/10.4018/ijdcf.2016100103.
Full textKHUWAJA, GULZAR A., and A. N. ABU-REZQ. "DATA ACQUISITION AND RECOGNITION OF FINGERPRINTS WITH LVQ." International Journal of Computational Intelligence and Applications 03, no. 01 (March 2003): 65–88. http://dx.doi.org/10.1142/s1469026803000811.
Full textMilinković, Milorad, Miroslav Minović, and Miloš Milovanović. "Applying Technical Standards to Biometric Systems." International Journal of Decision Support System Technology 8, no. 2 (April 2016): 50–59. http://dx.doi.org/10.4018/ijdsst.2016040104.
Full textDissertations / Theses on the topic "Biometric software"
Varadinov, Petr. "Účel a implementace snímání otisků prstů v osobních počítačích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162689.
Full textRashid, Rasber Dhahir. "Robust steganographic techniques for secure biometric-based remote authentication." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/236/.
Full textMahadevan, Karthikeyan. "Estimating reliability impact of biometric devices in large scale applications." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3096.
Full textTitle from document title page. Document formatted into pages; contains vii, 66 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 62-64).
Mirza-Babaei, Pejman. "Biometric storyboards : a games user research approach for improving qualitative evaluations of player experience." Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/47858/.
Full textMaruniak, Lukáš. "Software pro biometrické rozpoznávání duhovky lidského oka." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-235000.
Full textSucupira, Junior Luiz Humberto Rabelo. "Uma metodologia para avaliação de pacotes de software biometricos." [s.n.], 2004. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259295.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-03T21:35:15Z (GMT). No. of bitstreams: 1 SucupiraJunior_LuizHumbertoRabelo_M.pdf: 4415563 bytes, checksum: 641946f8af8af2fa716eea36bb57c123 (MD5) Previous issue date: 2004
Mestrado
Oliveira, Cristiano Ferreira de. "Golias: software para análises estatística e biométrica de grande conjunto de dados utilizando as linguagens Júlia e R." Universidade Federal de Viçosa, 2018. http://www.locus.ufv.br/handle/123456789/20578.
Full textMade available in DSpace on 2018-07-10T20:14:54Z (GMT). No. of bitstreams: 1 textocompleto.pdf: 660296 bytes, checksum: 3ddfa0bd00c9a41014d5aa9058baa8be (MD5) Previous issue date: 2018-02-21
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
A utilização de informações de marcadores moleculares para identificação de indivíduos geneticamente superiores para características de interesse é uma as principais contribuições da genética molecular no melhoramento genético. Assim, em programas de melhoramento genético, é crescente o uso de marcadores moleculares dispostos em matrizes de alta densidade, que necessitam de controle de qualidade e uso de metodologias adequadas para realizar a predição dos valores genéticos. Diante do exposto este trabalho tem como objetivo apresentar o software Golias, que é um software livre destinado ao processamento de dados de marcadores SNPs de alta dimensão. O Golias é integrado com os ambientes de programação R e Julia, utilizando o poder de processamento da linguagem Júlia e de pacotes do R otimizados em código C. Todas as análises são realizadas sem fazer necessário que o usuário tenha qualquer conhecimento em programação. O software proposto dispõe de procedimentos para o controle de qualidade de SNPs como call rate, MAF, teste de equilíbrio de Hardy-Weinberg, descarte de variáveis via componentes principais, um procedimento para imputação de informações genotípicas perdidas e algumas técnicas de predição utilizando métodos bayesianos. O Golias está disponível em português; pode ser baixado da Internet (https://www.dropbox.com/sh/ql92mzjed8735wq/AADfVadXY3oYM_3qe84Vb N-Ea?dl=0) e é compatível com sistema operacional Windows.
The use of molecular marker information to identify genetically superior individuals for traits of interest is one of the main contributions of genomic selection in breeding. Thus, in genetic breeding programs is increasing the use of molecular markers arranged in high density matrices which require quality control and the use of appropriate methodologies to predict genetic values. The work aims to present the Golias software that is a free software for processing data from high- size SNPs. Golias is integrated with the R and Julia programming environments, using the processing power of the Júlia language and R-optimized C-packets. All analyzes are performed without making it necessary for the user to have any programming knowledge. The proposed software has procedures for quality control of SNPs such as call rate, MAF, Hardy-Weinberg equilibrium test, variables discarding via principal components, a procedure for imputation of lost genotype information and some prediction techniques using Bayesian methods. Golias is available in Portuguese; can be downloaded from the Internet (https://www.dropbox.com/sh/ql92mzjed8735wq/AADfVadXY3oYM_3qe84Vb N-Ea?dl=0) and is compatible with Windows operating system.
Trhoň, Adam. "Vícekamerový snímač biometrických vlastností lidského prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234920.
Full textSellgren, Fredrik, and Isak Kjellhard. "Utrustnings-API : Förbättrad kommunikation med mätplatsutrustning." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39344.
Full textBiometria is a company in the forest industry whose part is to perform im-partial measurements of timber sent between forest and industry, on differ-ent measurement sites. The purpose of this project has been to come up with a better solution for transferring data from different measuring sites to Bio-metrias systems, as well as determine a standardized structure for data sent by measuring equipment. By analyzing how such a solution need to perform and investigate the current system that is used today on measuring sites, a new design has been developed for how the new system can be structured. The new design has been improved based on the functionality needed by a new system. When an improvement of the design is done, the design is im-plemented for the most common type of measuring equipment. In this im-plementation a standardized structure was determined for the most com-mon measuring equipment and validation for data to have said structure was implemented. Different methods of authentication were researched to choose the one that would fit the new system best. Different kinds of tests were performed to verify the security of the system as well as system per-formance during high workload. Performing these tests establish that the new system only allows data of correct structure to be processed, that the chosen method of authentication works as intended and that the system in theory can handle the amount of data being sent from measuring sites. De-spite this, there need more test using real measuring equipment before this solution can be used in production.
Oliveira, Adriana Esmeraldo de. "API de Segurança e Armazenamento de uma Arquitetura Multibiométrica para Controle de Acesso com Autenticação Contínua." Universidade Federal da Paraíba, 2011. http://tede.biblioteca.ufpb.br:8080/handle/tede/6058.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
A biometric system that employs one single biometric characteristic is constrained. This limitation can be reduced by fusing the information presented by multiple sources. A system that consolidates the evidence presented by multiple biometric sources is known as a multibiometric system. In such a context, this work proposes the security and persistence APIs of a multi-biometric architecture, which is capable of using one or more biometric modalities. In access control applications, a user might be forced to authenticate in order to give an unauthorized access to a criminal. As an alternative to this problem, the API uses a continuous authentication process, which verifies if the user identified at the start of the software application is still able to remain on the system, without human interferences or breaks in the process. Much of the literature on biometric system design has focused on system error rates and scaling equations. However, it is also important to have a solid foundation for future progress as the processes and systems architecture for the new biometric application are designed. Hence, the designed architecture made it possible to create a well-defined API for multibiometric systems, which may help developers to standardize, among other things, their data structure, in order to enable and facilitate templates fusion and interoperability. Therefore, the developed security and persistence APIs support a multi-biometric access control architecture. This architecture is extensible, that is, capable of easily comprising new biometric characteristics and processes, yet making it possible to use a template security mechanism. The APIs were designed and implemented. They were demonstrated by a prototype application, through which it was possible to conduct the test experiments.
Um sistema biométrico que empregue uma única peculiaridade ou traço característico é restrito. Esta limitação pode ser suavizada pela fusão dos dados apresentados por múltiplas fontes. Um sistema que consolida a evidência apresentada por múltiplas fontes biométricas é conhecido como um sistema multibiométrico. Nesse contexto, este trabalho propõe a interface de aplicação (API) de segurança e armazenamento de uma arquitetura multibiométrica, com habilidade de empregar uma ou mais modalidades biométricas. Em aplicações de controle de acesso, um usuário pode ser coagido a se autenticar para permitir um acesso indevido. Como alternativa para este problema, a API utiliza um processo de autenticação contínua, que verifica se o usuário que se identificou no início de uma aplicação de software ainda está apto a continuar no sistema, sem interferências humanas ou paralisações do processo. Grande parte da literatura sobre projeto de sistemas biométricos tem o foco nas taxas de erro do sistema e na simplificação de equações. No entanto, também é importante que se tenha uma base sólida para progressos futuros no momento em que os processos e a arquitetura da nova aplicação biométrica estiverem sendo projetados. Neste sentido, a arquitetura projetada permitiu a construção de uma API bem definida para sistemas multibiométricos, que deverá auxiliar os desenvolvedores a padronizar, entre outras coisas, sua estrutura de dados, de forma a possibilitar e facilitar a fusão de modelos biométricos e a interoperabilidade. Deste modo, a API de segurança e armazenamento desenvolvida suporta uma arquitetura multibiométrica de controle de acesso para autenticação contínua extensível, isto é, capaz de receber novas características e processos biométricos com facilidade, permitindo, ainda, o uso de um mecanismo de segurança de templates biométricos. A API foi projetada e implementada. Sua demonstração foi feita através de uma aplicação protótipo, por meio da qual foi possível realizar os testes.
Books on the topic "Biometric software"
Zheng, Wei-Shi. Biometric Recognition: 7th Chinese Conference, CCBR 2012, Guangzhou, China, December 4-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textDavid, Hutchison. Image and Signal Processing: 3rd International Conference, ICISP 2008 Cherbourg-Octeville, France, July 1-3, 2008 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textRachel, Bowers, Fiscus Jonathan G, and SpringerLink (Online service), eds. Multimodal Technologies for Perception of Humans: International Evaluation Workshops CLEAR 2007 and RT 2007, Baltimore, MD, USA, May 8-11, 2007, Revised Selected Papers. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textZha, Hongbin. Computer Vision – ACCV 2009: 9th Asian Conference on Computer Vision, Xi’an, September 23-27, 2009, Revised Selected Papers, Part II. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textDaniilidis, Kostas. Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part I. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textDaniilidis, Kostas. Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textDaniilidis, Kostas. Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part III. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textKumar, Ajay. Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textDaniilidis, Kostas. Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part II. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textZha, Hongbin. Computer Vision – ACCV 2009: 9th Asian Conference on Computer Vision, Xi’an, September 23-27, 2009, Revised Selected Papers, Part I. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textBook chapters on the topic "Biometric software"
Fagerholm, Fabian, and Thomas Fritz. "Biometric Measurement in Software Engineering." In Contemporary Empirical Methods in Software Engineering, 151–72. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-32489-6_6.
Full textVugt, Marieke van. "Using Biometric Sensors to Measure Productivity." In Rethinking Productivity in Software Engineering, 159–67. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4221-6_14.
Full textZambrano-Vega, Cristian, Byron Oviedo, Jorge Chiquito Mindiola, Jacob Reyes Baque, and Oscar Moncayo Carreño. "Mobile Biometric Authentication by Face Recognition for Attendance Management Software." In Communications in Computer and Information Science, 521–30. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05532-5_39.
Full textSchimek, Michael G. "Non-parametric regression techniques for biometric problems: Concepts and software." In Medical Informatics Europe 1991, 562–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/978-3-642-93503-9_99.
Full textStelovsky, Jan. "Highly Configurable Software Architecture Framework for Acquisition and Visualization of Biometric Data." In Foundations of Augmented Cognition, 176–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73216-7_20.
Full textAlhussain, Thamer, and Steve Drew. "Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia." In Software Services for e-Business and e-Society, 26–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04280-5_3.
Full textSchuckers, Stephanie A. C. "Anti-spoofing, Fingerprint (Hardware and Software)." In Encyclopedia of Biometrics, 72–79. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_68.
Full textSchuckers, Stephanie A. C. "Anti-spoofing: Fingerprint (hardware and software)." In Encyclopedia of Biometrics, 1–9. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_68-3.
Full textSan, Cho Cho, and Mie Mie Su Thwin. "Proposed Effective Feature Extraction and Selection for Malicious Software Classification." In Advances in Biometrics, 51–71. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30436-2_3.
Full textVenkataraman, Sitalakshmi, and Siddhivinayak Kulkarni. "Risk-Based Neuro-Grid Architecture for Multimodal Biometrics." In Innovations in Computing Sciences and Software Engineering, 51–56. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9112-3_9.
Full textConference papers on the topic "Biometric software"
Holz, Christian, and Marius Knaust. "Biometric Touch Sensing." In UIST '15: The 28th Annual ACM Symposium on User Interface Software and Technology. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2807442.2807458.
Full textHolland, Corey D., and Oleg V. Komogortsev. "Software framework for an ocular biometric system." In ETRA '14: Eye Tracking Research and Applications. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2578153.2582174.
Full textZhao, Weizhou. "Fuzzy Comparison Scheme in Biometric Template Matching." In 2009 WRI World Congress on Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/wcse.2009.406.
Full textMuller, Sebastian C. "Measuring Software Developers' Perceived Difficulty with Biometric Sensors." In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE). IEEE, 2015. http://dx.doi.org/10.1109/icse.2015.284.
Full textLiviu, Serbanescu, and Iosif Doru. "Biometric data software representation in distributed computing architectures." In 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2015. http://dx.doi.org/10.1109/ecai.2015.7301237.
Full textFritz, Thomas, and Sebastian C. Muller. "Leveraging Biometric Data to Boost Software Developer Productivity." In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 2016. http://dx.doi.org/10.1109/saner.2016.107.
Full textLiu-Jimenez, Judith, Oscar Miguel-Hurtado, Almudena Lindoso, and Belen Fernandez-Saavedra. "Hardware/Software Codesign for an Iris Biometric Search Engine." In EUROCON 2007 - The International Conference on "Computer as a Tool". IEEE, 2007. http://dx.doi.org/10.1109/eurcon.2007.4400454.
Full textYang, Jingjie. "Design of Biometric Recognition Software Based on Image Processing." In 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 2018. http://dx.doi.org/10.1109/icitbs.2018.00170.
Full textJin, Zhe, Kong Yik Chee, and Xin Xia. "What Do Developers Discuss about Biometric APIs?" In 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2019. http://dx.doi.org/10.1109/icsme.2019.00053.
Full textAshraf, Shahzad, Sehrish Saleem, Tauqeer Ahmed, Zeeshan Aslam, and Muhammad Shuaeeb. "Iris and Foot based Sustainable Biometric Identification Approach." In 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2020. http://dx.doi.org/10.23919/softcom50211.2020.9238333.
Full textReports on the topic "Biometric software"
Watson, Craig I., Michael D. Garris, Elham Tabassi, Charles L. Wilson, R. Michael McCabe, Stanley Janet, and Kenneth Ko. User's guide to NIST biometric image software (NBIS). Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7392.
Full textMarshall, Karen, Ross J. Michaels, Kevin Mangold, and Kayee Kwong. Incorporating biometric software development kits into the development process. National Institute of Standards and Technology, April 2013. http://dx.doi.org/10.6028/nist.ir.7929.
Full textMarshall, Karen, Ross J. Michaels, Kevin Mangold, and Kayee Kwong. Incorporating Biometric Software Development Kits into the Development Process. National Institute of Standards and Technology, July 2014. http://dx.doi.org/10.6028/nist.ir.7929r1.
Full textWatson, Craig I., Michael D. Garris, Elham Tabassi, Charles L. Wilson, R. Michael McCabe, Stanley Janet, and Kenneth Ko. User's guide to export controlled distribution of NIST biometric image software (NBIS-EC). Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7391.
Full text