Academic literature on the topic 'Biometric software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometric software"

1

Alam*, Varisha, and Dr Mohammad Arif. "Classification of Large Biometric Data in Database System." International Journal of Innovative Technology and Exploring Engineering 10, no. 10 (August 30, 2021): 1–8. http://dx.doi.org/10.35940/ijitee.d8592.08101021.

Full text
Abstract:
"Biometrics" is got from the Greek word 'life' and 'measure' which implies living and evaluation take apart. It simply converts into "life estimation". Biometrics uses computerized acknowledgment of people, dependent on their social and natural attributes. Biometric character are data separated from biometric tests, which can use for examination with a biometric orientation. Biometrics involves techniques to unusually recognize people dependent on at least one inherent physical or behavior attribute. In software engineering, specifically, biometric is used as a form of character retrieve the Committee and retrieve command. Biometric identically utilized to recognize people in bunches that are in observation. Biometric has quickly risen like a auspicious innovation for validation and has effectively discovered a spot in most of the scientific safety regions. An effective bunching method suggest for dividing enormous biometrics data set through recognizable proof. This method depends on the changed B+ tree is decreasing the discs get to. It diminishes the information recovery time and also possible error rates. Hence, for bigger applications, the need to reduce the data set to a more adequate portion emerges to accomplish both higher paces and further developed precision. The main motivation behind ordering is to recover a small data set for looking through the inquiry
APA, Harvard, Vancouver, ISO, and other styles
2

NAZAR, AKIF, ISSA TRAORÉ, and AHMED AWAD E. AHMED. "INVERSE BIOMETRICS FOR MOUSE DYNAMICS." International Journal of Pattern Recognition and Artificial Intelligence 22, no. 03 (May 2008): 461–95. http://dx.doi.org/10.1142/s0218001408006363.

Full text
Abstract:
Various techniques have been proposed in different literature to analyze biometric samples collected from individuals. However, not a lot of attention has been paid to the inverse problem, which consists of synthesizing artificial biometric samples that can be used for testing existing biometric systems or protecting them against forgeries. In this paper, we present a framework for mouse dynamics biometrics synthesis. Mouse dynamics biometric is a behavioral biometric technology, which allows user recognition based on the actions received from the mouse input device while interacting with a graphical user interface. The proposed inverse biometric model learns from random raw samples collected from real users and then creates synthetic mouse actions for fake users. The generated mouse actions have unique behavioral properties separate from the real mouse actions. This is shown through various comparisons of behavioral metrics as well as a Kolmogorov–Smirnov test. We also show through a two-fold cross-validation test that by submitting sample synthetic data to an existing mouse biometrics analysis model we achieve comparable performance results as when the model is applied to real mouse data.
APA, Harvard, Vancouver, ISO, and other styles
3

Maiorana, Emanuele, Patrizio Campisi, and Alessandro Neri. "Template Protection and Renewability for Dynamic Time Warping Based Biometric Signature Verification." International Journal of Digital Crime and Forensics 1, no. 4 (October 2009): 40–57. http://dx.doi.org/10.4018/jdcf.2009062404.

Full text
Abstract:
In this article, the authors propose a protected on-line signature based biometric authentication system, where the original signature templates are protected by transforming them in a non-invertible way. Recovering the original biometrics from the stored data is thus computationally as hard as random guessing them. The transformed templates are compared employing a Dynamic Time Warping (DTW) matching strategy. The reported experimental results, evaluated on the public MCYT signature database, show that the achievable recognition rates are only slightly affected by the proposed protection scheme, which is able to guarantee the desired security and renewability for the considered biometrics.
APA, Harvard, Vancouver, ISO, and other styles
4

LI, Peng, Jie TIAN, Xin YANG, Peng SHI, and Yang-Yang ZHANG. "Biometric Template Protection." Journal of Software 20, no. 6 (July 14, 2009): 1553–73. http://dx.doi.org/10.3724/sp.j.1001.2009.03528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bayly, Duncan, Maurice Castro, Arathi Arakala, Jason Jeffers, and Kathy Horadam. "Fractional biometrics: safeguarding privacy in biometric applications." International Journal of Information Security 9, no. 1 (December 1, 2009): 69–82. http://dx.doi.org/10.1007/s10207-009-0096-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Peer, P., Ž. Emeršič, J. Bule, J. Žganec-Gros, and V. Štruc. "Strategies for Exploiting Independent Cloud Implementations of Biometric Experts in Multibiometric Scenarios." Mathematical Problems in Engineering 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/585139.

Full text
Abstract:
Cloud computing represents one of the fastest growing areas of technology and offers a new computing model for various applications and services. This model is particularly interesting for the area of biometric recognition, where scalability, processing power, and storage requirements are becoming a bigger and bigger issue with each new generation of recognition technology. Next to the availability of computing resources, another important aspect of cloud computing with respect to biometrics is accessibility. Since biometric cloud services are easily accessible, it is possible to combine different existing implementations and design new multibiometric services that next to almost unlimited resources also offer superior recognition performance and, consequently, ensure improved security to its client applications. Unfortunately, the literature on the best strategies of how to combine existing implementations of cloud-based biometric experts into a multibiometric service is virtually nonexistent. In this paper, we try to close this gap and evaluate different strategies for combining existing biometric experts into a multibiometric cloud service. We analyze the (fusion) strategies from different perspectives such as performance gains, training complexity, or resource consumption and present results and findings important to software developers and other researchers working in the areas of biometrics and cloud computing. The analysis is conducted based on two biometric cloud services, which are also presented in the paper.
APA, Harvard, Vancouver, ISO, and other styles
7

Ming, Anlong, and Huadong Ma. "The Biometrics Grid: A Solution to Biometric Technologies." IEEE Distributed Systems Online 8, no. 9 (September 2007): 1. http://dx.doi.org/10.1109/mdso.2007.4370097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gu, Datong, Minh Nguyen, and Weiqi Yan. "Cross Models for Twin Recognition." International Journal of Digital Crime and Forensics 8, no. 4 (October 2016): 26–36. http://dx.doi.org/10.4018/ijdcf.2016100103.

Full text
Abstract:
Nowadays, Biometrics has become a popular tool in personal identification as it can use physiological or behavioral characteristics to identify individuals. Recent advances in information technology has increased the accuracy of biometric to another level, there is still a slew of problems existed, such as complex environment, aging and unique problems. Among many classes of identifications, recognizing twins is one of the most difficult tasks as they resemble each other. This affects the use of biometrics in general cases and raises potential risks of biometrics in access control. In this paper, the authors manage to distinguish twins using four different models, namely, face recognition, ear recognition, voice recognition and lip movement recognition. Their results show that voice recognition has the best performance in twin recognition with 100% accuracy. This is much higher than that of face recognition and ear recognition (with 58% and 53% respectively); and lip movement recognition that yields 76% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
9

KHUWAJA, GULZAR A., and A. N. ABU-REZQ. "DATA ACQUISITION AND RECOGNITION OF FINGERPRINTS WITH LVQ." International Journal of Computational Intelligence and Applications 03, no. 01 (March 2003): 65–88. http://dx.doi.org/10.1142/s1469026803000811.

Full text
Abstract:
A typical biometric system has three distinct phases. These are biometric data acquisition, feature extraction, and decision-making. The first step, the acquisition phase, is extremely important. If high quality images are not obtained, the next phase cannot operate reliably. Fingerprint recognition remains as one of the most prominent biometric identification methods. In this paper, we develop a prototype optical-based fingerprints data acquisition system using a CCD digital still camera to capture a complete impression of finger area required for accurately identifying an individual and present an image-based approach for online fingerprint recognition with the objective to increase the overall matching performance. The fingerprint images are matched based on features extracted with an adaptive learning vector quantization (LVQ) neural network to yield peak recognition of 98.6% for a random set of 300 test prints (100 fingers × 3 images). This system can be adopted as a multi-modal biometrics where two or more fingers are matched.
APA, Harvard, Vancouver, ISO, and other styles
10

Milinković, Milorad, Miroslav Minović, and Miloš Milovanović. "Applying Technical Standards to Biometric Systems." International Journal of Decision Support System Technology 8, no. 2 (April 2016): 50–59. http://dx.doi.org/10.4018/ijdsst.2016040104.

Full text
Abstract:
Nowadays, the development and the application of biometric systems on one hand, and the large number of hardware and software manufacturers on the other, caused two the most common problems of biometric systems: a problem of interoperability between system's components as well as between different biometric systems and a problem of biometric data security and privacy protection, both in storage and exchange. Specifications and standards, such as BioAPI and CBEFF, registered and published as multiple standards by ISO (International Organization for Standardization), propose the establishment of single platform (BioAPI) to facilitate the functioning of the biometric systems regardless of hardware or software manufacturers, and unique format for data exchange (CBEFF) to secure biometric data. In this paper, these standards are analyzed in detail and considered as possible solutions to aforementioned problems.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Biometric software"

1

Varadinov, Petr. "Účel a implementace snímání otisků prstů v osobních počítačích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162689.

Full text
Abstract:
This diploma thesis deals with fingerprint recognition applied in personal computers. The topic is analyzed both chronologically in historical context and in connection with other biometric methods. The thesis provides a comprehensive survey of the topic. It starts with physical layer, goes through hardware parts and ends with software architecture. A special attention is paid to programming fingerprint recognition support into end-user applications. These are the aims of the thesis: to place the silicon fingerprint sensing technology into the historical context and describe its evolution in connection with personal computers till the present times, to provide the results of market research of fingerprint sensors used in personal computers, to work out the summary of the functions the end-users have at their disposal, to present the market research results of fingerprint software, to work out the overview and the comparison of available software development kits (SDKs) and that of application programming interfaces (APIs) used for the described fingerprint sensor devices, and last but not least to develop a demonstration application that communicates with a fingerprint sensor device. Technical literature, market researches together with my own experience from the work in this field were used so as to meet the set aims. As for the demo application of this technology it is my own innovative approach. The thesis is divided into seven chapters where Chapter II -- Chapter VI directly deal with the mentioned topics. The completion of a missing angle of approach to the subject from end-users' and application programmers' perspective is the main asset of this thesis. The work also allows orientation on the silicon fingerprint sensor market and fingerprint software market. Moreover it shows possibilities how to extend this technology, it provides a detailed analysis of the software layer and presents programming samples showing that show how to use this technology. The demo application allowing audio volume control by a fingerprint device is an innovation in the branch of computer input devices.
APA, Harvard, Vancouver, ISO, and other styles
2

Rashid, Rasber Dhahir. "Robust steganographic techniques for secure biometric-based remote authentication." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/236/.

Full text
Abstract:
Biometrics are widely accepted as the most reliable proof of identity, entitlement to services, and for crime-related forensics. Using biometrics for remote authentication is becoming an essential requirement for the development of knowledge-based economy in the digital age. Ensuring security and integrity of the biometric data or templates is critical to the success of deployment especially because once the data compromised the whole authentication system is compromised with serious consequences for identity theft, fraud as well as loss of privacy. Protecting biometric data whether stored in databases or transmitted over an open network channel is a serious challenge and cryptography may not be the answer. The main premise of this thesis is that Digital Steganography can provide an alternative security solutions that can be exploited to deal with the biometric transmission problem. The main objective of the thesis is to design, develop and test steganographic tools to support remote biometric authentication. We focus on investigating the selection of biometrics feature representations suitable for hiding in natural cover images and designing steganography systems that are specific for hiding such biometric data rather than being suitable for general purpose. The embedding schemes are expected to have high security characteristics resistant to several types of steganalysis tools and maintain accuracy of recognition post embedding. We shall limit our investigations to embedding face biometrics, but the same challenges and approaches should help in developing similar embedding schemes for other biometrics. To achieve this our investigations and proposals are done in different directions which explain in the rest of this section. Reviewing the literature on the state-of-art in steganography has revealed a rich source of theoretical work and creative approaches that have helped generate a variety of embedding schemes as well as steganalysis tools but almost all focused on embedding random looking secrets. The review greatly helped in identifying the main challenges in the field and the main criteria for success in terms of difficult to reconcile requirements on embedding capacity, efficiency of embedding, robustness against steganalysis attacks, and stego image quality. On the biometrics front the review revealed another rich source of different face biometric feature vectors. The review helped shaping our primary objectives as (1) identifying a binarised face feature factor with high discriminating power that is susceptible to embedding in images, (2) develop a special purpose content-based steganography schemes that can benefit from the well-defined structure of the face biometric data in the embedding procedure while preserving accuracy without leaking information about the source biometric data, and (3) conduct sufficient sets of experiments to test the performance of the developed schemes, highlight the advantages as well as limitations, if any, of the developed system with regards to the above mentioned criteria. We argue that the well-known LBP histogram face biometric scheme satisfies the desired properties and we demonstrate that our new more efficient wavelet based versions called LBPH patterns is much more compact and has improved accuracy. In fact the wavelet version schemes reduce the number of features by 22% to 72% of the original version of LBP scheme guaranteeing better invisibility post embedding. We shall then develop 2 steganographic schemes. The first is the LSB-witness is a general purpose scheme that avoids changing the LSB-plane guaranteeing robustness against targeted steganalysis tools, but establish the viability of using steganography for remote biometric-based recognition. However, it may modify the 2nd LSB of cover pixels as a witness for the presence of the secret bits in the 1st LSB and thereby has some disadvantages with regards to the stego image quality. Our search for a new scheme that exploits the structure of the secret face LBPH patterns for improved stego image quality has led to the development of the first content-based steganography scheme. Embedding is guided by searching for similarities between the LBPH patterns and the structure of the cover image LSB bit-planes partitioned into 8-bit or 4-bit patterns. We shall demonstrate the excellent benefits of using content-based embedding scheme in terms of improved stego image quality, greatly reduced payload, reduced lower bound on optimal embedding efficiency, robustness against all targeted steganalysis tools. Unfortunately our scheme was not robust against the blind or universal SRM steganalysis tool. However we demonstrated robustness against SRM at low payload when our scheme was modified by restricting embedding to edge and textured pixels. The low payload in this case is sufficient to embed a secret full face LBPH patterns. Our work opens new exciting opportunities to build successful real applications of content-based steganography and presents plenty of research challenges.
APA, Harvard, Vancouver, ISO, and other styles
3

Mahadevan, Karthikeyan. "Estimating reliability impact of biometric devices in large scale applications." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3096.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2003.
Title from document title page. Document formatted into pages; contains vii, 66 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 62-64).
APA, Harvard, Vancouver, ISO, and other styles
4

Mirza-Babaei, Pejman. "Biometric storyboards : a games user research approach for improving qualitative evaluations of player experience." Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/47858/.

Full text
Abstract:
Developing video games is an iterative and demanding process. It is difficult to achieve the goal of most video games — to be enjoyable, engaging and to create revenue for game developers — because of many hard-to-evaluate factors, such as the different ways players can interact with the game. Understanding how players behave during gameplay is of vital importance to developers and can be uncovered in user tests as part of game development. This can help developers to identify and resolve any potential problem areas before release, leading to a better player experience and possibly higher game review scores and sales. However, traditional user testing methods were developed for function and efficiency oriented applications. Hence, many traditional user testing methods cannot be applied in the same way for video game evaluation. This thesis presents an investigation into the contributions of physiological measurements in user testing within games user research (GUR). GUR specifically studies the interaction between a game and users (players) with the aim to provide feedback for developers to help them to optimise the game design of their title. An evaluation technique called Biometric Storyboards is developed, which visualises the relationships between game events, player feedback and changes in a player's physiological state. Biometric Storyboards contributes to the field of human-computer interaction and GUR in three important areas: (1) visualising mixedmeasures of player experience, (2) deconstructing game design by analysing game events and pace, (3) incremental improvement of classic user research techniques (such as interviews and physiological measurements). These contributions are described in practical case studies, interviews with game developers and laboratory experiments. The results show this evaluation approach can enable games user researchers to increase the plausibility and persuasiveness of their reports and facilitate developers to better deliver their design goals. Biometric Storyboards is not aimed at replacing existing methods, but to extend them with mixed methods visualisations, to provide powerful tools for games user researchers and developers to better understand and communicate player needs, interactions and experiences. The contributions of this thesis are directly applicable for user researchers and game developers, as well as for researchers in user experience evaluation in entertainment systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Maruniak, Lukáš. "Software pro biometrické rozpoznávání duhovky lidského oka." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-235000.

Full text
Abstract:
In my thesis, I focus on the task of recognizing human iris from an image.In the beginning, the work deals with a question of biometrics, its importance and basic concepts, which are necessary for use in following text. Subsequently process of human Iris detection is described together with theory of evolution algorithms. In the implementation part, is described the design of implemented solution, which uses evolution algorithms, where is emphasis on correct pupil and iris boundary detection.
APA, Harvard, Vancouver, ISO, and other styles
6

Sucupira, Junior Luiz Humberto Rabelo. "Uma metodologia para avaliação de pacotes de software biometricos." [s.n.], 2004. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259295.

Full text
Abstract:
Orientadores: Lee Luan Ling, Miguel Gustavo Lizarraga
Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-03T21:35:15Z (GMT). No. of bitstreams: 1 SucupiraJunior_LuizHumbertoRabelo_M.pdf: 4415563 bytes, checksum: 641946f8af8af2fa716eea36bb57c123 (MD5) Previous issue date: 2004
Mestrado
APA, Harvard, Vancouver, ISO, and other styles
7

Oliveira, Cristiano Ferreira de. "Golias: software para análises estatística e biométrica de grande conjunto de dados utilizando as linguagens Júlia e R." Universidade Federal de Viçosa, 2018. http://www.locus.ufv.br/handle/123456789/20578.

Full text
Abstract:
Submitted by Nathália Faria da Silva (nathaliafsilva.ufv@gmail.com) on 2018-07-10T20:14:54Z No. of bitstreams: 1 textocompleto.pdf: 660296 bytes, checksum: 3ddfa0bd00c9a41014d5aa9058baa8be (MD5)
Made available in DSpace on 2018-07-10T20:14:54Z (GMT). No. of bitstreams: 1 textocompleto.pdf: 660296 bytes, checksum: 3ddfa0bd00c9a41014d5aa9058baa8be (MD5) Previous issue date: 2018-02-21
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
A utilização de informações de marcadores moleculares para identificação de indivíduos geneticamente superiores para características de interesse é uma as principais contribuições da genética molecular no melhoramento genético. Assim, em programas de melhoramento genético, é crescente o uso de marcadores moleculares dispostos em matrizes de alta densidade, que necessitam de controle de qualidade e uso de metodologias adequadas para realizar a predição dos valores genéticos. Diante do exposto este trabalho tem como objetivo apresentar o software Golias, que é um software livre destinado ao processamento de dados de marcadores SNPs de alta dimensão. O Golias é integrado com os ambientes de programação R e Julia, utilizando o poder de processamento da linguagem Júlia e de pacotes do R otimizados em código C. Todas as análises são realizadas sem fazer necessário que o usuário tenha qualquer conhecimento em programação. O software proposto dispõe de procedimentos para o controle de qualidade de SNPs como call rate, MAF, teste de equilíbrio de Hardy-Weinberg, descarte de variáveis via componentes principais, um procedimento para imputação de informações genotípicas perdidas e algumas técnicas de predição utilizando métodos bayesianos. O Golias está disponível em português; pode ser baixado da Internet (https://www.dropbox.com/sh/ql92mzjed8735wq/AADfVadXY3oYM_3qe84Vb N-Ea?dl=0) e é compatível com sistema operacional Windows.
The use of molecular marker information to identify genetically superior individuals for traits of interest is one of the main contributions of genomic selection in breeding. Thus, in genetic breeding programs is increasing the use of molecular markers arranged in high density matrices which require quality control and the use of appropriate methodologies to predict genetic values. The work aims to present the Golias software that is a free software for processing data from high- size SNPs. Golias is integrated with the R and Julia programming environments, using the processing power of the Júlia language and R-optimized C-packets. All analyzes are performed without making it necessary for the user to have any programming knowledge. The proposed software has procedures for quality control of SNPs such as call rate, MAF, Hardy-Weinberg equilibrium test, variables discarding via principal components, a procedure for imputation of lost genotype information and some prediction techniques using Bayesian methods. Golias is available in Portuguese; can be downloaded from the Internet (https://www.dropbox.com/sh/ql92mzjed8735wq/AADfVadXY3oYM_3qe84Vb N-Ea?dl=0) and is compatible with Windows operating system.
APA, Harvard, Vancouver, ISO, and other styles
8

Trhoň, Adam. "Vícekamerový snímač biometrických vlastností lidského prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234920.

Full text
Abstract:
This thesis describes a conceptual design of touchless fingerprint sensor and design, implementation and testing of its firmware, which is a composition of hardware implemented in VHDL and a program implemented in C. Result of this thesis can be used as the first step of building an industrial solution.
APA, Harvard, Vancouver, ISO, and other styles
9

Sellgren, Fredrik, and Isak Kjellhard. "Utrustnings-API : Förbättrad kommunikation med mätplatsutrustning." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39344.

Full text
Abstract:
Biometria är ett företag som arbetar inom skogsnäring med att utföra opartiska mätningar av virke som skickas mellan skog och industri, på olika mätplatser. Syftet med projektet har varit att komma fram till en förbättrad lösning för att transportera data från olika mätplatser till Biometrias system, samt bestämma en standardstruktur för den data som skickas. Genom att analysera vad en sådan lösning behöver kunna utföra och undersöka det nuvarande system som används på mätplatser, har det skapats en design för hur det nya systemet kan se ut. Denna design har sedan förbättrats utifrån den funktionalitet som krävs av ett nytt system. Därefter implementerades denna design för den mest förekommande typen av mätverktyg. I denna implementation bestämdes en struktur för hur data ska se ut för den mest förekommande typen av mätverktyg och införde validering för att data som skickas måste se ut på detta sätt. Det har undersökts olika typer av autentisering för att komma fram till vilken typ som passar det nya systemet bäst. Olika tester har utförts, som kontrollerar det nya systemets säkerhet och hur systemet presterar under belastning. Utifrån dessa tester har det konstaterats att enbart data med korrekt struktur godkänns och behandlas av det nya systemet, att den valda lösningen för autentisering fungerar som tänkt och att systemet i teorin klarar av att hantera den mängd data som skickas från olika mätplatser. Det krävs dock ytterligare tester med verkliga mätverktyg innan denna lösning kan sättas i bruk.
Biometria is a company in the forest industry whose part is to perform im-partial measurements of timber sent between forest and industry, on differ-ent measurement sites. The purpose of this project has been to come up with a better solution for transferring data from different measuring sites to Bio-metrias systems, as well as determine a standardized structure for data sent by measuring equipment. By analyzing how such a solution need to perform and investigate the current system that is used today on measuring sites, a new design has been developed for how the new system can be structured. The new design has been improved based on the functionality needed by a new system. When an improvement of the design is done, the design is im-plemented for the most common type of measuring equipment. In this im-plementation a standardized structure was determined for the most com-mon measuring equipment and validation for data to have said structure was implemented. Different methods of authentication were researched to choose the one that would fit the new system best. Different kinds of tests were performed to verify the security of the system as well as system per-formance during high workload. Performing these tests establish that the new system only allows data of correct structure to be processed, that the chosen method of authentication works as intended and that the system in theory can handle the amount of data being sent from measuring sites. De-spite this, there need more test using real measuring equipment before this solution can be used in production.
APA, Harvard, Vancouver, ISO, and other styles
10

Oliveira, Adriana Esmeraldo de. "API de Segurança e Armazenamento de uma Arquitetura Multibiométrica para Controle de Acesso com Autenticação Contínua." Universidade Federal da Paraí­ba, 2011. http://tede.biblioteca.ufpb.br:8080/handle/tede/6058.

Full text
Abstract:
Made available in DSpace on 2015-05-14T12:36:30Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 4594295 bytes, checksum: bd4f4df655903b796eb6cf79a5060ded (MD5) Previous issue date: 2011-09-16
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
A biometric system that employs one single biometric characteristic is constrained. This limitation can be reduced by fusing the information presented by multiple sources. A system that consolidates the evidence presented by multiple biometric sources is known as a multibiometric system. In such a context, this work proposes the security and persistence APIs of a multi-biometric architecture, which is capable of using one or more biometric modalities. In access control applications, a user might be forced to authenticate in order to give an unauthorized access to a criminal. As an alternative to this problem, the API uses a continuous authentication process, which verifies if the user identified at the start of the software application is still able to remain on the system, without human interferences or breaks in the process. Much of the literature on biometric system design has focused on system error rates and scaling equations. However, it is also important to have a solid foundation for future progress as the processes and systems architecture for the new biometric application are designed. Hence, the designed architecture made it possible to create a well-defined API for multibiometric systems, which may help developers to standardize, among other things, their data structure, in order to enable and facilitate templates fusion and interoperability. Therefore, the developed security and persistence APIs support a multi-biometric access control architecture. This architecture is extensible, that is, capable of easily comprising new biometric characteristics and processes, yet making it possible to use a template security mechanism. The APIs were designed and implemented. They were demonstrated by a prototype application, through which it was possible to conduct the test experiments.
Um sistema biométrico que empregue uma única peculiaridade ou traço característico é restrito. Esta limitação pode ser suavizada pela fusão dos dados apresentados por múltiplas fontes. Um sistema que consolida a evidência apresentada por múltiplas fontes biométricas é conhecido como um sistema multibiométrico. Nesse contexto, este trabalho propõe a interface de aplicação (API) de segurança e armazenamento de uma arquitetura multibiométrica, com habilidade de empregar uma ou mais modalidades biométricas. Em aplicações de controle de acesso, um usuário pode ser coagido a se autenticar para permitir um acesso indevido. Como alternativa para este problema, a API utiliza um processo de autenticação contínua, que verifica se o usuário que se identificou no início de uma aplicação de software ainda está apto a continuar no sistema, sem interferências humanas ou paralisações do processo. Grande parte da literatura sobre projeto de sistemas biométricos tem o foco nas taxas de erro do sistema e na simplificação de equações. No entanto, também é importante que se tenha uma base sólida para progressos futuros no momento em que os processos e a arquitetura da nova aplicação biométrica estiverem sendo projetados. Neste sentido, a arquitetura projetada permitiu a construção de uma API bem definida para sistemas multibiométricos, que deverá auxiliar os desenvolvedores a padronizar, entre outras coisas, sua estrutura de dados, de forma a possibilitar e facilitar a fusão de modelos biométricos e a interoperabilidade. Deste modo, a API de segurança e armazenamento desenvolvida suporta uma arquitetura multibiométrica de controle de acesso para autenticação contínua extensível, isto é, capaz de receber novas características e processos biométricos com facilidade, permitindo, ainda, o uso de um mecanismo de segurança de templates biométricos. A API foi projetada e implementada. Sua demonstração foi feita através de uma aplicação protótipo, por meio da qual foi possível realizar os testes.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Biometric software"

1

Zheng, Wei-Shi. Biometric Recognition: 7th Chinese Conference, CCBR 2012, Guangzhou, China, December 4-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

David, Hutchison. Image and Signal Processing: 3rd International Conference, ICISP 2008 Cherbourg-Octeville, France, July 1-3, 2008 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rachel, Bowers, Fiscus Jonathan G, and SpringerLink (Online service), eds. Multimodal Technologies for Perception of Humans: International Evaluation Workshops CLEAR 2007 and RT 2007, Baltimore, MD, USA, May 8-11, 2007, Revised Selected Papers. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zha, Hongbin. Computer Vision – ACCV 2009: 9th Asian Conference on Computer Vision, Xi’an, September 23-27, 2009, Revised Selected Papers, Part II. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Daniilidis, Kostas. Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part I. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Daniilidis, Kostas. Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Daniilidis, Kostas. Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part III. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Ajay. Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Daniilidis, Kostas. Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part II. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zha, Hongbin. Computer Vision – ACCV 2009: 9th Asian Conference on Computer Vision, Xi’an, September 23-27, 2009, Revised Selected Papers, Part I. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Biometric software"

1

Fagerholm, Fabian, and Thomas Fritz. "Biometric Measurement in Software Engineering." In Contemporary Empirical Methods in Software Engineering, 151–72. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-32489-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vugt, Marieke van. "Using Biometric Sensors to Measure Productivity." In Rethinking Productivity in Software Engineering, 159–67. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4221-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zambrano-Vega, Cristian, Byron Oviedo, Jorge Chiquito Mindiola, Jacob Reyes Baque, and Oscar Moncayo Carreño. "Mobile Biometric Authentication by Face Recognition for Attendance Management Software." In Communications in Computer and Information Science, 521–30. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05532-5_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schimek, Michael G. "Non-parametric regression techniques for biometric problems: Concepts and software." In Medical Informatics Europe 1991, 562–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/978-3-642-93503-9_99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stelovsky, Jan. "Highly Configurable Software Architecture Framework for Acquisition and Visualization of Biometric Data." In Foundations of Augmented Cognition, 176–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73216-7_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alhussain, Thamer, and Steve Drew. "Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia." In Software Services for e-Business and e-Society, 26–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04280-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schuckers, Stephanie A. C. "Anti-spoofing, Fingerprint (Hardware and Software)." In Encyclopedia of Biometrics, 72–79. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schuckers, Stephanie A. C. "Anti-spoofing: Fingerprint (hardware and software)." In Encyclopedia of Biometrics, 1–9. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_68-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

San, Cho Cho, and Mie Mie Su Thwin. "Proposed Effective Feature Extraction and Selection for Malicious Software Classification." In Advances in Biometrics, 51–71. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30436-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Venkataraman, Sitalakshmi, and Siddhivinayak Kulkarni. "Risk-Based Neuro-Grid Architecture for Multimodal Biometrics." In Innovations in Computing Sciences and Software Engineering, 51–56. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9112-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometric software"

1

Holz, Christian, and Marius Knaust. "Biometric Touch Sensing." In UIST '15: The 28th Annual ACM Symposium on User Interface Software and Technology. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2807442.2807458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Holland, Corey D., and Oleg V. Komogortsev. "Software framework for an ocular biometric system." In ETRA '14: Eye Tracking Research and Applications. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2578153.2582174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Weizhou. "Fuzzy Comparison Scheme in Biometric Template Matching." In 2009 WRI World Congress on Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/wcse.2009.406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Muller, Sebastian C. "Measuring Software Developers' Perceived Difficulty with Biometric Sensors." In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE). IEEE, 2015. http://dx.doi.org/10.1109/icse.2015.284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liviu, Serbanescu, and Iosif Doru. "Biometric data software representation in distributed computing architectures." In 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2015. http://dx.doi.org/10.1109/ecai.2015.7301237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fritz, Thomas, and Sebastian C. Muller. "Leveraging Biometric Data to Boost Software Developer Productivity." In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 2016. http://dx.doi.org/10.1109/saner.2016.107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu-Jimenez, Judith, Oscar Miguel-Hurtado, Almudena Lindoso, and Belen Fernandez-Saavedra. "Hardware/Software Codesign for an Iris Biometric Search Engine." In EUROCON 2007 - The International Conference on "Computer as a Tool". IEEE, 2007. http://dx.doi.org/10.1109/eurcon.2007.4400454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Jingjie. "Design of Biometric Recognition Software Based on Image Processing." In 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 2018. http://dx.doi.org/10.1109/icitbs.2018.00170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jin, Zhe, Kong Yik Chee, and Xin Xia. "What Do Developers Discuss about Biometric APIs?" In 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2019. http://dx.doi.org/10.1109/icsme.2019.00053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ashraf, Shahzad, Sehrish Saleem, Tauqeer Ahmed, Zeeshan Aslam, and Muhammad Shuaeeb. "Iris and Foot based Sustainable Biometric Identification Approach." In 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2020. http://dx.doi.org/10.23919/softcom50211.2020.9238333.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Biometric software"

1

Watson, Craig I., Michael D. Garris, Elham Tabassi, Charles L. Wilson, R. Michael McCabe, Stanley Janet, and Kenneth Ko. User's guide to NIST biometric image software (NBIS). Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Marshall, Karen, Ross J. Michaels, Kevin Mangold, and Kayee Kwong. Incorporating biometric software development kits into the development process. National Institute of Standards and Technology, April 2013. http://dx.doi.org/10.6028/nist.ir.7929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marshall, Karen, Ross J. Michaels, Kevin Mangold, and Kayee Kwong. Incorporating Biometric Software Development Kits into the Development Process. National Institute of Standards and Technology, July 2014. http://dx.doi.org/10.6028/nist.ir.7929r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Watson, Craig I., Michael D. Garris, Elham Tabassi, Charles L. Wilson, R. Michael McCabe, Stanley Janet, and Kenneth Ko. User's guide to export controlled distribution of NIST biometric image software (NBIS-EC). Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography