To see the other types of publications on this topic, follow the link: Biometric software.

Dissertations / Theses on the topic 'Biometric software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 24 dissertations / theses for your research on the topic 'Biometric software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Varadinov, Petr. "Účel a implementace snímání otisků prstů v osobních počítačích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162689.

Full text
Abstract:
This diploma thesis deals with fingerprint recognition applied in personal computers. The topic is analyzed both chronologically in historical context and in connection with other biometric methods. The thesis provides a comprehensive survey of the topic. It starts with physical layer, goes through hardware parts and ends with software architecture. A special attention is paid to programming fingerprint recognition support into end-user applications. These are the aims of the thesis: to place the silicon fingerprint sensing technology into the historical context and describe its evolution in connection with personal computers till the present times, to provide the results of market research of fingerprint sensors used in personal computers, to work out the summary of the functions the end-users have at their disposal, to present the market research results of fingerprint software, to work out the overview and the comparison of available software development kits (SDKs) and that of application programming interfaces (APIs) used for the described fingerprint sensor devices, and last but not least to develop a demonstration application that communicates with a fingerprint sensor device. Technical literature, market researches together with my own experience from the work in this field were used so as to meet the set aims. As for the demo application of this technology it is my own innovative approach. The thesis is divided into seven chapters where Chapter II -- Chapter VI directly deal with the mentioned topics. The completion of a missing angle of approach to the subject from end-users' and application programmers' perspective is the main asset of this thesis. The work also allows orientation on the silicon fingerprint sensor market and fingerprint software market. Moreover it shows possibilities how to extend this technology, it provides a detailed analysis of the software layer and presents programming samples showing that show how to use this technology. The demo application allowing audio volume control by a fingerprint device is an innovation in the branch of computer input devices.
APA, Harvard, Vancouver, ISO, and other styles
2

Rashid, Rasber Dhahir. "Robust steganographic techniques for secure biometric-based remote authentication." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/236/.

Full text
Abstract:
Biometrics are widely accepted as the most reliable proof of identity, entitlement to services, and for crime-related forensics. Using biometrics for remote authentication is becoming an essential requirement for the development of knowledge-based economy in the digital age. Ensuring security and integrity of the biometric data or templates is critical to the success of deployment especially because once the data compromised the whole authentication system is compromised with serious consequences for identity theft, fraud as well as loss of privacy. Protecting biometric data whether stored in databases or transmitted over an open network channel is a serious challenge and cryptography may not be the answer. The main premise of this thesis is that Digital Steganography can provide an alternative security solutions that can be exploited to deal with the biometric transmission problem. The main objective of the thesis is to design, develop and test steganographic tools to support remote biometric authentication. We focus on investigating the selection of biometrics feature representations suitable for hiding in natural cover images and designing steganography systems that are specific for hiding such biometric data rather than being suitable for general purpose. The embedding schemes are expected to have high security characteristics resistant to several types of steganalysis tools and maintain accuracy of recognition post embedding. We shall limit our investigations to embedding face biometrics, but the same challenges and approaches should help in developing similar embedding schemes for other biometrics. To achieve this our investigations and proposals are done in different directions which explain in the rest of this section. Reviewing the literature on the state-of-art in steganography has revealed a rich source of theoretical work and creative approaches that have helped generate a variety of embedding schemes as well as steganalysis tools but almost all focused on embedding random looking secrets. The review greatly helped in identifying the main challenges in the field and the main criteria for success in terms of difficult to reconcile requirements on embedding capacity, efficiency of embedding, robustness against steganalysis attacks, and stego image quality. On the biometrics front the review revealed another rich source of different face biometric feature vectors. The review helped shaping our primary objectives as (1) identifying a binarised face feature factor with high discriminating power that is susceptible to embedding in images, (2) develop a special purpose content-based steganography schemes that can benefit from the well-defined structure of the face biometric data in the embedding procedure while preserving accuracy without leaking information about the source biometric data, and (3) conduct sufficient sets of experiments to test the performance of the developed schemes, highlight the advantages as well as limitations, if any, of the developed system with regards to the above mentioned criteria. We argue that the well-known LBP histogram face biometric scheme satisfies the desired properties and we demonstrate that our new more efficient wavelet based versions called LBPH patterns is much more compact and has improved accuracy. In fact the wavelet version schemes reduce the number of features by 22% to 72% of the original version of LBP scheme guaranteeing better invisibility post embedding. We shall then develop 2 steganographic schemes. The first is the LSB-witness is a general purpose scheme that avoids changing the LSB-plane guaranteeing robustness against targeted steganalysis tools, but establish the viability of using steganography for remote biometric-based recognition. However, it may modify the 2nd LSB of cover pixels as a witness for the presence of the secret bits in the 1st LSB and thereby has some disadvantages with regards to the stego image quality. Our search for a new scheme that exploits the structure of the secret face LBPH patterns for improved stego image quality has led to the development of the first content-based steganography scheme. Embedding is guided by searching for similarities between the LBPH patterns and the structure of the cover image LSB bit-planes partitioned into 8-bit or 4-bit patterns. We shall demonstrate the excellent benefits of using content-based embedding scheme in terms of improved stego image quality, greatly reduced payload, reduced lower bound on optimal embedding efficiency, robustness against all targeted steganalysis tools. Unfortunately our scheme was not robust against the blind or universal SRM steganalysis tool. However we demonstrated robustness against SRM at low payload when our scheme was modified by restricting embedding to edge and textured pixels. The low payload in this case is sufficient to embed a secret full face LBPH patterns. Our work opens new exciting opportunities to build successful real applications of content-based steganography and presents plenty of research challenges.
APA, Harvard, Vancouver, ISO, and other styles
3

Mahadevan, Karthikeyan. "Estimating reliability impact of biometric devices in large scale applications." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3096.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2003.
Title from document title page. Document formatted into pages; contains vii, 66 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 62-64).
APA, Harvard, Vancouver, ISO, and other styles
4

Mirza-Babaei, Pejman. "Biometric storyboards : a games user research approach for improving qualitative evaluations of player experience." Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/47858/.

Full text
Abstract:
Developing video games is an iterative and demanding process. It is difficult to achieve the goal of most video games — to be enjoyable, engaging and to create revenue for game developers — because of many hard-to-evaluate factors, such as the different ways players can interact with the game. Understanding how players behave during gameplay is of vital importance to developers and can be uncovered in user tests as part of game development. This can help developers to identify and resolve any potential problem areas before release, leading to a better player experience and possibly higher game review scores and sales. However, traditional user testing methods were developed for function and efficiency oriented applications. Hence, many traditional user testing methods cannot be applied in the same way for video game evaluation. This thesis presents an investigation into the contributions of physiological measurements in user testing within games user research (GUR). GUR specifically studies the interaction between a game and users (players) with the aim to provide feedback for developers to help them to optimise the game design of their title. An evaluation technique called Biometric Storyboards is developed, which visualises the relationships between game events, player feedback and changes in a player's physiological state. Biometric Storyboards contributes to the field of human-computer interaction and GUR in three important areas: (1) visualising mixedmeasures of player experience, (2) deconstructing game design by analysing game events and pace, (3) incremental improvement of classic user research techniques (such as interviews and physiological measurements). These contributions are described in practical case studies, interviews with game developers and laboratory experiments. The results show this evaluation approach can enable games user researchers to increase the plausibility and persuasiveness of their reports and facilitate developers to better deliver their design goals. Biometric Storyboards is not aimed at replacing existing methods, but to extend them with mixed methods visualisations, to provide powerful tools for games user researchers and developers to better understand and communicate player needs, interactions and experiences. The contributions of this thesis are directly applicable for user researchers and game developers, as well as for researchers in user experience evaluation in entertainment systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Maruniak, Lukáš. "Software pro biometrické rozpoznávání duhovky lidského oka." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-235000.

Full text
Abstract:
In my thesis, I focus on the task of recognizing human iris from an image.In the beginning, the work deals with a question of biometrics, its importance and basic concepts, which are necessary for use in following text. Subsequently process of human Iris detection is described together with theory of evolution algorithms. In the implementation part, is described the design of implemented solution, which uses evolution algorithms, where is emphasis on correct pupil and iris boundary detection.
APA, Harvard, Vancouver, ISO, and other styles
6

Sucupira, Junior Luiz Humberto Rabelo. "Uma metodologia para avaliação de pacotes de software biometricos." [s.n.], 2004. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259295.

Full text
Abstract:
Orientadores: Lee Luan Ling, Miguel Gustavo Lizarraga
Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-03T21:35:15Z (GMT). No. of bitstreams: 1 SucupiraJunior_LuizHumbertoRabelo_M.pdf: 4415563 bytes, checksum: 641946f8af8af2fa716eea36bb57c123 (MD5) Previous issue date: 2004
Mestrado
APA, Harvard, Vancouver, ISO, and other styles
7

Oliveira, Cristiano Ferreira de. "Golias: software para análises estatística e biométrica de grande conjunto de dados utilizando as linguagens Júlia e R." Universidade Federal de Viçosa, 2018. http://www.locus.ufv.br/handle/123456789/20578.

Full text
Abstract:
Submitted by Nathália Faria da Silva (nathaliafsilva.ufv@gmail.com) on 2018-07-10T20:14:54Z No. of bitstreams: 1 textocompleto.pdf: 660296 bytes, checksum: 3ddfa0bd00c9a41014d5aa9058baa8be (MD5)
Made available in DSpace on 2018-07-10T20:14:54Z (GMT). No. of bitstreams: 1 textocompleto.pdf: 660296 bytes, checksum: 3ddfa0bd00c9a41014d5aa9058baa8be (MD5) Previous issue date: 2018-02-21
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
A utilização de informações de marcadores moleculares para identificação de indivíduos geneticamente superiores para características de interesse é uma as principais contribuições da genética molecular no melhoramento genético. Assim, em programas de melhoramento genético, é crescente o uso de marcadores moleculares dispostos em matrizes de alta densidade, que necessitam de controle de qualidade e uso de metodologias adequadas para realizar a predição dos valores genéticos. Diante do exposto este trabalho tem como objetivo apresentar o software Golias, que é um software livre destinado ao processamento de dados de marcadores SNPs de alta dimensão. O Golias é integrado com os ambientes de programação R e Julia, utilizando o poder de processamento da linguagem Júlia e de pacotes do R otimizados em código C. Todas as análises são realizadas sem fazer necessário que o usuário tenha qualquer conhecimento em programação. O software proposto dispõe de procedimentos para o controle de qualidade de SNPs como call rate, MAF, teste de equilíbrio de Hardy-Weinberg, descarte de variáveis via componentes principais, um procedimento para imputação de informações genotípicas perdidas e algumas técnicas de predição utilizando métodos bayesianos. O Golias está disponível em português; pode ser baixado da Internet (https://www.dropbox.com/sh/ql92mzjed8735wq/AADfVadXY3oYM_3qe84Vb N-Ea?dl=0) e é compatível com sistema operacional Windows.
The use of molecular marker information to identify genetically superior individuals for traits of interest is one of the main contributions of genomic selection in breeding. Thus, in genetic breeding programs is increasing the use of molecular markers arranged in high density matrices which require quality control and the use of appropriate methodologies to predict genetic values. The work aims to present the Golias software that is a free software for processing data from high- size SNPs. Golias is integrated with the R and Julia programming environments, using the processing power of the Júlia language and R-optimized C-packets. All analyzes are performed without making it necessary for the user to have any programming knowledge. The proposed software has procedures for quality control of SNPs such as call rate, MAF, Hardy-Weinberg equilibrium test, variables discarding via principal components, a procedure for imputation of lost genotype information and some prediction techniques using Bayesian methods. Golias is available in Portuguese; can be downloaded from the Internet (https://www.dropbox.com/sh/ql92mzjed8735wq/AADfVadXY3oYM_3qe84Vb N-Ea?dl=0) and is compatible with Windows operating system.
APA, Harvard, Vancouver, ISO, and other styles
8

Trhoň, Adam. "Vícekamerový snímač biometrických vlastností lidského prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234920.

Full text
Abstract:
This thesis describes a conceptual design of touchless fingerprint sensor and design, implementation and testing of its firmware, which is a composition of hardware implemented in VHDL and a program implemented in C. Result of this thesis can be used as the first step of building an industrial solution.
APA, Harvard, Vancouver, ISO, and other styles
9

Sellgren, Fredrik, and Isak Kjellhard. "Utrustnings-API : Förbättrad kommunikation med mätplatsutrustning." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39344.

Full text
Abstract:
Biometria är ett företag som arbetar inom skogsnäring med att utföra opartiska mätningar av virke som skickas mellan skog och industri, på olika mätplatser. Syftet med projektet har varit att komma fram till en förbättrad lösning för att transportera data från olika mätplatser till Biometrias system, samt bestämma en standardstruktur för den data som skickas. Genom att analysera vad en sådan lösning behöver kunna utföra och undersöka det nuvarande system som används på mätplatser, har det skapats en design för hur det nya systemet kan se ut. Denna design har sedan förbättrats utifrån den funktionalitet som krävs av ett nytt system. Därefter implementerades denna design för den mest förekommande typen av mätverktyg. I denna implementation bestämdes en struktur för hur data ska se ut för den mest förekommande typen av mätverktyg och införde validering för att data som skickas måste se ut på detta sätt. Det har undersökts olika typer av autentisering för att komma fram till vilken typ som passar det nya systemet bäst. Olika tester har utförts, som kontrollerar det nya systemets säkerhet och hur systemet presterar under belastning. Utifrån dessa tester har det konstaterats att enbart data med korrekt struktur godkänns och behandlas av det nya systemet, att den valda lösningen för autentisering fungerar som tänkt och att systemet i teorin klarar av att hantera den mängd data som skickas från olika mätplatser. Det krävs dock ytterligare tester med verkliga mätverktyg innan denna lösning kan sättas i bruk.
Biometria is a company in the forest industry whose part is to perform im-partial measurements of timber sent between forest and industry, on differ-ent measurement sites. The purpose of this project has been to come up with a better solution for transferring data from different measuring sites to Bio-metrias systems, as well as determine a standardized structure for data sent by measuring equipment. By analyzing how such a solution need to perform and investigate the current system that is used today on measuring sites, a new design has been developed for how the new system can be structured. The new design has been improved based on the functionality needed by a new system. When an improvement of the design is done, the design is im-plemented for the most common type of measuring equipment. In this im-plementation a standardized structure was determined for the most com-mon measuring equipment and validation for data to have said structure was implemented. Different methods of authentication were researched to choose the one that would fit the new system best. Different kinds of tests were performed to verify the security of the system as well as system per-formance during high workload. Performing these tests establish that the new system only allows data of correct structure to be processed, that the chosen method of authentication works as intended and that the system in theory can handle the amount of data being sent from measuring sites. De-spite this, there need more test using real measuring equipment before this solution can be used in production.
APA, Harvard, Vancouver, ISO, and other styles
10

Oliveira, Adriana Esmeraldo de. "API de Segurança e Armazenamento de uma Arquitetura Multibiométrica para Controle de Acesso com Autenticação Contínua." Universidade Federal da Paraí­ba, 2011. http://tede.biblioteca.ufpb.br:8080/handle/tede/6058.

Full text
Abstract:
Made available in DSpace on 2015-05-14T12:36:30Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 4594295 bytes, checksum: bd4f4df655903b796eb6cf79a5060ded (MD5) Previous issue date: 2011-09-16
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
A biometric system that employs one single biometric characteristic is constrained. This limitation can be reduced by fusing the information presented by multiple sources. A system that consolidates the evidence presented by multiple biometric sources is known as a multibiometric system. In such a context, this work proposes the security and persistence APIs of a multi-biometric architecture, which is capable of using one or more biometric modalities. In access control applications, a user might be forced to authenticate in order to give an unauthorized access to a criminal. As an alternative to this problem, the API uses a continuous authentication process, which verifies if the user identified at the start of the software application is still able to remain on the system, without human interferences or breaks in the process. Much of the literature on biometric system design has focused on system error rates and scaling equations. However, it is also important to have a solid foundation for future progress as the processes and systems architecture for the new biometric application are designed. Hence, the designed architecture made it possible to create a well-defined API for multibiometric systems, which may help developers to standardize, among other things, their data structure, in order to enable and facilitate templates fusion and interoperability. Therefore, the developed security and persistence APIs support a multi-biometric access control architecture. This architecture is extensible, that is, capable of easily comprising new biometric characteristics and processes, yet making it possible to use a template security mechanism. The APIs were designed and implemented. They were demonstrated by a prototype application, through which it was possible to conduct the test experiments.
Um sistema biométrico que empregue uma única peculiaridade ou traço característico é restrito. Esta limitação pode ser suavizada pela fusão dos dados apresentados por múltiplas fontes. Um sistema que consolida a evidência apresentada por múltiplas fontes biométricas é conhecido como um sistema multibiométrico. Nesse contexto, este trabalho propõe a interface de aplicação (API) de segurança e armazenamento de uma arquitetura multibiométrica, com habilidade de empregar uma ou mais modalidades biométricas. Em aplicações de controle de acesso, um usuário pode ser coagido a se autenticar para permitir um acesso indevido. Como alternativa para este problema, a API utiliza um processo de autenticação contínua, que verifica se o usuário que se identificou no início de uma aplicação de software ainda está apto a continuar no sistema, sem interferências humanas ou paralisações do processo. Grande parte da literatura sobre projeto de sistemas biométricos tem o foco nas taxas de erro do sistema e na simplificação de equações. No entanto, também é importante que se tenha uma base sólida para progressos futuros no momento em que os processos e a arquitetura da nova aplicação biométrica estiverem sendo projetados. Neste sentido, a arquitetura projetada permitiu a construção de uma API bem definida para sistemas multibiométricos, que deverá auxiliar os desenvolvedores a padronizar, entre outras coisas, sua estrutura de dados, de forma a possibilitar e facilitar a fusão de modelos biométricos e a interoperabilidade. Deste modo, a API de segurança e armazenamento desenvolvida suporta uma arquitetura multibiométrica de controle de acesso para autenticação contínua extensível, isto é, capaz de receber novas características e processos biométricos com facilidade, permitindo, ainda, o uso de um mecanismo de segurança de templates biométricos. A API foi projetada e implementada. Sua demonstração foi feita através de uma aplicação protótipo, por meio da qual foi possível realizar os testes.
APA, Harvard, Vancouver, ISO, and other styles
11

Hentati, Raïda. "Implémentation d'algorithmes de reconnaissance biométrique par l'iris sur des architectures dédiées." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917955.

Full text
Abstract:
Dans cette thèse, nous avons adapté trois versions d'une chaine d'algorithmes de reconnaissance biométrique par l'iris appelés OSIRIS V2, V3, V4 qui correspondent à différentes implémentations de l'approche de J. Daugman pour les besoins d'une implémentation logicielle / matérielle. Les résultats expérimentaux sur la base de données ICE2005 montrent que OSIRIS_V4 est le système le plus fiable alors qu'OSIRIS_V2 est le plus rapide. Nous avons proposé une mesure de qualité de l'image segmentée pour optimiser en terme de compromis coût / performance un système de référence basé sur OSIRIS V2 et V4. Nous nous sommes ensuite intéressés à l'implémentation de ces algorithmes sur des plateformes reconfigurables. Les résultats expérimentaux montrent que l'implémentation matériel / logiciel est plus rapide que l'implémentation purement logicielle. Nous proposons aussi une nouvelle méthode pour le partitionnement matériel / logiciel de l'application. Nous avons utilisé la programmation linéaire pour trouver la partition optimale pour les différentes tâches prenant en compte les trois contraintes : la surface occupée, le temps d'exécution et la consommation d'énergie
APA, Harvard, Vancouver, ISO, and other styles
12

Komulainen, J. (Jukka). "Software-based countermeasures to 2D facial spoofing attacks." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526208732.

Full text
Abstract:
Abstract Because of its natural and non-intrusive interaction, identity verification and recognition using facial information is among the most active areas in computer vision research. Unfortunately, it has been shown that conventional 2D face recognition techniques are vulnerable to spoofing attacks, where a person tries to masquerade as another one by falsifying biometric data and thereby gaining an illegitimate advantage. This thesis explores different directions for software-based face anti-spoofing. The proposed approaches are divided into two categories: first, low-level feature descriptors are applied for describing the static and dynamic characteristic differences between genuine faces and fake ones in general, and second, complementary attack-specific countermeasures are investigated in order to overcome the limitations of generic spoof detection schemes. The static face representation is based on a set of well-known feature descriptors, including local binary patterns, Gabor wavelet features and histogram of oriented gradients. The key idea is to capture the differences in quality, light reflection and shading by analysing the texture and gradient structure of the input face images. The approach is then extended to the spatiotemporal domain when both facial appearance and dynamics are exploited for spoof detection using local binary patterns from three orthogonal planes. It is reasonable to assume that no generic spoof detection scheme is able to detect all known, let alone unseen, attacks scenarios. In order to find out well-generalizing countermeasures, the problem of anti-spoofing is broken into two attack-specific sub-problems based on whether the spoofing medium can be detected in the provided view or not. The spoofing medium detection is performed by describing the discontinuities in the gradient structures around the detected face. If the display medium is concealed outside the view, a combination of face and background motion correlation measurement and texture analysis is applied. Furthermore, an open-source anti-spoofing fusion framework is introduced and its system-level performance is investigated more closely in order to gain insight on how to combine different anti-spoofing modules. The proposed spoof detection schemes are evaluated on the latest benchmark datasets. The main findings of the experiments are discussed in the thesis
Tiivistelmä Kasvokuvaan perustuvan henkilöllisyyden tunnistamisen etuja ovat luonnollinen vuorovaikutus ja etätunnistus, minkä takia aihe on ollut erittäin aktiivinen tutkimusalue konenäön tutkimuksessa. Valitettavasti tavanomaiset kasvontunnistustekniikat ovat osoittautuneet haavoittuvaisiksi hyökkäyksille, joissa kameralle esitetään jäljennös kohdehenkilön kasvoista positiivisen tunnistuksen toivossa. Tässä väitöskirjassa tutkitaan erilaisia ohjelmistopohjaisia ratkaisuja keinotekoisten kasvojen ilmaisuun petkuttamisen estämiseksi. Työn ensimmäisessä osassa käytetään erilaisia matalan tason piirteitä kuvaamaan aitojen ja keinotekoisten kasvojen luontaisia staattisia ja dynaamisia eroavaisuuksia. Työn toisessa osassa esitetään toisiaan täydentäviä hyökkäystyyppikohtaisia vastakeinoja, jotta yleispätevien menetelmien puutteet voitaisiin ratkaista ongelmaa rajaamalla. Kasvojen staattisten ominaisuuksien esitys perustuu yleisesti tunnettuihin matalan tason piirteisiin, kuten paikallisiin binäärikuvioihin, Gabor-tekstuureihin ja suunnattujen gradienttien histogrammeihin. Pääajatuksena on kuvata aitojen ja keinotekoisten kasvojen laadun, heijastumisen ja varjostumisen eroavaisuuksia tekstuuria ja gradienttirakenteita analysoimalla. Lähestymistapaa laajennetaan myös tila-aika-avaruuteen, jolloin hyödynnetään samanaikaisesti sekä kasvojen ulkonäköä ja dynamiikkaa irroittamalla paikallisia binäärikuvioita tila-aika-avaruuden kolmelta ortogonaaliselta tasolta. Voidaan olettaa, ettei ole olemassa yksittäistä yleispätevää vastakeinoa, joka kykenee ilmaisemaan jokaisen tunnetun hyökkäystyypin, saati tuntemattoman. Näin ollen työssä keskitytään tarkemmin kahteen hyökkäystilanteeseen. Ensimmäisessä tapauksessa huijausapuvälineen reunoja ilmaistaan analysoimalla gradienttirakenteiden epäjatkuvuuksia havaittujen kasvojen ympäristössä. Jos apuvälineen reunat on piilotettu kameran näkymän ulkopuolelle, petkuttamisen ilmaisu toteutetaan yhdistämällä kasvojen ja taustan liikkeen korrelaation mittausta ja kasvojen tekstuurianalyysiä. Lisäksi työssä esitellään vastakeinojen yhdistämiseen avoimen lähdekoodin ohjelmisto, jonka avulla tutkitaan lähemmin menetelmien fuusion vaikutuksia. Tutkimuksessa esitetyt menetelmät on kokeellisesti vahvistettu alan viimeisimmillä julkisesti saatavilla olevilla tietokannoilla. Tässä väitöskirjassa käydään läpi kokeiden päähavainnot
APA, Harvard, Vancouver, ISO, and other styles
13

Penteado, Bruno Elias [UNESP]. "Autenticação biométrica de usuários em sistemas de E-learning baseada em reconhecimento de faces a partir de vídeo." Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/98692.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:29:40Z (GMT). No. of bitstreams: 0 Previous issue date: 2009-07-27Bitstream added on 2014-06-13T20:59:56Z : No. of bitstreams: 1 penteado_be_me_sjrp.pdf: 1032009 bytes, checksum: 4cf143854132e42249128674b69ba77b (MD5)
Nos últimos anos tem sido observado um crescimento exponencial na oferta de cursos a distância realizados pela Internet, decorrente de suas vantagens e características (menores custos de distribuição e atualização de conteúdo, gerenciamento de grandes turmas, aprendizado assíncrono e geograficamente independente, etc.), bem como de sua regulamentação e apoio governamental. Entretanto, a falta de mecanismos eficazes para assegurar a autenticação dos alunos neste tipo de ambiente é apontada como uma séria deficiência, tanto no acesso ao sistema quanto durante a participação do usuário nas atividades do curso. Atualmente, a autenticação baseada em senhas continua predominante. Porém, estudos têm sido conduzidos sobre possíveis aplicações da Biometria para autenticação em ambientes Web. Com a popularização e conseqüente barateamento de hardware habilitado para coleta biométrica (como webcams, microfone e leitores de impressão digital embutidos), a Biometria passa a ser considerada uma forma segura e viável de autenticação remota de indivíduos em aplicações Web. Baseado nisso, este trabalho propõe uma arquitetura distribuída para um ambiente de e-Learning, explorando as propriedades de um sistema Web para a autenticação biométrica tanto no acesso ao sistema quanto de forma contínua, durante a realização do curso. Para análise desta arquitetura, é avaliada a performance de técnicas de reconhecimento de faces a partir de vídeo capturadas on-line por uma webcam em um ambiente de Internet, simulando a interação natural de um indivíduo em um sistema de e- Learning. Para este fim, foi criada uma base de dados de vídeos própria, contando com 43 indivíduos navegando e interagindo com páginas Web. Os resultados obtidos mostram que os métodos analisados, consolidados na literatura, podem ser aplicados com sucesso nesse tipo de aplicação...
In the last years it has been observed an exponential growth in the offering of Internet-enabled distance courses, due to its advantages and features (decreased distribution and content updates costs, management of large groups of students, asynchronous and geographically independent learning) as well as its regulation and governmental support. However, the lack of effective mechanisms that assure user authentication in this sort of environment has been pointed out as a serious deficiency, both in the system logon and during user attendance in the course assignments. Currently, password based authentication still prevails. Nevertheless, studies have been carried out about possible biometric applications for Web authentication. With the popularization and resultant decreasing costs of biometric enabled devices, such as webcams, microphones and embedded fingerprint sensors, Biometrics is reconsidered as a secure and viable form of remote authentication of individuals for Web applications. Based on that, this work presents a distributed architecture for an e-Learning environment, by exploring the properties of a Web system for biometric authentication both in the system logon and in continuous monitoring, during the course attendance. For the analysis of this architecture, the performance of techniques for face recognition from video, captured on-line by a webcam in an Internet environment, is evaluated, simulating the natural interaction of an individual in an e-Learning system. For that, a private database was created, with 43 individuals browsing and interacting with Web pages. The results show that the methods analyzed, though consolidated in the literature, can be successfully applied in this kind of application, with recognition rates up to 97% in ideal conditions, with low execution times and with short amount of information transmitted between client and server, with templates sizes of about 30KB.
APA, Harvard, Vancouver, ISO, and other styles
14

Penteado, Bruno Elias. "Autenticação biométrica de usuários em sistemas de E-learning baseada em reconhecimento de faces a partir de vídeo /." São José do Rio Preto : [s.n.], 2009. http://hdl.handle.net/11449/98692.

Full text
Abstract:
Orientador: Aparecido Nilceu Elias
Banca: Agma Juci Machado Traina
Banca: Wilson Massashiro Yonezawa
Resumo: Nos últimos anos tem sido observado um crescimento exponencial na oferta de cursos a distância realizados pela Internet, decorrente de suas vantagens e características (menores custos de distribuição e atualização de conteúdo, gerenciamento de grandes turmas, aprendizado assíncrono e geograficamente independente, etc.), bem como de sua regulamentação e apoio governamental. Entretanto, a falta de mecanismos eficazes para assegurar a autenticação dos alunos neste tipo de ambiente é apontada como uma séria deficiência, tanto no acesso ao sistema quanto durante a participação do usuário nas atividades do curso. Atualmente, a autenticação baseada em senhas continua predominante. Porém, estudos têm sido conduzidos sobre possíveis aplicações da Biometria para autenticação em ambientes Web. Com a popularização e conseqüente barateamento de hardware habilitado para coleta biométrica (como webcams, microfone e leitores de impressão digital embutidos), a Biometria passa a ser considerada uma forma segura e viável de autenticação remota de indivíduos em aplicações Web. Baseado nisso, este trabalho propõe uma arquitetura distribuída para um ambiente de e-Learning, explorando as propriedades de um sistema Web para a autenticação biométrica tanto no acesso ao sistema quanto de forma contínua, durante a realização do curso. Para análise desta arquitetura, é avaliada a performance de técnicas de reconhecimento de faces a partir de vídeo capturadas on-line por uma webcam em um ambiente de Internet, simulando a interação natural de um indivíduo em um sistema de e- Learning. Para este fim, foi criada uma base de dados de vídeos própria, contando com 43 indivíduos navegando e interagindo com páginas Web. Os resultados obtidos mostram que os métodos analisados, consolidados na literatura, podem ser aplicados com sucesso nesse tipo de aplicação... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: In the last years it has been observed an exponential growth in the offering of Internet-enabled distance courses, due to its advantages and features (decreased distribution and content updates costs, management of large groups of students, asynchronous and geographically independent learning) as well as its regulation and governmental support. However, the lack of effective mechanisms that assure user authentication in this sort of environment has been pointed out as a serious deficiency, both in the system logon and during user attendance in the course assignments. Currently, password based authentication still prevails. Nevertheless, studies have been carried out about possible biometric applications for Web authentication. With the popularization and resultant decreasing costs of biometric enabled devices, such as webcams, microphones and embedded fingerprint sensors, Biometrics is reconsidered as a secure and viable form of remote authentication of individuals for Web applications. Based on that, this work presents a distributed architecture for an e-Learning environment, by exploring the properties of a Web system for biometric authentication both in the system logon and in continuous monitoring, during the course attendance. For the analysis of this architecture, the performance of techniques for face recognition from video, captured on-line by a webcam in an Internet environment, is evaluated, simulating the natural interaction of an individual in an e-Learning system. For that, a private database was created, with 43 individuals browsing and interacting with Web pages. The results show that the methods analyzed, though consolidated in the literature, can be successfully applied in this kind of application, with recognition rates up to 97% in ideal conditions, with low execution times and with short amount of information transmitted between client and server, with templates sizes of about 30KB.
Mestre
APA, Harvard, Vancouver, ISO, and other styles
15

Illatingo, Yupanqui Joaquin Yonny, and Surco Carolyn Creslins Sanchez. "Prototipo de una aplicación web que ayude a controlar el ingreso en los estadios usando control biométrico y antecedentes personales." Bachelor's thesis, Universidad Nacional Mayor de San Marcos, 2013. https://hdl.handle.net/20.500.12672/11884.

Full text
Abstract:
Consiste en la propuesta del prototipo de un Sistema de Control de Ingreso que mejore la seguridad de las personas que asistan a un espectáculo de fútbol, disminuyendo el riesgo de violencia en el interior de los estadios. Éste sistema autentificará a los asistentes, verificando en los registros de la RENIEC que coincida el número de DNI con la huella dactilar del asistente, que será capturada a través de un lector biométrico de huella. Además, el sistema consultará los antecedentes policiales de los asistentes consultando en los registros de la Unidad de la Policía para que los efectivos policiales tomen las medidas del caso si el asistente tiene orden de captura. El sistema también consultará los antecedentes penales en los registros del Poder Judicial para luego obtener una ponderación del nivel de violencia según los delitos penales que tenga la persona; para un mayor control por parte de los efectivos policiales en las zonas donde se encuentren los asistentes con alto nivel de violencia.
Trabajo de suficiencia profesional
APA, Harvard, Vancouver, ISO, and other styles
16

Fons, Lluís Mariano. "Hardware accelerators for embedded fingerprint-based personal recognition systems." Doctoral thesis, Universitat Rovira i Virgili, 2012. http://hdl.handle.net/10803/83493.

Full text
Abstract:
Abstract The development of automatic biometrics-based personal recognition systems is a reality in the current technological age. Not only those operations demanding stringent security levels but also many daily use consumer applications request the existence of computational platforms in charge of recognizing the identity of one individual based on the analysis of his/her physiological and/or behavioural characteristics. The state of the art points out two main open problems in the implementation of such applications: on the one hand, the needed reliability improvement in terms of recognition accuracy, overall security and real-time performances; and on the other hand, the cost reduction of those physical platforms in charge of the processing. This work aims at finding the proper system architecture able to address those limitations of current personal recognition applications. Embedded system solutions based on hardware-software co-design techniques and programmable (and run-time reconfigurable) logic devices under FPGAs or SOPCs is proven to be an efficient alternative to those existing multiprocessor systems based on HPCs, GPUs or PC platforms in the development of that kind of high-performance applications at low cost
El desenvolupament de sistemes automàtics de reconeixement personal basats en tècniques biomètriques esdevé una realitat en l’era tecnològica actual. No només aquelles operacions que exigeixen un elevat nivell de seguretat sinó també moltes aplicacions quotidianes demanen l’existència de plataformes computacionals encarregades de reconèixer la identitat d’un individu a partir de l’anàlisi de les seves característiques fisiològiques i/o comportamentals. L’estat de l’art de la tècnica identifica dues limitacions importants en la implementació d’aquest tipus d’aplicacions: per una banda, és necessària la millora de la fiabilitat d’aquests sistemes en termes de precisió en el procés de reconeixement personal, seguretat i execució en temps real; i per altra banda, és necessari reduir notablement el cost dels sistemes electrònics encarregats del processat biomètric. Aquest treball té per objectiu la cerca de l’arquitectura adequada a nivell de sistema que permeti fer front a les limitacions de les aplicacions de reconeixement personal actuals. Es demostra que la proposta de sistemes empotrats basats en tècniques de codisseny hardware-software i dispositius lògics programables (i reconfigurables en temps d’execució) sobre FPGAs o SOPCs resulta ser una alternativa eficient en front d’aquells sistemes multiprocessadors existents basats en HPCs, GPUs o plataformes PC per al desenvolupament d’aquests tipus d’aplicacions que requereixen un alt nivell de prestacions a baix cost.
El desarrollo de sistemas automáticos de reconocimiento personal basados en técnicas biométricas se ha convertido en una realidad en la era tecnológica actual. No tan solo aquellas operaciones que requieren un alto nivel de seguridad sino también muchas otras aplicaciones cotidianas exigen la existencia de plataformas computacionales encargadas de verificar la identidad de un individuo a partir del análisis de sus características fisiológicas y/o comportamentales. El estado del arte de la técnica identifica dos limitaciones importantes en la implementación de este tipo de aplicaciones: por un lado, es necesario mejorar la fiabilidad que presentan estos sistemas en términos de precisión en el proceso de reconocimiento personal, seguridad y ejecución en tiempo real; y por otro lado, es necesario reducir notablemente el coste de los sistemas electrónicos encargados de dicho procesado biométrico. Este trabajo tiene por objetivo la búsqueda de aquella arquitectura adecuada a nivel de sistema que permita hacer frente a las limitaciones de los sistemas de reconocimiento personal actuales. Se demuestra que la propuesta basada en sistemas embebidos implementados mediante técnicas de codiseño hardware-software y dispositivos lógicos programables (y reconfigurables en tiempo de ejecución) sobre FPGAs o SOPCs resulta ser una alternativa eficiente frente a aquellos sistemas multiprocesador actuales basados en HPCs, GPUs o plataformas PC en el ámbito del desarrollo de aplicaciones que demandan un alto nivel de prestaciones a bajo coste
APA, Harvard, Vancouver, ISO, and other styles
17

Martinsson, Robin, and William Rosenlund. "Autentisering i programvaruapplikationer." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3298.

Full text
Abstract:
Dagens människa är ytterst beroende av webbtjänster och med tiden har det blivit fler och viktigare tjänster som startat upp på internet. Viktiga tjänster som internetbanker. Oftast är det bara ett användarnamn och ett lösenord som krävs för att bli autentiserad så man skulle kunna tro att användarna håller hårt i sina lösenord och att de väljer starka/unika lösenord. För många verkar det dock, enligt källor, vara ett besvär. Borde man ha associeringar för att lätt komma ihåg sitt lösenord eller är det för riskabelt? Det har visat att många tycker om att använda ord som förknippas med webbsidan. LinkedIn hade för ett tag sedan 6,46 miljoner konton hackade då studierna visade att många använt ord som “link”, “work” och “job”; lösenord som är förknippade med sidans innehåll. Det är inte bara ovana användare som slarvar med sina lösenord, det har kommit fram att även många IT-administratörer väljer simpla lösenord eller förvarar viktiga inloggningsuppgifter på lättåtkomliga lappar. Frågan är vems fel det egentligen är. Ska alla som inte har ett starkt och unikt lösenord för varje tjänst skylla sig själva eller är det omänskligt att förvänta sig detta? Finns det alternativa vägar att gå och vad är för- och nackdelarna med dessa metoder? Vad vår litteraturstudie samt enkät påvisar är att vid vissa fall kan alternativa metoder för autentisering behövas. Det vanliga textbaserade lösenordet kanske inte alltid är det ultimata alternativet. Vad är så bra med ersättningarna då? Hur kommer det sig att vi inte ser mer av de biometriska alternativen t. ex? Vi har undersökt de idag mest kända autentiseringsmetoderna med säkerhetsbrister, användarvänlighet och om vissa metoder är i olika syften bättre att använda än dagens lösenordsmetod. Resultatet vi har kommit fram till har visat att användare är villiga att testa nya metoder motiverat utifrån dagens användaresituation. Säkerhetsmässigt är flera metoder bättre än lösenord. Varje metod har sina för- och nackdelar och varför nya metoder inte testas mer är fortfarande oklart.
APA, Harvard, Vancouver, ISO, and other styles
18

Alejo, Ramírez Willy Alfonso, and Cárhuaz Daniel Alejandro Rodríguez. "Sistema de indentificación de personas por el posicionamiento de venas del dorso de la mano." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas - UPC, 2015. http://hdl.handle.net/10757/337896.

Full text
Abstract:
Los sistemas desarrollados para proteger la información, como control de acceso, no están dados de manera segura y posibilitan el acceso a personas no autorizadas y usuarios restringidos. Ante dicha problemática, la ingeniería biométrica, ha desarrollado sistemas en los cuales es necesario contar con la presencia física de la persona autorizada, los cuales en su mayoría presentan diversos problemas, como por ejemplo, ser son bastante intrusivos, presentar algunas dificultades ante cambios ambientales, tener problemas de precisión y excesivo costo económico, entre otros. En ese sentido, es necesario desarrollar un nuevo sistema, mediante procesamiento de imágenes, que efectivamente pueda resolver los problemas planteados. Para ello, se propone un método de verificación de patrones basados en el análisis de superposición de imágenes y el diseño de un soporte que contribuye al sistema de manera eficaz, trabajando con el posicionamiento único de las venas del dorso de la mano. El método reduce los efectos de las variaciones de suciedad, iluminación y piel son reducidas en comparación con lo adquirido por medio de luz visible. Como resultados finales se ha logrado alcanzar una eficiente esqueletización de la imagen (para la extracción de parámetros) y un tiempo de procesamiento promedio de 1.8 segundos (utilizando una computadora de procesador 2,7 Ghz Intel Core i7). Las tasas de referencia obtenidas fueron: FAR=0.44% y FRR=0.00%, realizado con 50 personas y 1500 intentos aleatorios de verificación.
APA, Harvard, Vancouver, ISO, and other styles
19

Chawan, Akshay. "Security Enhancement of Over-The-Air Update for Connected Vehicles." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1533246722910754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Guerra, Romero Kevin Antonio. "Sistema de censado del estado anímico: enfocado a personas de la tercera edad." Tesis, Universidad de Chile, 2015. http://repositorio.uchile.cl/handle/2250/137408.

Full text
Abstract:
Ingeniero Civil en Computación
La vida moderna y la evolución de la sociedad hacen que las personas dispongan cada vez de menos tiempo para el ocio y fomentar las relaciones sociales con sus pares. Esta falta de tiempo también nos hace perder lazos, incluso con nuestros seres más queridos, llegando al punto de no tener el tiempo ni siquiera para visitarlos. Esto es particularmente crítico para los adultos mayores, que son los que más resienten este empobrecimiento del vínculo social, especialmente entre ellos y sus familiares (hijos, nietos, etc.). Esta situación produce aislamiento, y afecta negativamente el estado anímico de esas personas. Producto de la edad, es muy probable que los adultos mayores deban sobrellevar tratamientos médicos de diversa índole. Lamentablemente, los estados anímicos negativos (por ejemplo, depresión) reducen el impacto de fármacos y tratamientos en estas personas. El simple hecho de tener poco tiempo para visitarlos y darles el empujón anímico, afecta las emociones de estas personas. Por lo tanto, es importante que los familiares del adulto mayor sepan cuándo éste pasa por un cuadro de emociones depresivas, para así intentar de corregir o paliar dicha situación de la manera más rápida posible. En este trabajo de memoria se diseñó e implementó un sistema que permite monitoreo del estado anímico de adultos mayores, cuando estos se encuentran al interior de sus hogares. El sistema permite a un usuario monitor, realizar un seguimiento de la persona monitoreada. Además, el sistema informa al monitor, mediante mensajes de texto (emails), cuando el usuario monitoreado está pasando por un cuadro de emociones negativas. El sistema de monitoreo utiliza una tablet PC para tomar registros de audio e imágenes al interior del hogar de estas personas, y en base a esa información, determinar el estado anímico de las personas monitoreadas. Los procesos de reconocimiento de emociones usando audio e imágenes trabajan juntos, de manera de obtener los mejores resultados posibles. En el marco de esta memoria también se desarrolló el sistema de envío automático de alertas, el cual es capaz de notificar a los usuarios de la aplicación, cuando alguno de sus familiares monitoreados necesita apoyo anímico. Si bien es cierto que es bastante complicado el trabajar con las características inherentes a la biometría de una persona para detectar sus emociones, pudimos completar el desarrollo de la aplicación propuesta. Sin embargo, no nos fue posible realizar pruebas en vivo con usuarios reales, por restricciones de tiempo. Por lo tanto, y aunque la aplicación esta funcional, aun se debe medir su impacto real en el escenario de aplicación previsto.
APA, Harvard, Vancouver, ISO, and other styles
21

Pahalawatta, K. K. "Plant species biometric using feature hierarchies : a plant identification system using both global and local features of plant leaves : a thesis submitted in partial fulfilment of the requirement for the degree of Master of Science in Computer Science, Department of Computer Science and Software Engineering, University of Canterbury, Christchurch /." 2008. http://library.canterbury.ac.nz/etd/adt-NZCU20080317.143205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Tavares, André Filipe. "Development of a generic fingerprint authentication framework." Dissertação, 2009. http://hdl.handle.net/10216/61603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Tavares, André Filipe. "Development of a generic fingerprint authentication framework." Master's thesis, 2009. http://hdl.handle.net/10216/61603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Xavier, Jorge Manuel Nunes. "Análise e previsão de séries temporais com modelos ARIMA e análise espectral singular." Master's thesis, 2016. http://hdl.handle.net/10400.2/5873.

Full text
Abstract:
Na nossa sociedade cada vez é mais importante a criação de modelos que nos ajudem a compreender os fenómenos que nos rodeiam, assim como fazer os mais diversos tipos de previsões. Dos diversos tipos de dados disponíveis e recolhidos para posterior análise, serão neste trabalho tratados aqueles que são recolhidos em intervalos de tempo iguais (horas, dias, semanas, etc), ao longo de um período mais ou menos longo, ou seja as Séries Temporais. Escolher o modelo mais fiável, o que dá as previsões mais fidedignas, sempre foi um propósito e uma preocupação para a Estatística ao longo dos tempos. Neste trabalho, são focados em particular os modelos do tipo ARIMA e a Análise Espectral Singular, como ferramentas de trabalho na análise e previsão de séries temporais. Pretendeu-se contribuir um pouco para melhorar a abordagem da análise e previsão das séries temporais, ilustrando com exemplos e recurso ao software R e ao Gretl.
In our society it is increasingly important to create models that help us understand the phenomena that surround us as well as make the most varied types of forecasts. Of the various types of data available and collected for further analysis, in this study we process data collected at equal time intervals (hours, days, weeks, etc.) over a shorter or longer period, that is to say, time series. Choosing the most reliable model, which provides the most reliable forecasts, was always a purpose and a concern for statistics over time. In this work, we focus on particular models of ARIMA type and Spectral Simple Analysis as work tools in the analysis and forecasting of time series. The aim is to compare these two techniques, contributing a little to improve the approach to the analysis and forecasting of time series.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography