Academic literature on the topic 'Biometric systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometric systems"

1

., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.

Full text
Abstract:
Biometrics is the discipline to measure physical human characteristics for the identification and authentication of an individual. Since ancient times, people have used voice, face, and other characteristics for the identification of an individual. With evolution, we take the individual characteristics like fingerprint scans, retina and iris images, etc., as inputs to the computer systems and then store or verify them with existing records. This report discusses biometrics and its recent roles found in the field of healthcare, medicine, genetics, and biotechnology. It includes the concept of b
APA, Harvard, Vancouver, ISO, and other styles
2

Shopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, and Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions." Journal of Cybersecurity and Privacy 1, no. 3 (2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.

Full text
Abstract:
Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of
APA, Harvard, Vancouver, ISO, and other styles
3

Buciu, Ioan, and Alexandru Gacsadi. "Biometrics Systems and Technologies: A survey." International Journal of Computers Communications & Control 11, no. 3 (2016): 315. http://dx.doi.org/10.15837/ijccc.2016.3.2556.

Full text
Abstract:
In a nutshell, a biometric security system requires a user to provide some biometric features which are then verified against some stored biometric templates. Nowadays, the traditional password based authentication method tends to be replaced by advanced biometrics technologies. Biometric based authentication is becoming increasingly appealing and common for most of the human-computer interaction devices. To give only one recent example, Microsoft augmented its brand new Windows 10 OS version with the capability of supporting face recognition when the user login in. This chapter does not inten
APA, Harvard, Vancouver, ISO, and other styles
4

Mohamed, El Beqqal, Azizi Mostafa, and Louis Lanet Jean. "Multimodal access control system combining RFID, fingerprint and facial recognition." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 405–13. https://doi.org/10.11591/ijeecs.v20.i1.pp405-413.

Full text
Abstract:
Monomodal biometry does not constitute an effective measure to meet the desired performance requirements for large-scale applications, due to limitations such as noisy data, restricted degree of freedom and unacceptable error rates. Some of these problems can be solved through multimodal biometric systems that involve using a combination of two or more biometric modalities in a single identification system. Identification based on multiple biometrics represents an emerging trend. The reason for combining different modalities is to improve the recognition rate. In practice, multi-biometric aims
APA, Harvard, Vancouver, ISO, and other styles
5

Reddy, M. V. Bramhananda, and V. Goutham. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research -GRANTHAALAYAH 6, no. 1 (2018): 80–90. http://dx.doi.org/10.29121/granthaalayah.v6.i1.2018.1596.

Full text
Abstract:
Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using iris or along with other biometrics for security with great precision. Multimodal biometric systems cam
APA, Harvard, Vancouver, ISO, and other styles
6

Dr, M. V. Bramhananda Reddy, and V. Goutham Dr. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research - Granthaalayah 6, no. 1 (2018): 80–90. https://doi.org/10.5281/zenodo.1162210.

Full text
Abstract:
Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using iris or along with other biometrics for security with great precision. Multimodal biometric systems cam
APA, Harvard, Vancouver, ISO, and other styles
7

Rajvanshi, Saumya, Shiv Chauhan, and Savneet Kaur. "A New Wave in Biometric System: Systematic Study." CGC International Journal of Contemporary Technology and Research 4, no. 2 (2022): 300–305. http://dx.doi.org/10.46860/cgcijctr.2022.07.31.300.

Full text
Abstract:
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometrics like face recognition, fingerprint recognition, iris recognition and behavioral biometrics like signature recognition and voice rec
APA, Harvard, Vancouver, ISO, and other styles
8

Choudhury, Bismita, Patrick Then, Biju Issac, Valliappan Raman, and Manas Kumar Haldar. "A Survey on Biometrics and Cancelable Biometrics Systems." International Journal of Image and Graphics 18, no. 01 (2018): 1850006. http://dx.doi.org/10.1142/s0219467818500067.

Full text
Abstract:
Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a fea
APA, Harvard, Vancouver, ISO, and other styles
9

Mudhafer Taher Al Mossawy, Mais, and Loay E. George. "A digital signature system based on hand geometry - Survey." Wasit Journal of Computer and Mathematics Science 1, no. 1 (2022): 1–14. http://dx.doi.org/10.31185/wjcm.vol1.iss1.18.

Full text
Abstract:
In recent years large number of emerging automated applications faces the need to have recognition abilities of persons using their own self biometrics, before they can access the applications services. Nowadays, Biometric recognition is used, it can be used as automatic identification or automatic verification of persons based on their physiological or behavioral characteristics. There are no perfect biometric measurements;each biometry has its advantages and limitations. Each biometry requires specific vital identity to answer the identification or verification question. The suitability of a
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Ms Neha. "A New Wave in Biometric System: Systematic Study incorporated with Artificial Intelligence." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33563.

Full text
Abstract:
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometric like face recognition, finger print recognition, ir is recognition and behavioral biometrics like signature recognition and voice re
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Biometric systems"

1

Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
Abstract:
Thesis (Ph. D.)--Michigan State University. Dept. of Computer Science and Engineering, 2008.<br>Title from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Ferrara, Matteo <1979&gt. "Biometric Fingerprint Recognition Systems." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1234/1/TesiFinale_-_Matteo_Ferrara.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ferrara, Matteo <1979&gt. "Biometric Fingerprint Recognition Systems." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1234/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fouad, Marwa. "Towards Template Security for Iris-based Biometric Systems." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22736.

Full text
Abstract:
Personal identity refers to a set of attributes (e.g., name, social insurance number, etc.) that are associated with a person. Identity management is the process of creating, maintaining and destroying identities of individuals in a population. Biometric technologies are technologies developed to use statistical analysis of an individual’s biological or behavioral traits to determine his identity. Biometrics based authentication systems offer a reliable solution for identity management, because of their uniqueness, relative stability over time and security (among other reasons). Public accepta
APA, Harvard, Vancouver, ISO, and other styles
5

Svoboda, Jan. "System for Recognition of 3D Hand Geometry." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412913.

Full text
Abstract:
V posledním desetiletí došlo ke zvýšení zájmu o užití 3D dat k biometrické identifikaci osob. Možná vůbec největší výzkum proběhl v oblasti 3D rozpoznávání podle obličeje, přičemž je v současné době dostupných vícero komerčních zařízení. V oblastni rozpoznávání podle 3D geometrie ruky byl v minulých letech proveden určitý výzkum jehož výsledkem však nebylo žádné komerční zařízení. Nezávisle na tomto výzkumu se v posledních letech velmi rozšířil trh s cenově dostupnými 3D sensory, což potenciálně umožňuje jejich nasazení v mnoha typech biometrických systémů. Hlavním cílem této práce je vytvořit
APA, Harvard, Vancouver, ISO, and other styles
6

Erbilek, Meryem. "Managing ageing effects in biometric systems." Thesis, University of Kent, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.596077.

Full text
Abstract:
Biometric systems deal with the problem of determining or authenticating the identity of individuals based on measurements of their physiological or behavioural characteristics. However, these characteristics are likely to change with the natural ageing process (passage of time) and, as a result, developing biometric applications for long-term use becomes a particularly challenging task. Thus, increasingly, an understanding of the ageing process is becoming an important issue in terms of ensuring reliability in the face of changing data scenarios in biometric systems. In fact, both physical ag
APA, Harvard, Vancouver, ISO, and other styles
7

Betschart, Willie. "Applying intelligent statistical methods on biometric systems." Thesis, Blekinge Tekniska Högskola, Avdelningen för signalbehandling, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1694.

Full text
Abstract:
This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The layer is influenced by the general procedure of biometrics in a multimodal behavioural way. It is workin
APA, Harvard, Vancouver, ISO, and other styles
8

John, George Jacqueline. "Optimising multimodal fusion for biometric identification systems." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hitchcock, David C. "Evaluation and combination of biometric authentication systems." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

MOMIN, ZAHID AKHTAR SHABBEER AHMAD. "Security of multimodal biometric systems against spoof attacks." Doctoral thesis, Università degli Studi di Cagliari, 2012. http://hdl.handle.net/11584/266071.

Full text
Abstract:
A biometric system is essentially a pattern recognition system being used in ad-versarial environment. Since, biometric system like any conventional security system is exposed to malicious adversaries, who can manipulate data to make the system ineffective by compromising its integrity. Current theory and de- sign methods of biometric systems do not take into account the vulnerability to such adversary attacks. Therefore, evaluation of classical design methods is an open problem to investigate whether they lead to design secure systems. In order to make biometric systems secure it is necessary
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Biometric systems"

1

Wayman, James, Anil Jain, Davide Maltoni, and Dario Maio, eds. Biometric Systems. Springer London, 2005. http://dx.doi.org/10.1007/b138151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gupta, Rashmi, and Manju Khari. Multimodal Biometric Systems. CRC Press, 2021. http://dx.doi.org/10.1201/9781003138068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rattani, Ajita, Fabio Roli, and Eric Granger, eds. Adaptive Biometric Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24865-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vacca, John R. Biometric technologies and verification systems. Butterworth-Heinemann/Elsevier, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Chengjun, and Vijay Kumar Mago. Cross Disciplinary Biometric Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28457-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Chengjun. Cross Disciplinary Biometric Systems. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith-Creasey, Max. Continuous Biometric Authentication Systems. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-49071-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bodade, Rajesh M. Iris analysis for biometric recognition systems. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Obaidat, Mohammad S., Issa Traore, and Isaac Woungang, eds. Biometric-Based Physical and Cybersecurity Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-98734-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bodade, Rajesh M., and Sanjay N. Talbar. Iris Analysis for Biometric Recognition Systems. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1853-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Biometric systems"

1

Genovese, Angelo, Vincenzo Piuri, and Fabio Scotti. "Biometric Systems." In Advances in Information Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10365-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Martin, Alvin, Mark Przybocki, and Joseph P. Campbell. "The NIST speaker recognition evaluation program." In Biometric Systems. Springer London, 2005. http://dx.doi.org/10.1007/1-84628-064-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ashbourn, Julian. "Biometric Systems Defined." In Guide to Biometrics for Large-Scale Systems. Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-467-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Richiardi, Jonas, and Krzysztof Kryszczuk. "Biometric Systems Evaluation." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

De Marsico, Maria. "Biometric Systems Evaluation." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1605-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shukla, Anupam, Ritu Tiwari, and Rahul Kala. "Multimodal Biometric Systems." In Towards Hybrid and Adaptive Computing. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14344-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dhole, Sampada, and Vinayak Bairagi. "Unimodal Biometric Systems." In Multimodal Biometric Identification System. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032665993-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

De Marsico, Maria. "Biometric Systems Evaluation." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ding, Sophia, Emilia Nunes, Pascal Bettendorff, and Weyde Lin. "Biometrics." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_22.

Full text
Abstract:
AbstractIn biometrics, physiological characteristics (e.g., fingerprints, facial features, voices) are measured to identify individuals. Since biometry does not share the same characteristics as other authentication techniques, such as passwords or PIN codes, it is widely used as a second-factor authentication. A fully integrated solution offers significant advantages as it aligns biometric hardware, key generation, validation, and storage with the cryptographic provider, providing a coherent control environment. As a result, designing and implementing secure biometric authentication methods r
APA, Harvard, Vancouver, ISO, and other styles
10

Zhu, Wei-Jian, Chuan-Zhi Zhuang, Jing-Wei Liu, and Ming Huang. "Design of Multimodal Biometric Information Management System Based on Commercial Systems." In Biometric Recognition. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97909-0_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometric systems"

1

Chaudhari, Archana Y., Jagannath Kulkarni, Ujjwala Dube, Atharva Ghorpade, Shivam Sakore, and Anil Kumar Gupta. "A Biometric Authentication System By Embedding Biometrics in QR Codes." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Savithri, C. N., S. Lakshman Arun, B. S. Pradyumna Bhat, N. Udhaya Kiran, and S. Sriharan. "CRYPTOGUARD – IoT Biometric Home Security." In 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2024. https://doi.org/10.1109/icpects62210.2024.10780420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Juneja, Akshay, Priyanka Kumari, Monika Bharti, Himanshu Jindal, Girish Wadhwa, and Pirmohammad Khan. "Revival of Fingerprint Recognition-based Biometric Systems." In 2024 Eighth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2024. https://doi.org/10.1109/pdgc64653.2024.10984054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Talabi, A. A., O. B. Longe, A. A. Muhammad, and K. Olusanya. "Cybersecurity Risk Management in Identity Systems using Biometric-based Multimodal Authentication." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28n2p5.

Full text
Abstract:
This increasing inter-connectivity of systems and dependence on computer and internet-based networks has made Cybersecurity related risks management issues major considerations in designing, developing and managing identity systems. Thus, this paper investigates Cybersecurity and related risk management challenges in Identity Management Systems by undertaking a comparative analysis of different biometric traits. The analysis proved that biometric-based multimodal systems are more secure than uni-modal systems with high accuracy rates. Also, it produced minimal false acceptance and false reject
APA, Harvard, Vancouver, ISO, and other styles
5

Gilady, Erez, Dale Lindskog, and Shaun Aghili. "Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems." In 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2014. http://dx.doi.org/10.1109/waina.2014.133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chudobova, Michaela, Jan Kubicek, Radomir Scurek, and Marek Hutter. "IMPLEMENTATION OF INTELLIGENT BIOMETRIC SYSTEM FOR FACE DETECTION AND CLASSIFICATION." In 22nd SGEM International Multidisciplinary Scientific GeoConference 2022. STEF92 Technology, 2022. http://dx.doi.org/10.5593/sgem2022/2.1/s07.06.

Full text
Abstract:
This article deals with the design and implementation of an intelligent biometric system that allows the detection and classification of a person's face from static image data and creates a system for evaluating its reliability. In its introductory part, it theoretically describes applied biometrics and biometric systems for security identification and user verification, and also deals with the theory of the description of algorithms for human face detection and recognition. Subsequently, the authors use the MATLAB programming language, which is highly optimized for modern processors and memor
APA, Harvard, Vancouver, ISO, and other styles
7

Taouche, Cherif, Mohamed C. Batouche, Mohamed Berkane, and Abdelmalik Taleb-Ahmed. "Multimodal biometric systems." In 2014 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2014. http://dx.doi.org/10.1109/icmcs.2014.6911308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yanushkevich, S. N. "Synthetic Biometrics for Training Users of Biometric and Biomedical Systems." In 2011 International Conference on Cyberworlds (CW). IEEE, 2011. http://dx.doi.org/10.1109/cw.2011.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wouters, Niels, Ryan Kelly, Eduardo Velloso, et al. "Biometric Mirror." In DIS '19: Designing Interactive Systems Conference 2019. ACM, 2019. http://dx.doi.org/10.1145/3322276.3322304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pisani, Paulo Henrique. "A study on user-specific threshold configuration for keystroke dynamics in the context of adaptive biometric systems." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg.2024.241289.

Full text
Abstract:
Keystroke dynamics is a biometric modality which can be applied as an additional authentication factor. Some studies have shown that keystroke data can change over time and, consequently, a biometric system which does not update the biometric reference acquired at enrolment time may face performance degradation. Adaptive biometric systems can be applied in this case and automatically adapt the biometric reference. An important aspect of these systems is how the thresholds are defined. Thresholds can be used for classification and to define which samples will be used for adaptation. A few studi
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Biometric systems"

1

Wilson, C. L., and R. M. McCabe. Simple test procedure for image-based biometric verification systems. National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Y., J. J. Filliben, R. J. Michaels, and P. J. Phillips. Sensitivity Analysis for Biometric Systems: A Methodology Based on Orthogonal Experiment Designs. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.ir.7855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Varastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani, and Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, 2020. http://dx.doi.org/10.34074/ocds.086.

Full text
Abstract:
Authentication methods based on human traits, including fingerprint, face, iris, and palm print, have developed significantly, and currently they are mature enough to be reliably considered for human identification purposes. Recently, as a new research area, a few methods based on non-facial skin features such as vein patterns have been developed. This literature review paper explores some key biometric systems such as face recognition, iris recognition, fingerprint, and palm print, and discusses their respective advantages and disadvantages; then by providing a comprehensive analysis of these
APA, Harvard, Vancouver, ISO, and other styles
4

Newton, Elaine, Gerry Coleman, and Patrice Yuh. Information systems-data format for the interchange of fingerprint, facial, & other biometric information- part 2 :. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.500-275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
6

Faith, Becky, and Tony Roberts. Managing the Risk and Benefits of Digital Technologies in Social Assistance Provision. Institute of Development Studies (IDS), 2022. http://dx.doi.org/10.19088/basic.2022.025.

Full text
Abstract:
Aid agencies, governments, and donors are expanding investment in the digitisation of their beneficiary identification and registration systems, in digitised systems for cash payments, and in the remote and algorithmic control of humanitarian and social protection programmes. This is happening in ways that may facilitate the move from humanitarian assistance to government provision and may enable the delivery of shock-responsive social protection. Yet humanitarian and social protection actors are increasingly concerned about a range of risks and accountability vacuums associated with the adopt
APA, Harvard, Vancouver, ISO, and other styles
7

Kulhandjian, Hovannes. Detecting Driver Drowsiness with Multi-Sensor Data Fusion Combined with Machine Learning. Mineta Transportation Institute, 2021. http://dx.doi.org/10.31979/mti.2021.2015.

Full text
Abstract:
In this research work, we develop a drowsy driver detection system through the application of visual and radar sensors combined with machine learning. The system concept was derived from the desire to achieve a high level of driver safety through the prevention of potentially fatal accidents involving drowsy drivers. According to the National Highway Traffic Safety Administration, drowsy driving resulted in 50,000 injuries across 91,000 police-reported accidents, and a death toll of nearly 800 in 2017. The objective of this research work is to provide a working prototype of Advanced Driver Ass
APA, Harvard, Vancouver, ISO, and other styles
8

Koskelo, Markku, Steven Kadner, and Steven Horowitz. Biometric Access Control System Industrialization. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1763279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Тарасова, Олена Юріївна, and Ірина Сергіївна Мінтій. Web application for facial wrinkle recognition. Кривий Ріг, КДПУ, 2022. http://dx.doi.org/10.31812/123456789/7012.

Full text
Abstract:
Facial recognition technology is named one of the main trends of recent years. It’s wide range of applications, such as access control, biometrics, video surveillance and many other interactive humanmachine systems. Facial landmarks can be described as key characteristics of the human face. Commonly found landmarks are, for example, eyes, nose or mouth corners. Analyzing these key points is useful for a variety of computer vision use cases, including biometrics, face tracking, or emotion detection. Different methods produce different facial landmarks. Some methods use only basic facial landmar
APA, Harvard, Vancouver, ISO, and other styles
10

Roberts, Tony, Judy Gitahi, Patrick Allam, et al. Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia. Institute of Development Studies, 2023. http://dx.doi.org/10.19088/ids.2023.027.

Full text
Abstract:
African governments are spending over 1US$bn per year on digital surveillance technologies which are being used without adequate legal protections in ways that regularly violate citizens’ fundamental human rights. This report documents which companies, from which countries, are supplying which types of surveillance technology to African governments. Without this missing detail, it is impossible to adequately design measures to mitigate and overcome illegal surveillance and violations of human rights. Since the turn of the century, we have witnessed a digitalisation of surveillance that has ena
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!