Journal articles on the topic 'Biometric software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Biometric software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alam*, Varisha, and Dr Mohammad Arif. "Classification of Large Biometric Data in Database System." International Journal of Innovative Technology and Exploring Engineering 10, no. 10 (August 30, 2021): 1–8. http://dx.doi.org/10.35940/ijitee.d8592.08101021.
Full textNAZAR, AKIF, ISSA TRAORÉ, and AHMED AWAD E. AHMED. "INVERSE BIOMETRICS FOR MOUSE DYNAMICS." International Journal of Pattern Recognition and Artificial Intelligence 22, no. 03 (May 2008): 461–95. http://dx.doi.org/10.1142/s0218001408006363.
Full textMaiorana, Emanuele, Patrizio Campisi, and Alessandro Neri. "Template Protection and Renewability for Dynamic Time Warping Based Biometric Signature Verification." International Journal of Digital Crime and Forensics 1, no. 4 (October 2009): 40–57. http://dx.doi.org/10.4018/jdcf.2009062404.
Full textLI, Peng, Jie TIAN, Xin YANG, Peng SHI, and Yang-Yang ZHANG. "Biometric Template Protection." Journal of Software 20, no. 6 (July 14, 2009): 1553–73. http://dx.doi.org/10.3724/sp.j.1001.2009.03528.
Full textBayly, Duncan, Maurice Castro, Arathi Arakala, Jason Jeffers, and Kathy Horadam. "Fractional biometrics: safeguarding privacy in biometric applications." International Journal of Information Security 9, no. 1 (December 1, 2009): 69–82. http://dx.doi.org/10.1007/s10207-009-0096-z.
Full textPeer, P., Ž. Emeršič, J. Bule, J. Žganec-Gros, and V. Štruc. "Strategies for Exploiting Independent Cloud Implementations of Biometric Experts in Multibiometric Scenarios." Mathematical Problems in Engineering 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/585139.
Full textMing, Anlong, and Huadong Ma. "The Biometrics Grid: A Solution to Biometric Technologies." IEEE Distributed Systems Online 8, no. 9 (September 2007): 1. http://dx.doi.org/10.1109/mdso.2007.4370097.
Full textGu, Datong, Minh Nguyen, and Weiqi Yan. "Cross Models for Twin Recognition." International Journal of Digital Crime and Forensics 8, no. 4 (October 2016): 26–36. http://dx.doi.org/10.4018/ijdcf.2016100103.
Full textKHUWAJA, GULZAR A., and A. N. ABU-REZQ. "DATA ACQUISITION AND RECOGNITION OF FINGERPRINTS WITH LVQ." International Journal of Computational Intelligence and Applications 03, no. 01 (March 2003): 65–88. http://dx.doi.org/10.1142/s1469026803000811.
Full textMilinković, Milorad, Miroslav Minović, and Miloš Milovanović. "Applying Technical Standards to Biometric Systems." International Journal of Decision Support System Technology 8, no. 2 (April 2016): 50–59. http://dx.doi.org/10.4018/ijdsst.2016040104.
Full textRaj, Sunny, Jodh S. Pannu, Steven L. Fernandes, Arvind Ramanathan, Laura L. Pullum, and Sumit K. Jha. "Attacking NIST biometric image software using nonlinear optimization." Pattern Recognition Letters 131 (March 2020): 79–84. http://dx.doi.org/10.1016/j.patrec.2019.12.003.
Full textChandra, Akhilesh, and Thomas G. Calderon. "Toward a Biometric Security Layer in Accounting Systems." Journal of Information Systems 17, no. 2 (September 1, 2003): 51–70. http://dx.doi.org/10.2308/jis.2003.17.2.51.
Full textDe Felice, Elena, Cesare Pacioni, Federico Maria Tardella, Cecilia Dall’Aglio, Antonio Palladino, and Paola Scocco. "A Novel Method for Increasing the Numerousness of Biometrical Parameters Useful for Wildlife Management: Roe Deer Mandible as Bone Model." Animals 10, no. 3 (March 11, 2020): 465. http://dx.doi.org/10.3390/ani10030465.
Full textKotzerke, Johannes, Stephen A. Davis, Jodie McVernon, and Kathy J. Horadam. "Steps to solving the infant biometric problem with ridge‐based biometrics." IET Biometrics 7, no. 6 (April 18, 2018): 567–72. http://dx.doi.org/10.1049/iet-bmt.2017.0282.
Full textThanki, Rohit, Surekha Borra, and Ashish Kothari. "Fragile Watermarking Framework for Tamper Detection of Color Biometric Images." International Journal of Digital Crime and Forensics 13, no. 2 (March 2021): 35–56. http://dx.doi.org/10.4018/ijdcf.2021030103.
Full textPaul, Padma P., and Marina L. Gavrilova. "Cancelable Fusion of Face and Ear for Secure Multi-Biometric Template." International Journal of Cognitive Informatics and Natural Intelligence 7, no. 3 (July 2013): 80–94. http://dx.doi.org/10.4018/ijcini.2013070105.
Full textTrabelsi, Zouheir, Mohamed Al Hemairy, and Mohammad M. Masud. "On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal." Journal of Intelligent Systems 24, no. 2 (June 1, 2015): 199–213. http://dx.doi.org/10.1515/jisys-2014-0049.
Full textHoo, Seng Chun, and Haidi Ibrahim. "Biometric-Based Attendance Tracking System for Education Sectors: A Literature Survey on Hardware Requirements." Journal of Sensors 2019 (September 15, 2019): 1–25. http://dx.doi.org/10.1155/2019/7410478.
Full textConti, Vincenzo, Carmelo Militello, Filippo Sorbello, and Salvatore Vitabile. "Biometric sensors rapid prototyping on field-programmable gate arrays." Knowledge Engineering Review 30, no. 2 (March 2015): 201–19. http://dx.doi.org/10.1017/s0269888914000307.
Full textShao, Huikai, Dexing Zhong, and Xuefeng Du. "A deep biometric hash learning framework for three advanced hand‐based biometrics." IET Biometrics 10, no. 3 (March 16, 2021): 246–59. http://dx.doi.org/10.1049/bme2.12014.
Full textStanton, Brian, Mary Theofanos, Shahram Orandi, Ross Micheals, and Nien-Fan Zhang. "Effects of Scanner Height on Fingerprint Capture." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 10 (October 2007): 592–96. http://dx.doi.org/10.1177/154193120705101005.
Full textRudall, B. H. "Biometric systems." Kybernetes 33, no. 8 (September 2004): 1235–43. http://dx.doi.org/10.1108/03684920410545225.
Full textFàbregas, Joan, and Marcos Faundez-Zanuy. "Biometric dispersion matcher." Pattern Recognition 41, no. 11 (November 2008): 3412–26. http://dx.doi.org/10.1016/j.patcog.2008.04.020.
Full textFairhurst, Michael, Cheng Li, and Márjory Da Costa‐Abreu. "Predictive biometrics: a review and analysis of predicting personal characteristics from biometric data." IET Biometrics 6, no. 6 (July 13, 2017): 369–78. http://dx.doi.org/10.1049/iet-bmt.2016.0169.
Full textKaur, Harkeerat, and Pritee Khanna. "Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing." Future Generation Computer Systems 102 (January 2020): 30–41. http://dx.doi.org/10.1016/j.future.2019.07.023.
Full textEtter, Lauren, Alinani Simukanga, Wenda Qin, Rachel Pieciak, Lawrence Mwananyanda, Margrit Betke, Jackson Phiri, Caroline Carbo, Arnold Hamapa, and Chris Gill. "Project SEARCH (Scanning EARs for Child Health): validating an ear biometric tool for patient identification in Zambia." Gates Open Research 4 (November 6, 2020): 168. http://dx.doi.org/10.12688/gatesopenres.13197.1.
Full textLai, Kenneth, Ondřej Kanich, Michal Dvořák, Martin Drahanský, Svetlana Yanushkevich, and Vlad Shmerko. "Biometric‐enabled watchlists technology." IET Biometrics 7, no. 2 (August 30, 2017): 163–72. http://dx.doi.org/10.1049/iet-bmt.2017.0036.
Full textChinwe C, Ibebuogu, Philip Seth, and Anyaduba Obiageli J. "Biometric Authentication System Using Face Geometry." International Journal of Engineering and Computer Science 8, no. 08 (August 20, 2019): 24805–13. http://dx.doi.org/10.18535/ijecs/v8i08.4332.
Full textBadmus, E. O., O. P. Odekunle, and D. O. Oyewobi. "Smart Fingerprint Biometric and RFID Time-Based Attendance Management System." European Journal of Electrical Engineering and Computer Science 5, no. 4 (July 27, 2021): 34–39. http://dx.doi.org/10.24018/ejece.2021.5.4.339.
Full textGao, Guangwei, Jian Yang, Songsong Wu, Xiaoyuan Jing, and Dong Yue. "Bayesian sample steered discriminative regression for biometric image classification." Applied Soft Computing 37 (December 2015): 48–59. http://dx.doi.org/10.1016/j.asoc.2015.07.034.
Full textHom Choudhury, Surabhi, Amioy Kumar, and Shahedul Haque Laskar. "Biometric Authentication through Unification of Finger Dorsal Biometric Traits." Information Sciences 497 (September 2019): 202–18. http://dx.doi.org/10.1016/j.ins.2019.05.045.
Full textAnil K. Jain and U. Uludag. "Hiding biometric data." IEEE Transactions on Pattern Analysis and Machine Intelligence 25, no. 11 (November 2003): 1494–98. http://dx.doi.org/10.1109/tpami.2003.1240122.
Full textMoline, Danae Bacells. "My face is yours: facial recognition software and copyright ownership." Interactive Entertainment Law Review 3, no. 2 (December 23, 2020): 138–46. http://dx.doi.org/10.4337/ielr.2020.02.06.
Full textMoline, Danae Bacells. "My face is yours: facial recognition software and copyright ownership." Interactive Entertainment Law Review 3, no. 2 (December 23, 2020): 138–46. http://dx.doi.org/10.4337/ielr.2020.02.06.
Full textGomez‐Barrero, Marta, Christian Rathgeb, Ulrich Scherhag, and Christoph Busch. "Predicting the vulnerability of biometric systems to attacks based on morphed biometric information." IET Biometrics 7, no. 4 (March 12, 2018): 333–41. http://dx.doi.org/10.1049/iet-bmt.2017.0144.
Full textTilton, Catherine J. "Biometric Standards — An Overview." Information Security Technical Report 7, no. 4 (December 2002): 36–48. http://dx.doi.org/10.1016/s1363-4127(02)00405-3.
Full textFurnell, Steven, and Nathan Clarke. "Inhabiting the Biometric Society." ITNOW 60, no. 3 (2018): 42–43. http://dx.doi.org/10.1093/itnow/bwy074.
Full textRADHIKA, K. R., S. V. SHEELA, M. K. VENKATESHA, and G. N. SEKHAR. "SIGNATURE AND IRIS AUTHENTICATION BASED ON DERIVED KINEMATIC VALUES." International Journal of Pattern Recognition and Artificial Intelligence 24, no. 08 (December 2010): 1237–60. http://dx.doi.org/10.1142/s021800141000841x.
Full textWing, Brad. "NIST Contributions to Biometric Technology." IT Professional 16, no. 2 (March 2014): 38–44. http://dx.doi.org/10.1109/mitp.2013.89.
Full textO., M., and David Sanka. "Implementation of Advance Encryption Standard (AES) in Biometric Electronic Voting Software." Communications on Applied Electronics 4, no. 3 (January 26, 2016): 30–42. http://dx.doi.org/10.5120/cae2016652052.
Full textLiu-Jimenez, J., R. Sanchez-Reillo, L. Mengibar-Pozo, and O. Miguel-Hurtado. "Optimisation of biometric ID tokens by using hardware/software co-design." IET Biometrics 1, no. 3 (September 1, 2012): 168–77. http://dx.doi.org/10.1049/iet-bmt.2012.0004.
Full textde Luis-Garcı́a, Rodrigo, Carlos Alberola-López, Otman Aghzout, and Juan Ruiz-Alzola. "Biometric identification systems." Signal Processing 83, no. 12 (December 2003): 2539–57. http://dx.doi.org/10.1016/j.sigpro.2003.08.001.
Full textZhifang Wang, Shuangshuang Wang, and Qun Ding. "Security of Multimodal Biometric Fusion System." International Journal of Digital Content Technology and its Applications 5, no. 4 (April 30, 2011): 264–70. http://dx.doi.org/10.4156/jdcta.vol5.issue4.32.
Full textQI, MIAO, JUN KONG, YINGHUA LU, NING DU, and ZHIQIANG MA. "CONTENT-BASED BIOMETRIC IMAGE HIDING APPROACH." International Journal of Pattern Recognition and Artificial Intelligence 25, no. 04 (June 2011): 565–81. http://dx.doi.org/10.1142/s0218001411008701.
Full textKuznetsov, A. A. "Legal Basis of Biometric Methods of Identity Authentication." Economics. Law. Innovaion, no. 1 (March 30, 2021): 85–90. http://dx.doi.org/10.17586/2713-1874-2021-1-85-90.
Full textCrampton, Jeremy W. "Platform Biometrics." Surveillance & Society 17, no. 1/2 (March 31, 2019): 54–62. http://dx.doi.org/10.24908/ss.v17i1/2.13111.
Full textAsthana, Rajesh, Gurjit Singh Walia, and Anjana Gupta. "A novel biometric crypto system based on cryptographic key binding with user biometrics." Multimedia Systems 27, no. 5 (March 11, 2021): 877–91. http://dx.doi.org/10.1007/s00530-021-00768-8.
Full textLagou, Panagiota, and Gregory Chondrokoukis. "Choosing a Biometric for Nonrepudiation." Information Security Journal: A Global Perspective 20, no. 1 (February 11, 2011): 17–24. http://dx.doi.org/10.1080/19393555.2010.544700.
Full textBaig, Asim, Ahmed Bouridane, Fatih Kurugollu, and Badr Albesher. "Cascaded multimodal biometric recognition framework." IET Biometrics 3, no. 1 (March 2014): 16–28. http://dx.doi.org/10.1049/iet-bmt.2012.0043.
Full textBarni, Mauro, Giulia Droandi, Riccardo Lazzeretti, and Tommaso Pignata. "SEMBA: secure multi‐biometric authentication." IET Biometrics 8, no. 6 (August 23, 2019): 411–21. http://dx.doi.org/10.1049/iet-bmt.2018.5138.
Full text