Dissertations / Theses on the topic 'Biometric systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Biometric systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textTitle from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
Ferrara, Matteo <1979>. "Biometric Fingerprint Recognition Systems." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1234/1/TesiFinale_-_Matteo_Ferrara.pdf.
Full textFerrara, Matteo <1979>. "Biometric Fingerprint Recognition Systems." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1234/.
Full textFouad, Marwa. "Towards Template Security for Iris-based Biometric Systems." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22736.
Full textErbilek, Meryem. "Managing ageing effects in biometric systems." Thesis, University of Kent, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.596077.
Full textSvoboda, Jan. "System for Recognition of 3D Hand Geometry." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412913.
Full textBetschart, Willie. "Applying intelligent statistical methods on biometric systems." Thesis, Blekinge Tekniska Högskola, Avdelningen för signalbehandling, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1694.
Full textJohn, George Jacqueline. "Optimising multimodal fusion for biometric identification systems." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418551.
Full textHitchcock, David C. "Evaluation and combination of biometric authentication systems." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002662.
Full textMOMIN, ZAHID AKHTAR SHABBEER AHMAD. "Security of multimodal biometric systems against spoof attacks." Doctoral thesis, Università degli Studi di Cagliari, 2012. http://hdl.handle.net/11584/266071.
Full textBlommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.
Full textVerification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.
Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.
In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.
The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.
Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.
Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.
Osoka, Agu. "Assessing and protecting against vulnerabilities of biometric systems." Thesis, University of Kent, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509630.
Full textYang, Shenglin. "Design and implementation for secure enbedded biometric authentication systems." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1317343341&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Full textWu, Qianqian. "Strategies for intelligent interaction management and usability of biometric systems." Thesis, University of Kent, 2016. https://kar.kent.ac.uk/56887/.
Full textLi, Cheng. "Extending the predictive capabilities of hand-oriented behavioural biometric systems." Thesis, University of Kent, 2016. https://kar.kent.ac.uk/60991/.
Full textPalmberg, Robin C. O. "Enriching Automated Travel Diaries Using Biometric Information." Licentiate thesis, KTH, Systemanalys och ekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-262880.
Full textMetoderna för att samla in resedata från dagens resenärer inkorporerar antingen helt manuella eller halvautomatiska element, vilket gör dessa metoder mottagliga för fel. Resenärerna kan svara subjektivt snarare än objektivet eller helt inkorrekt, antingen med eller utan avsikt. För vissa typer av studier så är dessa metoder fortfarande meningsfulla att använda för datainsamling. Men för särskilda målgrupper kan det vara svårt att svara på undersökningar som använder dessa metoder, antingen på grund av fysiologiska eller psykologiska begränsningar. En av dessa målgrupper, som är stadigt växande, är den äldre befolkningen generellt, men framförallt demenspatienter, som lider av sviktande kognitiva förmågor och minne. Dessa tillstånd påverkar den svarandes förmåga att svara sanningsenligt och korret. Men i strävan efter att skapa mer tillgängliga stadsmiljöer så är informationen angående behovet och beteendet hos den nämnda målgruppen av yttersta vikt, vilket innebär att nya metoder för att samla in resedata behöver skapas. De tre artiklar som har inkluderats i denna avhandling presenterar utvecklingen och försökstestandet av en ny metod för helt automatisk datainsamling med användandet av biometriska data som en dimension. Metoden försöker att avgöra hur den svarande blir påverkad av element de stöter på medan de reser, såsom det byggda samhället, baserat på variationer i den biometriska datadimensionen. Med de snabba framstegen inom informations- och kommunikationsteknik så har nya artefakter som öppnar för nya möjliga metoder av datainsamling lanserats och är allmänt tillgängliga. Dessa metoder och artefakter är inte kapabla till att möta de krav som ställs för den typ av datainsamlingsmetod som krävs för att kunna tillgodose målgruppen på egen hand. Men genom att kombinera flera typer av de nu tillgängliga artefakterna och metoderna så är det teoretiskt möjligt att täcka luckorna som finns i varje artefakt och metod för att skapa en mer mångsidig metod för datainsamling (Artikel I). Sådana metoder kräver verktyg för att fysiskt operationaliseras. En explorativ utvecklingsprocess har lett till skapandet av ett mjukvaruverktyg som skulle kunna användas med flera typer av konsumenttillgänglig hårdvara, vilket betyder att det skulle vara teoretiskt möjligt att genomföra stora undersökningar snabbt med låga kostnader där deltagarna använder sin egen hårdvara (Artikel II). För att förstå användbarheten av verktyget så gjordes en analys på ett begränsat data-set som hade blivit insamlat som ett resultat av ett försökstestande av verktyget. I ett försök att bevisa hypotesen ”det är möjligt att förstå hur mycket dimensionerna av data som samlats in vid specifika platser påverkar stressen hos resenärer med hjälp av puls som den beroende variabeln” så utforskades och användes data-drivna metoder av dataanalys. Enkla metoder, som inte la någon särskild vikt vid någon särskild dimension, användes för att visa om det fanns någon värdefull information i data-setet överhuvudtaget. En modell behövde skapas för att bättre förstå hur de olika dimensionerna av den insamlade datan påverkar deltagaren (Artikel III). Denna samling artiklar är tänkt att ge en indikation på om denna typ av metodik är rimlig att fortsätta utveckla givet de nu tillgängliga teknologierna och vilken sorts signifikans den insamlade datan kan innehålla när den har analyserats med lämpliga analysmetoder.
Rosén, Axel, Erik Sondell, and Evan Khalil. "The case of biometric payment cards: A quantitative study of the behavioural intention to use biometric payment cards among Swedish consumers." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-89795.
Full textLuo, Ying. "Efficient Anonymous Biometric Matching in Privacy-Aware Environments." UKnowledge, 2014. http://uknowledge.uky.edu/ece_etds/46.
Full textRandolph, Adriane. "Individual-Technology Fit: Matching Individual Characteristics and Features of Biometric Interface Technologies with Performance." Digital Archive @ GSU, 2007. http://digitalarchive.gsu.edu/cis_diss/11.
Full textHuang, Xuan. "Mobile security and smart systems : multi-modal biometric authentication on mobile devices." Thesis, Abertay University, 2013. https://rke.abertay.ac.uk/en/studentTheses/ce2dec7b-fdcf-496e-81c4-fb98d0033c78.
Full textFaria, Bruno Guedes. "Implementação e avaliação do ABID (Aplicativo Biométrico de Impressão Digital) utilizando o método fuzzy vault e ferramentas opensource." Universidade Presbiteriana Mackenzie, 2014. http://tede.mackenzie.br/jspui/handle/tede/1442.
Full textUniversidade Presbiteriana Mackenzie
Biometric Systems has increasingly been growing in the past years, mainly those based on fingerprints. In terms of security, they need the same care which is given to traditional systems that uses cards and passwords. The Fuzzy Vault methods comes in this scenario to provide security to biometric systems, specifically, protecting the stored biometric template. This research will present the Fuzzy Vault scheme development and how it can be used to hide a 128 bits secret. The scheme will be used into the context of a biometric application based on fingerprints. Evaluation of security and performance of the application will be shown, as well as the experimental results, common to biometric systems FRR (False Rejection Rate), GAR (Genuine Accept Rate), FAR (False Accept Rate).
A utilização de sistemas biométricos tem apresentado um cenário de crescimento nos últimos anos e que se reflete, principalmente, naqueles que têm a impressão digital como forma de identificação. No que tange à segurança, sistemas baseados em biometria necessitam da mesma preocupação que se tem com sistemas tradicionais de senhas e cartões. Neste contexto, o método Fuzzy Vault aparece para prover a segurança de sistemas biométricos, particularmente, protegendo a amostra biométrica armazenada. Esta pesquisa consiste na implementação do método Fuzzy Vault, aplicando-o para ocultar uma chave de 128 bits, onde o método será utilizado juntamente com algoritmos de código aberto, para o desenvolvimento de um aplicativo biométrico de impressões digitais, denominado por ABID. Serão expostas avaliações sobre o desempenho e segurança do aplicativo e também resultados experimentais comuns a sistemas biométricos, como: Taxa de Falso Aceite (FAR -False Accept Rate), Taxa de Aceite Genuíno (GAR-Genuine Accept Rate) e Taxa de Falsa Rejeição (FRR-False Rejection Rate).
Verett, Marianna J. "Performance and usage of biometrics in a testbed environment for tactical purposes." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FVerett.pdf.
Full textThesis Advisor(s): Alex Bordetsky. "December 2006." Includes bibliographical references (p. 71-74). Also available in print.
Mohanty, Pranab. "Learning from biometric distances : performance and security related issues in face recognition systems." [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0002298.
Full textPg, Hj Mohd Yassin D. K. Hayati Bte. "Novel template ageing techniques to minimise the effect of ageing in biometric systems." Thesis, University of Kent, 2016. https://kar.kent.ac.uk/58398/.
Full textRibeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.
Full textIn our daily life, we use digital identities (DIDs) to access e-mails, e-banks, e-shops, physical environments, shared computers, and so on. Guarantee that only authorized users are granted access is an important aspect in the development of such applications. Nowadays, the simple access control methods like passwords or personal identification numbers can not be considered secure enough, because an impostor can obtain and use these information without user knowledge. Also, physical devices like ID cards can be stolen. To make these systems more reliable, multimodal DID authentication techniques combining different verification steps are proposed. Biometric features appears as one of the most reliable alternatives to deal with this problem because, theoretically, they are unique for each person. Nevertheless, some biometric features like face appearances may change in time, posing a serious challenge for a face recognition system. In this thesis work, we use the traditional password access combined with human face analysis to perform the authentication task. An intuitive supervised appearance learning method is presented, and its adaptation is based on continuously improving face models represented using the Gaussian mixture modeling approach. The experimental results over a reduced test set show encouraging results, with 98% of the users correctly identified, with a relatively small computational effort. Still, the comparison with a method presented in the literature indicated advantages of the proposed method when used as a pre-selector of faces.
Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.
Full textLam, Lawrence G. "Digital Health-Data platforms : biometric data aggregation and their potential impact to centralize Digital Health-Data." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106235.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (page 81).
Digital Health-Data is being collected at unprecedented rates today as biometric micro sensors continue to diffuse into our lives in the form of smart devices, wearables, and even clothing. From this data, we hope to learn more about preventative health so that we can spend less money on the doctor. To help users aggregate this perpetual growth of biometric "big" data, Apple HealthKit, Google Fit, and Samsung SAMI were each created with the hope of becoming the dominant design platform for Digital Health-Data. The research for this paper consists of citings from technology strategy literature and relevant journalism articles regarding recent and past developments that pertain to the wearables market and the digitization movement of electronic health records (EHR) and protected health information (PHI) along with their rules and regulations. The culmination of these citations will contribute to my hypothesis where the analysis will attempt to support my recommendations for Apple, Google, and Samsung. The ending chapters will encompass discussions around network effects and costs associated with multi-homing user data across multiple platforms and finally ending with my conclusion based on my hypothesis.
by Lawrence G. Lam.
S.M. in Engineering and Management
Janečka, Petr. "Multimodální biometrický systém kombinující duhovku a sítnici." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234910.
Full textWalnoha, Michael Anthony. "Shoeprint analysis a GIS application in forensic evidence /." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4639.
Full textTitle from document title page. Document formatted into pages; contains iv, 64 p. : ill. (some col.), maps (some col.). Includes abstract. Includes bibliographical references (p. 63-64).
Бабій, Михайло Семенович, Михаил Семенович Бабий, Mykhailo Semenovych Babii, and В. Н. Падалка. "Распознавание изображений лиц методом многослойных нейронных сетей." Thesis, Видавництво СумДУ, 2010. http://essuir.sumdu.edu.ua/handle/123456789/4384.
Full textIqbal, K. "Image detection and retrieval for biometric security from an image enhancement perspective." Thesis, Coventry University, 2011. http://curve.coventry.ac.uk/open/items/ed5b98d3-84e6-4070-89cb-7ede2f0e9c0b/1.
Full textKlimešová, Lenka. "Identifikace osob pomocí biometrie sítnice." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-378031.
Full textRandolph, Adriane B. "Individual-technology fit matching individual characteristics and features of biometric interface technologies with performance /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-05182007-113229/.
Full textTitle from file title page. Melody Moore, committee chair; Detmar Straub, Veda Storey, Bruce Walker, committee members. Electronic text (166 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Nov. 5, 2007. Includes bibliographical references (p. 160-164).
Sanderson, Conrad, and conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information." Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.
Full textKhan, Shaukat Ali. "Technological and Social Issues in the development and deployment of Facial Recognition Biometric Systems." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1230.
Full textThe demand for user-friendly, reliable, proactive, high performance and highly interoperable biometric devices has grown exponentially. After conducting the case study, collecting data through the questionnaire and reviewing the literature the researchers come to the point that organizations willing to develop or deploy such systems needs to take into account many technical as well as social issues to make the best out of these systems. The extension of face recognition biometric technologies raises new and challenging questions in a society that enshrines privacy and liberty. This system can either enhance or undermine our liberties depending upon its use. A framework is needed by which we may resolve issues pertaining to proper and legitimate deployment and get expected outcome. The framework or centralized structure is needed which will compile and common issues and provide guidelines to face recognition biometric industry.
Robertson, Joshua. "The application of the human-biometric sensor interaction method to automated border control systems." Thesis, University of Kent, 2017. https://kar.kent.ac.uk/66822/.
Full textBin, Mohd Isa Mohd Rizal. "Watermarked face recognition scheme : enhancing the security while maintaining the effectiveness of biometric authentication systems." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/watermarked-face-recognition-scheme(a242609e-ba02-4cca-bfae-3615793fd018).html.
Full textDennis, LeRoy P. Ford Michael K. "The wireless ubiquitous surveillance testbed /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FDennis.pdf.
Full textThesis advisor(s): Alex Bordetsky, Randy J. Hess. Includes bibliographical references (p. 101-105). Also available online.
MALIK, NIKITA. "MULTIVIEW HUMAN GAIT ANALYSIS USING THE FIRST AND THIRD PERSON DATA." Thesis, DELHI TECHNOLOGICAL UNIVERSITY, 2021. http://dspace.dtu.ac.in:8080/jspui/handle/repository/18823.
Full textFeng, Yicheng. "Discriminability and security of binary template in face recognition systems." HKBU Institutional Repository, 2012. https://repository.hkbu.edu.hk/etd_ra/1455.
Full textChan, Siu Man. "Improved speaker verification with discrimination power weighting /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHANS.
Full textIncludes bibliographical references (leaves 86-93). Also available in electronic version. Access restricted to campus users.
Crihalmeanu, Musat C. "Adding liveness detection to the hand geometry scanner." Morgantown, W. Va. : [West Virginia University Libraries], 2003. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3220.
Full textTitle from document title page. Document formatted into pages; contains viii, 96 p. : ill. (some col.) Includes abstract. Includes bibliographical references (p. 72-74).
Teodoro, Felipe Gustavo Silva. "Seleção de características para reconhecimento biométrico baseado em sinais de eletrocardiograma." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/100/100131/tde-19122016-003653/.
Full textThe field of biometrics includes a variety of technologies used to identify and verify the identity of a person by measuring and analyzing various physical and/or behavioral aspects of the human being. Several biometric modalities have been proposed for recognition of people, such as fingerprints, iris, face and speech. These biometric modalities have distinct characteristics in terms of performance, measurability and acceptability. One issue to be considered with the application of biometric systems in real world is its robustness to attacks by circumvention, spoof and obfuscation. These attacks are becoming more frequent and more questions are being raised about the levels of security that this technology can offer. Recently, biomedical signals, as electrocardiogram (ECG), electroencephalogram (EEG) and electromyogram (EMG) have been studied for use in problems involving biometric recognition. The ECG signal formation is a function of structural and functional anatomy of the heart and its surrounding tissues. Therefore, the ECG of an individual exhibits unique cardiac pattern and cannot be easily forged or duplicated, that have motivated its use in various identification systems. However, the amount of features that can be extracted from this signal is very large. The feature selection has become the focus of much research in areas where databases formed by tens or hundreds of thousands of features are available. Feature Selection helps in understanding data, reducing computation requirement, reducing the effect of curse of dimensionality and improving the predictor performance. The focus of feature selection is to select a subset of features from the input which can efficiently describe the input data while reducing effects from noise or irrelevant features and still provide good prediction results. The aim of this dissertation is to analyze the impact of some feature selection techniques, such as, greedy search, Backward Selection, Genetic Algorithm, Memetic Algorithm, Particle Swarm Optimization on the performance achieved by biometric systems based on ECG. The classifiers used were $k$-Nearest Neighbors, Support Vector Machines, Optimum-Path Forest and minimum distance classifier. The results demonstrate that there is a subset of features extracted from the ECG signal capable of providing high recognition rates
Alhamdi, Mustafa. "Analysis of human electrocardiogram for arrhythmia auto-classification and biometric recognition systems using analytic and autoregressive modeling parameters." Thesis, University of Portsmouth, 2015. https://researchportal.port.ac.uk/portal/en/theses/analysis-of-human-electrocardiogram-for-arrhythmia-autoclassification-and-biometric-recognition-systems-using-analytic-and-autoregressive-modeling-parameters(7bb302a7-cb94-4df2-b04a-aac1ade0beee).html.
Full textAkinbola, Akintunde A. "Estimation of image quality factors for face recognition." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4308.
Full textTitle from document title page. Document formatted into pages; contains vi, 56 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 52-56).
Ford, Michael K., and LeRoy P. Dennis. "The wireless ubiquitous surveillance testbed." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1124.
Full textThis thesis research examines the emergence of surveillance and biometrics technologies as a sensible baseline for building a ubiquitous surveillance testbed for the Naval Postgraduate School. This thesis also defines what ubiquitous surveillance is, employs biometric applications and technical strategies to build a working testbed, and addresses developmental issues surrounding the hypothesis for a ubiquitous surveillance testbed. The authors conducted several evaluations of the testbed using different scenarios and recommend emerging biometric and surveillance technologies to promote the maturation of the testbed into a premier ubiquitous habitat.
Lieutenant, United States Navy
Lieutenant, United States Navy
Brown, Dane. "Investigating combinations of feature extraction and classification for improved image-based multimodal biometric systems at the feature level." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/63470.
Full textGalvão, João Neto Cronemberger. "MABIS: Sistema Automático de Biometria Modulado." Universidade Federal de Goiás, 2017. http://repositorio.bc.ufg.br/tede/handle/tede/7035.
Full textApproved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2017-03-28T13:49:38Z (GMT) No. of bitstreams: 2 Dissertação - João Neto Cronemberger Galvão - 2017.pdf: 3677244 bytes, checksum: 131ab2bd6a3da711a718560ca96c89b6 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2017-03-28T13:49:38Z (GMT). No. of bitstreams: 2 Dissertação - João Neto Cronemberger Galvão - 2017.pdf: 3677244 bytes, checksum: 131ab2bd6a3da711a718560ca96c89b6 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-02-17
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
Over the years, biometrics has become a valuable resource for human identification be- cause it is an affordable, safe and reliable technique. Various security entities throughout the world, public and private, are committed to the use of biometrics in security; both in access control and for identifying suspects. In addition, many crimes can be prevented with tools that allow crosschecking of biometric data. However, biometric systems cur- rently in use are developed and provided by companies as proprietary systems. For this reason, the creation of a free and open tool will bring more security, control and savings for the government. For this reason, the objective of this work is to create a prototype of a free and open tool, developed within the Web Services approach, associated to the development of an API that will aim at a standardization of biometrics services, conside- ring the exchange of data between distinct and independent biometric applications with a low level of coupling and interoperability between systems of different platforms and technologies, so that it is possible to add to the service and use of multiple biometric functionalities such as face recognition, voice, fingerprints, hand geometry, iris, or even a combination, among others, to perform a task of personal identification.
A cada dia que passa, a biometria vem se tornando um recurso valioso para identifica- ção humana, pois trata-se de uma técnica acessível, segura e confiável. Várias entidades de segurança, por todo o mundo, públicas e privadas, estão empenhadas na utilização da biometria na área de segurança, tanto no controle de acesso, quanto para identifica- ção de investigados. Além disso, diversos crimes podem ser evitados com ferramentas que possibilitam o cruzamento de dados biométricos. No entanto, a maioria dos sistemas biométricos em uso atualmente são desenvolvidos e fornecidos por empresas como siste- mas proprietários, desenvolvidos isoladamente, sem o compartilhamento de informações e base de dados, não atendendo, a contento, as necessidades de agentes governamentais no que se refere à escala, controle e economia no uso das aplicações de biometria. Por esta razão, o objetivo deste trabalho será a criação de um protótipo de uma ferramenta livre e aberta, desenvolvida dentro da abordagem de Serviços Web, associado ao desen- volvimento de uma API que visará a padronização dos serviços de biometria, tendo em vista o intercâmbio de dados entre aplicações biométricas distintas e independentes, com um nível reduzido de acoplamento e com interoperabilidade entre sistemas de diferentes plataformas e tecnologias, de modo que seja possível agregar ao serviço o uso de várias funcionalidades biométricas tais como: o reconhecimento de face, a voz, as impressões digitais, a geometria da mão, a íris, ou mesmo a combinação destas, dentre outras, para executar a tarefa de identificação pessoal.
Pisani, Paulo Henrique. "Biometrics in a data stream context." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08052017-141153/.
Full textA crescente presença da Internet nas tarefas do dia a dia, juntamente com a evolução dos sistemas computacionais, contribuiu para aumentar a exposição dos dados. Esse cenário evidencia a necessidade de sistemas de autenticação de usuários mais seguros. Uma alternativa para lidar com isso é pelo uso de sistemas biométricos. Contudo, características biométricas podem mudar com o tempo, o que pode afetar o desempenho de reconhecimento devido a uma referência biométrica desatualizada. Esse efeito pode ser chamado de template ageing na área de sistemas biométricos adaptativos ou de mudança de conceito em aprendizado de máquina. Isso levanta a necessidade de adaptar automaticamente a referência biométrica com o tempo, uma tarefa executada por sistemas biométricos adaptativos. Esta tese estudou sistemas biométricos adaptativos considerando biometria em um contexto de fluxo de dados. Neste contexto, o teste é executado em um fluxo de dados biométrico, em que as amostras de consulta são apresentadas uma após a outra para o sistema biométrico. Um sistema biométrico adaptativo deve então classificar cada consulta e adaptar a referência biométrica. A decisão de executar a adaptação é tomada pelo sistema biométrico. Dentre as modalidades biométricas, esta tese foca em biometria comportamental, em particular em dinâmica da digitação e em biometria por acelerômetro. Modalidades comportamentais tendem a ser sujeitas a mudanças mais rápidas do que modalidades físicas. Entretanto, havia poucos estudos lidando com sistemas biométricos adaptativos para modalidades comportamentais, destacando uma lacuna para ser explorada. Ao longo da tese, diversos aspectos para aprimorar o projeto de sistemas biométricos adaptativos para modalidades comportamentais em um contexto de fluxo de dados foram discutidos: proposta de estratégias de adaptação para o algoritmo de classificação imunológico Self-Detector, combinação de modelos genuíno e impostor no framework do Enhanced Template Update e aplicação de normalização de scores em sistemas biométricos adaptativos. Com base na investigação desses aspectos, foi observado que a melhor escolha para cada aspecto estudado dos sistemas biométricos adaptativos pode ser diferente dependendo do conjunto de dados e, além disso, dependendo dos usuários no conjunto de dados. As diferentes características dos usuários, incluindo a forma como as características biométricas mudam com o tempo, sugerem que as estratégias de adaptação deveriam ser escolhidas por usuário. Isso motivou a proposta de um sistema biométrico adaptativo modular, chamado ModBioS, que pode escolher cada um desses aspectos por usuário. O ModBioS é capaz de generalizar diversos sistemas baseline e propostas apresentadas nesta tese em um framework modular, juntamente com a possibilidade de atribuir estratégias de adaptação diferentes por usuário. Resultados experimentais mostraram que o sistema biométrico adaptativo modular pode superar diversos sistemas baseline, enquanto que abre um grande número de oportunidades para trabalhos futuros.
Silonosov, Alexandr. "Identifying the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics, an experiment." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20124.
Full text