To see the other types of publications on this topic, follow the link: Biometric systems.

Dissertations / Theses on the topic 'Biometric systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Biometric systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
Abstract:
Thesis (Ph. D.)--Michigan State University. Dept. of Computer Science and Engineering, 2008.
Title from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Ferrara, Matteo <1979&gt. "Biometric Fingerprint Recognition Systems." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1234/1/TesiFinale_-_Matteo_Ferrara.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ferrara, Matteo <1979&gt. "Biometric Fingerprint Recognition Systems." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1234/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fouad, Marwa. "Towards Template Security for Iris-based Biometric Systems." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22736.

Full text
Abstract:
Personal identity refers to a set of attributes (e.g., name, social insurance number, etc.) that are associated with a person. Identity management is the process of creating, maintaining and destroying identities of individuals in a population. Biometric technologies are technologies developed to use statistical analysis of an individual’s biological or behavioral traits to determine his identity. Biometrics based authentication systems offer a reliable solution for identity management, because of their uniqueness, relative stability over time and security (among other reasons). Public acceptance of biometric systems will depend on their ability to ensure robustness, accuracy and security. Although robustness and accuracy of such systems are rapidly improving, there still remain some issues of security and balancing it with privacy. While the uniqueness of biometric traits offers a convenient and reliable means of identification, it also poses the risk of unauthorized cross-referencing among databases using the same biometric trait. There is also a high risk in case of a biometric database being compromised, since it’s not possible to revoke the biometric trait and re-issue a new one as is the case with passwords and smart keys. This unique attribute of biometric based authentication system poses a challenge that might slow down public acceptance and the use of biometrics for authentication purposes in large scale applications. In this research we investigate the vulnerabilities of biometric systems focusing on template security in iris-based biometric recognition systems. The iris has been well studied for authentication purposes and has been proven accurate in large scale applications in several airports and border crossings around the world. The most widely accepted iris recognition systems are based on Daugman’s model that creates a binary iris template. In this research we develop different systems using watermarking, bio-cryptography as well as feature transformation to achieve revocability and security of binary templates in iris based biometric authentication systems, while maintaining the performance that enables widespread application of these systems. All algorithms developed in this research are applicable on already existing biometric authentication systems and do not require redesign of these existing, well established iris-based authentication systems that use binary templates.
APA, Harvard, Vancouver, ISO, and other styles
5

Erbilek, Meryem. "Managing ageing effects in biometric systems." Thesis, University of Kent, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.596077.

Full text
Abstract:
Biometric systems deal with the problem of determining or authenticating the identity of individuals based on measurements of their physiological or behavioural characteristics. However, these characteristics are likely to change with the natural ageing process (passage of time) and, as a result, developing biometric applications for long-term use becomes a particularly challenging task. Thus, increasingly, an understanding of the ageing process is becoming an important issue in terms of ensuring reliability in the face of changing data scenarios in biometric systems. In fact, both physical ageing (the effects of ageing across the whole ageing cycle on the biometric measurements used in the identification process) and template ageing (the effects of ageing across the time elapsed between enrolment and authentication) are important in a pmcticaJ context, and while these are obviously related phenomena, they are not the same thing, since template ageing also depends to some extent on the physical age of the subject within the relevant time frame. This thesis will describe a study to explore some important issues related to physical ageing issues of particular importance in biometric systems, in order to provide an improved understanding of the ageing problem which might be able to have a positive influence on the design, deployment and management of ageing issues in future biometric systems. We will explore and present quantitatively the results of a detaiJed investigation into the physical effects of ageing, will discuss the relationships between physical ageing and interrelated physical factors which have a bearing on how the impact of ageing can most effectively be investigated and understood, and will show how these factors can be manipulated in order to guide practical implementation towards achieving more reliable performance. We study two established and widely used biometric modalities, iris and signature, to provide a practical environment for experimentation and analysis.
APA, Harvard, Vancouver, ISO, and other styles
6

Svoboda, Jan. "System for Recognition of 3D Hand Geometry." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412913.

Full text
Abstract:
V posledním desetiletí došlo ke zvýšení zájmu o užití 3D dat k biometrické identifikaci osob. Možná vůbec největší výzkum proběhl v oblasti 3D rozpoznávání podle obličeje, přičemž je v současné době dostupných vícero komerčních zařízení. V oblastni rozpoznávání podle 3D geometrie ruky byl v minulých letech proveden určitý výzkum jehož výsledkem však nebylo žádné komerční zařízení. Nezávisle na tomto výzkumu se v posledních letech velmi rozšířil trh s cenově dostupnými 3D sensory, což potenciálně umožňuje jejich nasazení v mnoha typech biometrických systémů. Hlavním cílem této práce je vytvořit funkční vzorek bezdotykového systému pro rozpoznávání osob podle 3D geometrie ruky, který bude používat novou levnou kameru RealSense 3D vyvíjenou v současné době firmou Intel. Jedním z problémů při použití RealSense kamery je její velmi malý form factor, který je příčinou nižší kvality výsledných snímků v porovnání s velmi drahými alternativami, které byly použity v již dříve zmíněném výzkumu 3D biometrických systémů. Práce se snaží analyzovat robustnost různých 2D a 3D příznaků a vyzkoušet několik různých přístupů k jejich fúzi. Rovněž je vyhodnocena výkonnost výsledného systému, kde je ukázáno, že navržené řešení dosahuje výsledků porovnatelných se state-of-the-art.
APA, Harvard, Vancouver, ISO, and other styles
7

Betschart, Willie. "Applying intelligent statistical methods on biometric systems." Thesis, Blekinge Tekniska Högskola, Avdelningen för signalbehandling, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1694.

Full text
Abstract:
This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The layer is influenced by the general procedure of biometrics in a multimodal behavioural way. It is working in an unsupervised way and performs in an unsupervised manner. While biometric systems are increasingly adopted the technologies have some inherent problems such as false match and false non-match. In practice, a rejected user can not be interpreted as an impostor since the user simply might have problems using his/her biometric feature. The proposed methods in this project are dealing with these problems when analysing biometric usage in runtime. Another fact which may give rise to false rejections is template aging; a phenomenon where the enrolled user’s template is too old compared towards the user’s current biometric feature. A theoretical approach of template aging was known; however since the analysis of template aging detection was correlated with potential system flaws such as device defects or human generated risks such as impostor attacks this task would become difficult to solve in an unsupervised system but when ignoring the definition of template aging, the detection of similar effects was possible. One of the objectives of this project was to detect template aging in a predictive sense; this task failed to be carried out because the absence of basis performing this kind of tasks. The developed program performs abnormality detection at each incoming event from a biometric system. Each verification attempt is assumed to be from a genuine user unless any deviation according to the user's history is found, an abnormality. The possibility of an impostor attack depends on the degree of the abnormality. The application makes relative decisions between fraud possibilities or if genuine user was the source of what caused the deviations. This is presented as an alarm with the degree of impostor possibility. This intelligent layer has increased Optimum preCon´s capacity as a surveillance tool for biometrics. This product is an efficient complement to biometric systems in a steady up-going worldwide market.
APA, Harvard, Vancouver, ISO, and other styles
8

John, George Jacqueline. "Optimising multimodal fusion for biometric identification systems." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hitchcock, David C. "Evaluation and combination of biometric authentication systems." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

MOMIN, ZAHID AKHTAR SHABBEER AHMAD. "Security of multimodal biometric systems against spoof attacks." Doctoral thesis, Università degli Studi di Cagliari, 2012. http://hdl.handle.net/11584/266071.

Full text
Abstract:
A biometric system is essentially a pattern recognition system being used in ad-versarial environment. Since, biometric system like any conventional security system is exposed to malicious adversaries, who can manipulate data to make the system ineffective by compromising its integrity. Current theory and de- sign methods of biometric systems do not take into account the vulnerability to such adversary attacks. Therefore, evaluation of classical design methods is an open problem to investigate whether they lead to design secure systems. In order to make biometric systems secure it is necessary to understand and evalu-ate the threats and to thus develop effective countermeasures and robust system designs, both technical and procedural, if necessary. Accordingly, the extension of theory and design methods of biometric systems is mandatory to safeguard the security and reliability of biometric systems in adversarial environments. In this thesis, we provide some contributions towards this direction. Among all the potential attacks discussed in the literature, spoof attacks are one of the main threats against the security of biometric systems for identity recognition. Multimodal biometric systems are commonly believed to be in-trinsically more robust to spoof attacks than systems based on a single biomet-ric trait, as they combine information coming from different biometric traits. However, recent works have question such belief and shown that multimodal systems can be misled by an attacker (impostor) even by spoofing only one of the biometric traits. Therefore, we first provide a detailed review of state-of-the-art works in multimodal biometric systems against spoof attacks. The scope ofstate-of-the-art results is very limited, since they were obtained under a very restrictive “worst-case” hypothesis, where the attacker is assumed to be able to fabricate a perfect replica of a biometric trait whose matching score distribu-tion is identical to the one of genuine traits. Thus, we argue and investigate the validity of “worst-case” hypothesis using large set of real spoof attacks and provide empirical evidence that “worst-case” scenario can not be representa- ixtive of real spoof attacks: its suitability may depend on the specific biometric trait, the matching algorithm, and the techniques used to counterfeit the spoofed traits. Then, we propose a security evaluation methodology of biometric systems against spoof attacks that can be used in real applications, as it does not require fabricating fake biometric traits, it allows the designer to take into account the different possible qualities of fake traits used by different attackers, and it exploits only information on genuine and impostor samples which is col- lected for the training of a biometric system. Our methodology evaluates the performances under a simulated spoof attack using model of the fake score distribution that takes into account explicitly different degrees of the quality of fake biometric traits. In particular, we propose two models of the match score distribution of fake traits that take into account all different factors which can affect the match score distribution of fake traits like the particular spoofed biometric, the sensor, the algorithm for matching score computation, the technique used to construct fake biometrics, and the skills of the attacker. All these factors are summarized in a single parameter, that we call “attack strength”. Further, we propose extension of our security evaluation method to rank several biometric score fusion rules according to their relative robustness against spoof attacks. This method allows the designer to choose the most robust rule according to the method prediction. We then present empirical analysis, using data sets of face and fingerprints including real spoofed traits, to show that our proposed models provide a good approximation of fake traits’ score distribution and our method thus providing an adequate estimation of the security1 of biometric systems against spoof attacks. We also use our method to show how to evaluate the security of different multimodal systems on publicly available benchmark data sets without spoof attacks. Our experimental results show that robustness of multimodal biometric systems to spoof attacks strongly depends on the particular matching algorithm, the score fusion rule, and the attack strength of fake traits. We eventually present evidence, considering a multimodal system based on face and fingerprint biometrics, that the proposed methodology to rank score fusion rules is capable of providing correct ranking of score fusion rules under spoof attacks.
APA, Harvard, Vancouver, ISO, and other styles
11

Blommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.

Full text
Abstract:

Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.

Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.

In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.

The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.

Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.

Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.

APA, Harvard, Vancouver, ISO, and other styles
12

Osoka, Agu. "Assessing and protecting against vulnerabilities of biometric systems." Thesis, University of Kent, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Shenglin. "Design and implementation for secure enbedded biometric authentication systems." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1317343341&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wu, Qianqian. "Strategies for intelligent interaction management and usability of biometric systems." Thesis, University of Kent, 2016. https://kar.kent.ac.uk/56887/.

Full text
Abstract:
Fingerprint biometric systems are one of the most popular biometric systems in current use, which takes a standard measure of a person's fingerprint to compare against the measure from an original stored template, which they have pre-acquired and associated with the known personal identification claimed by the user. Generally, the fingerprint biometric system consists of three stages including a data acquisition stage, a feature extraction stage and a matching extraction. This study will explore some essential limitations of an automatic fingerprint biometric system relating to the effects of capturing poor quality fingerprint images in a fingerprint biometric system and will investigate the interrelationship between the quality of a fingerprint image and other primary components of a fingerprint biometric system, such as the feature extraction operation and the matching process. In order to improve the overall performance of an automatic fingerprint biometric system, the study will investigate some possible ways to overcome these limitations. With the purpose of acquisition of an acceptable quality of fingerprint images, three components/enhancements are added into the traditional fingerprint recognition system in our proposed system. These are a fingerprint image enhancement algorithm, a fingerprint image quality evaluation algorithm and a feedback unit, the purpose of which is to provide analytical information collected at the image capture stage to the system user. In this thesis, all relevant information will be introduced, and we will also show some experimental results obtained with the proposed algorithms, and comparative studies with other existed algorithms will also be presented.
APA, Harvard, Vancouver, ISO, and other styles
15

Li, Cheng. "Extending the predictive capabilities of hand-oriented behavioural biometric systems." Thesis, University of Kent, 2016. https://kar.kent.ac.uk/60991/.

Full text
Abstract:
The discipline of biometrics may be broadly defined as the study of using metrics related to human characteristics as a basis for individual identification and authentication, and many approaches have been implemented in recent years for many different scenarios. A sub-section of biometrics, specifically known as soft biometrics, has also been developing rapidly, which focuses on the additional use of information which is characteristic of a user but not unique to one person, examples including subject age or gender. Other than its established value in identification and authentication tasks, such useful user information can also be predicted within soft biometrics modalities. Furthermore, some most recent investigations have demonstrated a demand for utilising these biometric modalities to extract even higher-level user information, such as a subject\textsc{\char13}s mental or emotional state. The study reported in this thesis will focus on investigating two soft biometrics modalities, namely keystroke dynamics and handwriting biometrics (both examples of hand-based biometrics, but with differing characteristics). The study primarily investigates the extent to which these modalities can be used to predict human emotions. A rigorously designed data capture protocol is described and a large and entirely new database is thereby collected, significantly expanding the scale of the databases available for this type of study compared to those reported in the literature. A systematic study of the predictive performance achievable using the data acquired is presented. The core analysis of this study, which is to further explore of the predictive capability of both handwriting and keystroke data, confirm that both modalities have the capability for predicting higher level mental states of individuals. This study also presents the implementation of detailed experiments to investigate in detail some key issues (such as amount of data available, availability of different feature types, and the way ground truth labelling is established) which can enhance the robustness of this higher level state prediction technique.
APA, Harvard, Vancouver, ISO, and other styles
16

Palmberg, Robin C. O. "Enriching Automated Travel Diaries Using Biometric Information." Licentiate thesis, KTH, Systemanalys och ekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-262880.

Full text
Abstract:
The methods for collecting travel data about travellers today incorporate either fully manual or semi-automatic elements, which makes the methods susceptible to errors. The travellers might respond subjectively rather than objectively or even wholly incorrect, albeit with or without purpose. For certain types of studies, these are still valid methods for collecting data. However, for specific target groups, it might be hard to respond using these methods, either because of physical or psychological limitations. One of these target groups that is increasing rapidly is elderly in general, and dementia patients in particular, who suffer from fluctuating cognitive skills and memory. These conditions affect the recipient’s ability to answer truthfully and correctly. However, in the strive to form more accessible urban environments, the information regarding the need and behaviour of the said target group is crucial, meaning that new methods for collecting travel data need to be created. The three papers included in this licentiate thesis present the development and trial of a new method for fully automated data collection using biometric data as a dimension. The method attempts to determine how the recipient is affected by the elements presented to them while they travel, such as the built environment, based on the variations in the biometric data dimension. With the rapid advancements in information and communication technology, many new artefacts which open for new possible methods of data collection has been launched and are widely available. The methods and artefacts are not capable of meeting the requirements for the type of data collection method that would be needed to cater to the target group by themselves. However, by combing several types of currently available artefacts and methods, it is theoretically possible to cover the gaps of each artefact and method to create versatile methods for data collection (Paper I). Such methods require tools for physical operationalisation. An exploratory development process has led to the creation of a software tool which could be used with several types of consumer hardware, which means that it would theoretically be possible to conduct extensive surveys fast with low costs where participants utilise their own hardware (Paper II). In order to uncover the usefulness of the tool, an analysis was conducted on a limited dataset which had been collected as a result of a trial of the tool. In an attempt to prove the hypothesis “it is possible to understand how much the dimensions of data collected in specific locations affect the stress of travellers using heart rate as the dependent variable”, data-driven methods of data analysis were explored and utilised. Simple clustering methods, which disregarded any weighting on the dimensions, uncovered if there was any valuable information in the dataset at all. A model had to be created in order to understand better how the different dimensions of the collected data affected the participant (Paper III). This set of papers should indicate whether this type of method is feasible to pursue with the current means of widely available technology and what sort of significance the collected data might hold when analysed with appropriate analysis methods.
Metoderna för att samla in resedata från dagens resenärer inkorporerar antingen helt manuella eller halvautomatiska element, vilket gör dessa metoder mottagliga för fel. Resenärerna kan svara subjektivt snarare än objektivet eller helt inkorrekt, antingen med eller utan avsikt. För vissa typer av studier så är dessa metoder fortfarande meningsfulla att använda för datainsamling. Men för särskilda målgrupper kan det vara svårt att svara på undersökningar som använder dessa metoder, antingen på grund av fysiologiska eller psykologiska begränsningar. En av dessa målgrupper, som är stadigt växande, är den äldre befolkningen generellt, men framförallt demenspatienter, som lider av sviktande kognitiva förmågor och minne. Dessa tillstånd påverkar den svarandes förmåga att svara sanningsenligt och korret. Men i strävan efter att skapa mer tillgängliga stadsmiljöer så är informationen angående behovet och beteendet hos den nämnda målgruppen av yttersta vikt, vilket innebär att nya metoder för att samla in resedata behöver skapas. De tre artiklar som har inkluderats i denna avhandling presenterar utvecklingen och försökstestandet av en ny metod för helt automatisk datainsamling med användandet av biometriska data som en dimension. Metoden försöker att avgöra hur den svarande blir påverkad av element de stöter på medan de reser, såsom det byggda samhället, baserat på variationer i den biometriska datadimensionen. Med de snabba framstegen inom informations- och kommunikationsteknik så har nya artefakter som öppnar för nya möjliga metoder av datainsamling lanserats och är allmänt tillgängliga. Dessa metoder och artefakter är inte kapabla till att möta de krav som ställs för den typ av datainsamlingsmetod som krävs för att kunna tillgodose målgruppen på egen hand. Men genom att kombinera flera typer av de nu tillgängliga artefakterna och metoderna så är det teoretiskt möjligt att täcka luckorna som finns i varje artefakt och metod för att skapa en mer mångsidig metod för datainsamling (Artikel I). Sådana metoder kräver verktyg för att fysiskt operationaliseras. En explorativ utvecklingsprocess har lett till skapandet av ett mjukvaruverktyg som skulle kunna användas med flera typer av konsumenttillgänglig hårdvara, vilket betyder att det skulle vara teoretiskt möjligt att genomföra stora undersökningar snabbt med låga kostnader där deltagarna använder sin egen hårdvara (Artikel II). För att förstå användbarheten av verktyget så gjordes en analys på ett begränsat data-set som hade blivit insamlat som ett resultat av ett försökstestande av verktyget. I ett försök att bevisa hypotesen ”det är möjligt att förstå hur mycket dimensionerna av data som samlats in vid specifika platser påverkar stressen hos resenärer med hjälp av puls som den beroende variabeln” så utforskades och användes data-drivna metoder av dataanalys. Enkla metoder, som inte la någon särskild vikt vid någon särskild dimension, användes för att visa om det fanns någon värdefull information i data-setet överhuvudtaget. En modell behövde skapas för att bättre förstå hur de olika dimensionerna av den insamlade datan påverkar deltagaren (Artikel III). Denna samling artiklar är tänkt att ge en indikation på om denna typ av metodik är rimlig att fortsätta utveckla givet de nu tillgängliga teknologierna och vilken sorts signifikans den insamlade datan kan innehålla när den har analyserats med lämpliga analysmetoder.
APA, Harvard, Vancouver, ISO, and other styles
17

Rosén, Axel, Erik Sondell, and Evan Khalil. "The case of biometric payment cards: A quantitative study of the behavioural intention to use biometric payment cards among Swedish consumers." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-89795.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Luo, Ying. "Efficient Anonymous Biometric Matching in Privacy-Aware Environments." UKnowledge, 2014. http://uknowledge.uky.edu/ece_etds/46.

Full text
Abstract:
Video surveillance is an important tool used in security and environmental monitoring, however, the widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. To identify these individuals for protection, the most reliable approach is to use biometric signals as they are immutable and highly discriminative. If misused, these characteristics of biometrics can seriously defeat the goal of privacy protection. In this dissertation, an Anonymous Biometric Access Control (ABAC) procedure is proposed based on biometric signals for privacy-aware video surveillance. The ABAC procedure uses Secure Multi-party Computational (SMC) based protocols to verify membership of an incoming individual without knowing his/her true identity. To make SMC-based protocols scalable to large biometric databases, I introduce the k-Anonymous Quantization (kAQ) framework to provide an effective and secure tradeoff of privacy and complexity. kAQ limits systems knowledge of the incoming individual to k maximally dissimilar candidates in the database, where k is a design parameter that controls the amount of complexity-privacy tradeoff. The relationship between biometric similarity and privacy is experimentally validated using a twin iris database. The effectiveness of the entire system is demonstrated based on a public iris biometric database. To provide the protected subjects with full access to their privacy information in video surveillance system, I develop a novel privacy information management system that allows subjects to access their information via the same biometric signals used for ABAC. The system is composed of two encrypted-domain protocols: the privacy information encryption protocol encrypts the original video records using the iris pattern acquired during ABAC procedure; the privacy information retrieval protocol allows the video records to be anonymously retrieved through a GC-based iris pattern matching process. Experimental results on a public iris biometric database demonstrate the validity of my framework.
APA, Harvard, Vancouver, ISO, and other styles
19

Randolph, Adriane. "Individual-Technology Fit: Matching Individual Characteristics and Features of Biometric Interface Technologies with Performance." Digital Archive @ GSU, 2007. http://digitalarchive.gsu.edu/cis_diss/11.

Full text
Abstract:
Abstract INDIVIDUAL-TECHNOLOGY FIT: MATCHING INDIVIDUAL CHARACTERISTICS AND FEATURES OF BIOMETRIC INTERFACE TECHNOLOGIES WITH PERFORMANCE By ADRIANE B. RANDOLPH MAY 2007 Committee Chair: Dr. Melody Moore Jackson Major Department: Computer Information Systems The term biometric literally means “to measure the body”, and has recently been associated with physiological measures commonly used for personal verification and security applications. In this work, biometric describes physiological measures that may be used for non-muscularly controlled computer applications, such as brain-computer interfaces. Biometric interface technology is generally targeted for users with severe motor disabilities which may last long-term due to illness or injury or short-term due to temporary environmental conditions. Performance with a biometric interface can vary widely across users depending upon many factors ranging from health to experience. Unfortunately, there is no systematic method for pairing users with biometric interface technologies to achieve the best performance. The current methods to accommodate users through trial-and-error result in the loss of valuable time and resources as users sometimes have diminishing abilities or suffer from terminal illnesses. This dissertation presents a framework and methodology that links user characteristics and features of biometric interface technologies with performance, thus expediting the technology-fit process. The contributions include an outline of the underlying components of capturing and representing individual user characteristics and the impact on the performance of basic interaction tasks using a methodology called biometric user profiling. In addition, this work describes a methodology for objectively measuring an individual’s ability to control a specific biometric interface technology such as one based on measures of galvanic skin response or neural activity. Finally, this work incorporates these concepts into a new individual-technology fit framework for biometric interface technologies stemming from literature on task-technology fit. Key words: user profiles, biometric user profiling, biometric interfaces, fit, individual-technology fit, galvanic skin response, functional near-infrared, brain-computer interface
APA, Harvard, Vancouver, ISO, and other styles
20

Huang, Xuan. "Mobile security and smart systems : multi-modal biometric authentication on mobile devices." Thesis, Abertay University, 2013. https://rke.abertay.ac.uk/en/studentTheses/ce2dec7b-fdcf-496e-81c4-fb98d0033c78.

Full text
Abstract:
With increased use of mobile phones that support mobile commerce, there is a need to examine the authentication of users. The password-based authentication techniques are not reliable with many passwords being too simple. A biometric authentication system is becoming more commonplace and is widely used in security fields because of its special stability and uniqueness. Within this context, the researcher has developed a fuzzy logic based multi-modal biometric authentication system to verify the identity of a mobile phone user. The research presented in this thesis involves three parts of work. Firstly, a model to support the authentication of mobile commerce has been proposed. Within this model, a number of different authentication levels have been defined in the system which sought to achieve the balance between usability and security. Secondly, the researcher has developed a multi-modal biometric authentication system which involves typing behaviour recognition, face recognition and speaker recognition techniques to establish the identity of the user on the mobile phone. However, there are some issues with deterministic biometric authentication systems. Because of this, a fuzzy logic model which can determine the transaction risk in m-commerce and the recognition result from biometric authentication engine has been built. In the experimental stage, the researcher simulates a mobile commerce environment. At one extreme, users will just want to obtain the item and not enter any identity. They are prepared to accept the low level of risk when the transaction is of low value. On the other extreme for a high value transaction users will accept multiple levels of security and would not want the transaction to go through without any checking. The experimental results showed that the fuzzy logic based multi-modal authentication system can achieve a low equal error rate (EER) of 0.63%, and by using the fuzzy logic model, it can effectively reduce the false rejection rate (FRR). There is also a reduction in the environmental influence in the fuzzy logic based biometric authentication. There are three contributions of the thesis: firstly, this research has proposed a model to support the authentication in mobile commerce. Secondly, a multi-modal biometric authentication system was developed. Another major contribution is the development of a fuzzy logic based multi-modal biometric authentication system which is able to overcome the issues of deterministic biometric systems. Overall, the results gained in this thesis prove that using the multi-modal biometric authentication system, itis possible to establish the identity of the user on a mobile phone. The fuzzy logic based authentication model can make the multi-modal biometric system more accurate, and also reduce the influence of external environmental factors. A holistic interpretation of the research indicated that the mobile security and smart system can help mobile commerce become more secure and more flexible in future.
APA, Harvard, Vancouver, ISO, and other styles
21

Faria, Bruno Guedes. "Implementação e avaliação do ABID (Aplicativo Biométrico de Impressão Digital) utilizando o método fuzzy vault e ferramentas opensource." Universidade Presbiteriana Mackenzie, 2014. http://tede.mackenzie.br/jspui/handle/tede/1442.

Full text
Abstract:
Made available in DSpace on 2016-03-15T19:37:50Z (GMT). No. of bitstreams: 1 Bruno Guedes Faria.pdf: 1541058 bytes, checksum: 27ddaf10102e159357de3c8fbd6d81ca (MD5) Previous issue date: 2014-06-10
Universidade Presbiteriana Mackenzie
Biometric Systems has increasingly been growing in the past years, mainly those based on fingerprints. In terms of security, they need the same care which is given to traditional systems that uses cards and passwords. The Fuzzy Vault methods comes in this scenario to provide security to biometric systems, specifically, protecting the stored biometric template. This research will present the Fuzzy Vault scheme development and how it can be used to hide a 128 bits secret. The scheme will be used into the context of a biometric application based on fingerprints. Evaluation of security and performance of the application will be shown, as well as the experimental results, common to biometric systems FRR (False Rejection Rate), GAR (Genuine Accept Rate), FAR (False Accept Rate).
A utilização de sistemas biométricos tem apresentado um cenário de crescimento nos últimos anos e que se reflete, principalmente, naqueles que têm a impressão digital como forma de identificação. No que tange à segurança, sistemas baseados em biometria necessitam da mesma preocupação que se tem com sistemas tradicionais de senhas e cartões. Neste contexto, o método Fuzzy Vault aparece para prover a segurança de sistemas biométricos, particularmente, protegendo a amostra biométrica armazenada. Esta pesquisa consiste na implementação do método Fuzzy Vault, aplicando-o para ocultar uma chave de 128 bits, onde o método será utilizado juntamente com algoritmos de código aberto, para o desenvolvimento de um aplicativo biométrico de impressões digitais, denominado por ABID. Serão expostas avaliações sobre o desempenho e segurança do aplicativo e também resultados experimentais comuns a sistemas biométricos, como: Taxa de Falso Aceite (FAR -False Accept Rate), Taxa de Aceite Genuíno (GAR-Genuine Accept Rate) e Taxa de Falsa Rejeição (FRR-False Rejection Rate).
APA, Harvard, Vancouver, ISO, and other styles
22

Verett, Marianna J. "Performance and usage of biometrics in a testbed environment for tactical purposes." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FVerett.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, December 2006.
Thesis Advisor(s): Alex Bordetsky. "December 2006." Includes bibliographical references (p. 71-74). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
23

Mohanty, Pranab. "Learning from biometric distances : performance and security related issues in face recognition systems." [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0002298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Pg, Hj Mohd Yassin D. K. Hayati Bte. "Novel template ageing techniques to minimise the effect of ageing in biometric systems." Thesis, University of Kent, 2016. https://kar.kent.ac.uk/58398/.

Full text
Abstract:
Effect of ageing on biometric systems and particularly its impact on face recognition systems. Being biological tissue in nature, facial biometric trait undergoes ageing. As a result developing biometric applications for long-term use becomes a particularly challenging task. Despite the rising attention on facial ageing, longitudinal study of face recognition remains an understudied problem in comparison to facial variations due to pose, illumination and expression changes. Regardless of any adopted representation, biometric patterns are always affected by the change in the face appearance due to ageing. In order to overcome this problem either evaluation of the changes in facial appearance over time or template-age transformation-based techniques are recommended. By using a database comprising images acquired over a 5-years period, this thesis explores techniques for recognising face images for identify verification. A detailed investigation analyses the challenges due to ageing with respect to the performance of biometric systems. This study provides a comprehensive analysis looking at both lateral age as well as longitudinal ageing. This thesis also proposes novel approaches for template ageing to compensate the ageing effects for verification purposes. The approach will explore both linear and nonlinear transformation mapping methods. Furthermore, the compound effect of ageing with other variate (such as gender, age group) are systematically analysed. With the implementation of the novel approach, it can be seen that the GAR (Genuine Accept Rate) improved significantly.
APA, Harvard, Vancouver, ISO, and other styles
25

Ribeiro, Matheus Antônio Corrêa. "Gerenciamento e autenticação de identidades digitais usando feições faciais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/15740.

Full text
Abstract:
Em nossa vida diária, são utilizadas identidades digitais (IDDs) para acessar contas de e-mail, bancos e lojas virtuais, locais restritos, computadores compartilhados, e outros. Garantir que apenas usuários autorizados tenham o acesso permitido é um aspecto fundamental no desenvolvimento destas aplicações. Atualmente, os métodos de controle de acesso simples como senhas ou números de identificação pessoal não devem ser considerados suficientemente seguros, já que um impostor pode conseguir estas informações sem o conhecimento do usuário. Ainda, no caso de utilização de dispositivos físicos como cartões de identificação, estes podem ser roubados ou forjados. Para tornar estes sistemas mais confiáveis, técnicas de autenticação de identidades utilizando múltiplas verificações são propostas. A utilização de características biométricas surge como a alternativa mais confiável para tratar este problema, pois são, teoricamente, únicas para cada pessoa. Contudo, algumas características biométricas como a aparência facial podem variar com o tempo, implicando em um grande desafio para os sistemas de reconhecimento facial. Neste trabalho é combinado o acesso tradicional por senha com a análise da face para realizar a autenticação. Um método de aprendizagem supervisionada é apresentado e sua adaptação é baseada na melhora contínua dos modelos faciais, que são representados por misturas de gaussianas. Os resultados experimentais, obtidos sobre um conjunto de teste reduzido, são encorajadores, com 98% de identificação correta dos usuários e custo computacional relativamente baixo. Ainda, a comparação com um método apresentado na literatura indicou vantagens do método proposto quando usado como um pré-selecionador de faces.
In our daily life, we use digital identities (DIDs) to access e-mails, e-banks, e-shops, physical environments, shared computers, and so on. Guarantee that only authorized users are granted access is an important aspect in the development of such applications. Nowadays, the simple access control methods like passwords or personal identification numbers can not be considered secure enough, because an impostor can obtain and use these information without user knowledge. Also, physical devices like ID cards can be stolen. To make these systems more reliable, multimodal DID authentication techniques combining different verification steps are proposed. Biometric features appears as one of the most reliable alternatives to deal with this problem because, theoretically, they are unique for each person. Nevertheless, some biometric features like face appearances may change in time, posing a serious challenge for a face recognition system. In this thesis work, we use the traditional password access combined with human face analysis to perform the authentication task. An intuitive supervised appearance learning method is presented, and its adaptation is based on continuously improving face models represented using the Gaussian mixture modeling approach. The experimental results over a reduced test set show encouraging results, with 98% of the users correctly identified, with a relatively small computational effort. Still, the comparison with a method presented in the literature indicated advantages of the proposed method when used as a pre-selector of faces.
APA, Harvard, Vancouver, ISO, and other styles
26

Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Full text
Abstract:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication methods are being tested with end-users and their current acceptability level is being determined based on interviews which are conducted upon finishing each testing scenario. The interview is using 39 questions which are determining previous usage of the technologies, their likeability, positives, negatives, and feelings about various features biometrics provide such as ease-of-use, stress-free method of payment, security, and many others. Additionally, one more authentication method is tested, namely two factor authentication consisting of one biometric method (fingerprint) and one traditional method (PIN) of authentication. The main goal for testing this method is to find out whether implementing (as currently it is not available) such technology into mobile-payments would be beneficial and how it scored in user-acceptance next to fingerprint and face recognition authentication methods. Once the user-acceptance level is determined the main reasons for it are presented. Last but not least, suggestions for improvements in this domain are presented so that biometrics are even more accepted by end-users who are performing mobile-payments on their smartphones.
APA, Harvard, Vancouver, ISO, and other styles
27

Lam, Lawrence G. "Digital Health-Data platforms : biometric data aggregation and their potential impact to centralize Digital Health-Data." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106235.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (page 81).
Digital Health-Data is being collected at unprecedented rates today as biometric micro sensors continue to diffuse into our lives in the form of smart devices, wearables, and even clothing. From this data, we hope to learn more about preventative health so that we can spend less money on the doctor. To help users aggregate this perpetual growth of biometric "big" data, Apple HealthKit, Google Fit, and Samsung SAMI were each created with the hope of becoming the dominant design platform for Digital Health-Data. The research for this paper consists of citings from technology strategy literature and relevant journalism articles regarding recent and past developments that pertain to the wearables market and the digitization movement of electronic health records (EHR) and protected health information (PHI) along with their rules and regulations. The culmination of these citations will contribute to my hypothesis where the analysis will attempt to support my recommendations for Apple, Google, and Samsung. The ending chapters will encompass discussions around network effects and costs associated with multi-homing user data across multiple platforms and finally ending with my conclusion based on my hypothesis.
by Lawrence G. Lam.
S.M. in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
28

Janečka, Petr. "Multimodální biometrický systém kombinující duhovku a sítnici." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234910.

Full text
Abstract:
This diploma thesis focuses on multibiometric systems, specifically on biometric fusion. The thesis describes eye biometrics, i.e. recognition based on retina and iris. The key part consists of design and implementation specification of a biometric system based on retina and iris recognition.
APA, Harvard, Vancouver, ISO, and other styles
29

Walnoha, Michael Anthony. "Shoeprint analysis a GIS application in forensic evidence /." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4639.

Full text
Abstract:
Thesis (M.A.)--West Virginia University, 2006.
Title from document title page. Document formatted into pages; contains iv, 64 p. : ill. (some col.), maps (some col.). Includes abstract. Includes bibliographical references (p. 63-64).
APA, Harvard, Vancouver, ISO, and other styles
30

Бабій, Михайло Семенович, Михаил Семенович Бабий, Mykhailo Semenovych Babii, and В. Н. Падалка. "Распознавание изображений лиц методом многослойных нейронных сетей." Thesis, Видавництво СумДУ, 2010. http://essuir.sumdu.edu.ua/handle/123456789/4384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Iqbal, K. "Image detection and retrieval for biometric security from an image enhancement perspective." Thesis, Coventry University, 2011. http://curve.coventry.ac.uk/open/items/ed5b98d3-84e6-4070-89cb-7ede2f0e9c0b/1.

Full text
Abstract:
Security methods based on biometrics have been gaining importance increasingly in the last few years due to recent advances in biometrics technology and its reliability and efficiency in real world applications. Also, several major security disasters that occurred in the last decade have given a new momentum to this research area. The successful development of biometric security applications cannot only minimise such threats but may also help in preventing them from happening on a global scale. Biometric security methods take into account humans’ unique physical or behavioural traits that help to identify them based on their intrinsic characteristics. However, there are a number of issues related to biometric security, in particular with regard to surveillance images. The first issue is related to the poor visibility of the images produced by surveillance cameras and the second issue is concerned with the effective image retrieval based on user query. This research addresses both issues. This research addresses the first issue of low quality of surveillance images by proposing an integrated image enhancement approach for face detection. The proposed approach is based on contrast enhancement and colour balancing methods. The contrast enhancement method is used to improve the contrast, while the colour balancing method helps to achieve a balanced colour. Importantly, in the colour balancing method, a new process for colour cast adjustment is introduced which relies on statistical calculation. It can adjust the colour cast and maintain the luminance of the whole image at the same level. The research addresses the second issue relating to image retrieval by proposing a content-based image retrieval approach. The approach is based on the three welliii known algorithms: colour histogram, texture and moment invariants. Colour histogram is used to extract the colour features of an image. Gabor filter is used to extract the texture features and the moment invariant is used to extract the shape features of an image. The use of these three algorithms ensures that the proposed image retrieval approach produces results which are highly relevant to the content of an image query, by taking into account the three distinct features of the image and the similarity metrics based on Euclidean measure. In order to retrieve the most relevant images the proposed approach also employs a set of fuzzy heuristics to improve the quality of the results further. The integrated image enhancement approach is applied to the enhancement of low quality images produced by surveillance cameras. The performance of the proposed approach is evaluated by applying three face detection methods (skin colour based face detection, feature based face detection and image based face detection methods) to surveillance images before and after enhancement using the proposed approach. The results show a significant improvement in face detection when the proposed approach was applied. The performance of the content-based image retrieval approach is carried out using the standard Precision and Recall measures, and the results are compared with wellknown existing approaches. The results show the proposed approach perform s better than the well-known existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
32

Klimešová, Lenka. "Identifikace osob pomocí biometrie sítnice." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-378031.

Full text
Abstract:
This paper deals with identification of persons using retinal biometry. The retinal vasculature is invariant and unique to everyone, which determines it for biometric purposes. The first part of the work includes information about biometrics, biometric systems and reliability measures. The next part describes the principle of using experimental video ophthalmoscope, which was used for retinal vascular imaging and includes the literature research of use of retinal images for biometrics, feature extraction methods and similarity measures. Finally, two algorithms to use the input data are proposed and realized in programming environment MATLAB®. The methods are tested and evaluated on a data set from experimental video ophthalmoscope and on publicly available STRaDe and DRIVE databases.
APA, Harvard, Vancouver, ISO, and other styles
33

Randolph, Adriane B. "Individual-technology fit matching individual characteristics and features of biometric interface technologies with performance /." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-05182007-113229/.

Full text
Abstract:
Thesis (Ph. D.)--Georgia State University, 2007.
Title from file title page. Melody Moore, committee chair; Detmar Straub, Veda Storey, Bruce Walker, committee members. Electronic text (166 p. : ill. (some col.)) : digital, PDF file. Description based on contents viewed Nov. 5, 2007. Includes bibliographical references (p. 160-164).
APA, Harvard, Vancouver, ISO, and other styles
34

Sanderson, Conrad, and conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information." Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.

Full text
Abstract:
Identity verification systems are an important part of our every day life. A typical example is the Automatic Teller Machine (ATM) which employs a simple identity verification scheme: the user is asked to enter their secret password after inserting their ATM card; if the password matches the one prescribed to the card, the user is allowed access to their bank account. This scheme suffers from a major drawback: only the validity of the combination of a certain possession (the ATM card) and certain knowledge (the password) is verified. The ATM card can be lost or stolen, and the password can be compromised. Thus new verification methods have emerged, where the password has either been replaced by, or used in addition to, biometrics such as the person’s speech, face image or fingerprints. Apart from the ATM example described above, biometrics can be applied to other areas, such as telephone & internet based banking, airline reservations & check-in, as well as forensic work and law enforcement applications. Biometric systems based on face images and/or speech signals have been shown to be quite effective. However, their performance easily degrades in the presence of a mismatch between training and testing conditions. For speech based systems this is usually in the form of channel distortion and/or ambient noise; for face based systems it can be in the form of a change in the illumination direction. A system which uses more than one biometric at the same time is known as a multi-modal verification system; it is often comprised of several modality experts and a decision stage. Since a multi-modal system uses complimentary discriminative information, lower error rates can be achieved; moreover, such a system can also be more robust, since the contribution of the modality affected by environmental conditions can be decreased. This thesis makes several contributions aimed at increasing the robustness of single- and multi-modal verification systems. Some of the major contributions are listed below. The robustness of a speech based system to ambient noise is increased by using Maximum Auto-Correlation Value (MACV) features, which utilize information from the source part of the speech signal. A new facial feature extraction technique is proposed (termed DCT-mod2), which utilizes polynomial coefficients derived from 2D Discrete Cosine Transform (DCT) coefficients of spatially neighbouring blocks. The DCT-mod2 features are shown to be robust to an illumination direction change as well as being over 80 times quicker to compute than 2D Gabor wavelet derived features. The fragility of Principal Component Analysis (PCA) derived features to an illumination direction change is solved by introducing a pre-processing step utilizing the DCT-mod2 feature extraction. We show that the enhanced PCA technique retains all the positive aspects of traditional PCA (that is, robustness to compression artefacts and white Gaussian noise) while also being robust to the illumination direction change. Several new methods, for use in fusion of speech and face information under noisy conditions, are proposed; these include a weight adjustment procedure, which explicitly measures the quality of the speech signal, and a decision stage comprised of a structurally noise resistant piece-wise linear classifier, which attempts to minimize the effects of noisy conditions via structural constraints on the decision boundary.
APA, Harvard, Vancouver, ISO, and other styles
35

Khan, Shaukat Ali. "Technological and Social Issues in the development and deployment of Facial Recognition Biometric Systems." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1230.

Full text
Abstract:
There has been considerable amount of work done in the past decade by different biometric vendors as well as researchers in order to improve the accuracy of both biometric data collection systems as well as the underlying algorithms to perform different mapping and matching. Biometric Facial recognition systems are continuously improving with advancements in technology as well as decreasing hardware costs. However, in order to develop efficient biometric facial recognition systems, organizations must take into account different technical issues which include reliability, usability, interoperability as well as data collection, dissemination and evaluation of such systems. Adherence to standards is a key for interoperable systems and user acceptance along with trust can lead to easy deployment of such facial biometric systems in a society. These technical as well as social issues were identified by regular discussions with the Chairman and members of Swedish National Biometric Association’s and conducting interview sessions with different biometric companies who are specially dealing with face recognition biometric systems and are supplemented with a thorough literature review of the state of art research practices within face recognition domain.
The demand for user-friendly, reliable, proactive, high performance and highly interoperable biometric devices has grown exponentially. After conducting the case study, collecting data through the questionnaire and reviewing the literature the researchers come to the point that organizations willing to develop or deploy such systems needs to take into account many technical as well as social issues to make the best out of these systems. The extension of face recognition biometric technologies raises new and challenging questions in a society that enshrines privacy and liberty. This system can either enhance or undermine our liberties depending upon its use. A framework is needed by which we may resolve issues pertaining to proper and legitimate deployment and get expected outcome. The framework or centralized structure is needed which will compile and common issues and provide guidelines to face recognition biometric industry.
APA, Harvard, Vancouver, ISO, and other styles
36

Robertson, Joshua. "The application of the human-biometric sensor interaction method to automated border control systems." Thesis, University of Kent, 2017. https://kar.kent.ac.uk/66822/.

Full text
Abstract:
Biometrics components are used in many different systems and technologies to verify that the user is whom they say they are. In Automated Border Control systems, biometrics components used in conjunction with a traveller's documents to make sure the user is whom they say they are so that they can cross into a countries borders. The systems are expected to verify the identity with a higher degree than officers who manually check travellers. Each year the number of travellers crossing through a country borders increases and so systems are expected to handle bigger demands; through improving the user experience to ensuring accuracy and performance standards increase. While the system does bring its benefits through increased speed and higher security, there are drawbacks. One of the main issues with the systems is a lack of standardisation across implementations. Passing through an automated process at Heathrow may be different to Hong Kong. The infrastructure, information, environment and guidance given during the transaction will all greatly differ for the user. Furthermore, the individual components and subsequent processing will be evaluated using a different methodology too. This thesis reports on the contrasts between implementations, looking at solutions which utilise different biometric modalities and travel documents. Several models are devised to establish a process map which can be applied to all systems. Investigating further, a framework is described for a novel assessment method to evaluate the performance of a system. An RGB-D sensor is implemented, to track and locate the user within an interactive environment. By doing so, the user's interaction is assessed in real-time. Studies then report on the effectiveness of the solution within a replicated border control scenario. Several relationships are studied to improve the technologies used within the scenario. Successful implementation of the automated assessment method may improve the user's experience with systems, improving information and guidance, increasing the likelihood of successful interaction while maintaining a high level of security and quicker processing times.
APA, Harvard, Vancouver, ISO, and other styles
37

Bin, Mohd Isa Mohd Rizal. "Watermarked face recognition scheme : enhancing the security while maintaining the effectiveness of biometric authentication systems." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/watermarked-face-recognition-scheme(a242609e-ba02-4cca-bfae-3615793fd018).html.

Full text
Abstract:
Biometric authentication systems provide alternative solutions to traditional methods that are based on knowledge (e.g. password) or physical tokens (e.g., smart card). Many studies now focus on getting high accuracy rates for biometric verification. However,with advances in technology, biometric data (e.g. fingerprint, face, iris) can be captured/sniffed, duplicated, modified, and then resubmitted in the same or in other applications that utilize the same biometric features. Watermarking techniques can be used effectively to protect the genuine ownership of biometric data, either to accept or reject. This thesis presents a proposal for a suitable and viable combination of a face recognition algorithm and a watermarking technique, namely a Principal Component Analysis (PCA) and Discrete Cosine Transform (DCT) combination, that will ensure the authenticity of the data being transmitted in the face recognition system, which will then increase its level of security. The emphasis is on replay attack, which is recognizing and rejecting captured biometric data resubmitted into the system. The research begins with an analysis of biometric systems, with an emphasis on face recognition systems, and in particular with reference to the recorded threats on such systems. Biometric watermarking algorithms proposed by previous researchers within the face recognition environment are then studied, noting their proposed solutions to the said threats. This would then give a good idea towards a watermarking scheme to be proposed to enhance the security of face recognition systems, especially in terms of the authenticity of the data being transmitted. This proposed watermarking face recognition scheme is the main objective, which will be implemented in a PCA—DCT combination, followed by a check on all the 8 vulnerable positions where data may be captured and/or resubmitted. All the results produced are positive, apart from a few situations that will have to be left for future work. Non degradation of the individual PCA and DCT systems due to the combination is also checked and experimented on, again with positive results. Finally, the robustness of the watermarking scheme is experimented on to evaluate its resilience against attacks. The contributions from this research constitute a meaningful solution step to security problems associated with biometric techniques. The outcome of the research should also stimulate further research by opening up more research gaps in the area of combining biometric and watermarking techniques.
APA, Harvard, Vancouver, ISO, and other styles
38

Dennis, LeRoy P. Ford Michael K. "The wireless ubiquitous surveillance testbed /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FDennis.pdf.

Full text
Abstract:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Alex Bordetsky, Randy J. Hess. Includes bibliographical references (p. 101-105). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
39

MALIK, NIKITA. "MULTIVIEW HUMAN GAIT ANALYSIS USING THE FIRST AND THIRD PERSON DATA." Thesis, DELHI TECHNOLOGICAL UNIVERSITY, 2021. http://dspace.dtu.ac.in:8080/jspui/handle/repository/18823.

Full text
Abstract:
The gait of a person is often used as a biometric tool to identify or classify a person based on gender and age. Because of its ability to track a person from afar, gait recognition has found use in a variety of fields, including forensics, surveillance, and health monitoring departments. Biometric systems is a rapidly emerging area that necessitates the development of new methods to address problems that have plagued previous approaches. Human gait is a less-explored region in the field of biometrics. In this Project, two different types of gait datasets have been reported and presented. The FP (First Person) data carrying the camera motion collected from the movement of the volunteer's body and the TP (Third Person) data captured from a distant view were recorded at the same time. A total of 24 subjects (15 males and 9 females) are included in the dataset. The discussion is extended to include a comparison of the results obtained using TP and FP data. This report also provides an extensive survey of the stages involved in the framework of gait recognition by analysing the different methods used in each stage along with the description of the feature extraction process and the state-of-the-art techniques used in appearance-based and human-pose-based methods. Moreover, a brief comparative description on the recent data reduction or feature selection methods has been provided. Furthermore, it will provide a first-hand knowledge about the public datasets that is motion capture databases and the datasets simply used for human gait recognition. In comparison to other biometric methods, gait recognition has a lot of potential for future work, Researchers working in the fields of biometrics, human pose estimation, monitoring, human gait recognition and analysis will benefit from the review given in the survey.
APA, Harvard, Vancouver, ISO, and other styles
40

Feng, Yicheng. "Discriminability and security of binary template in face recognition systems." HKBU Institutional Repository, 2012. https://repository.hkbu.edu.hk/etd_ra/1455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Chan, Siu Man. "Improved speaker verification with discrimination power weighting /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHANS.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.
Includes bibliographical references (leaves 86-93). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
42

Crihalmeanu, Musat C. "Adding liveness detection to the hand geometry scanner." Morgantown, W. Va. : [West Virginia University Libraries], 2003. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3220.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2003
Title from document title page. Document formatted into pages; contains viii, 96 p. : ill. (some col.) Includes abstract. Includes bibliographical references (p. 72-74).
APA, Harvard, Vancouver, ISO, and other styles
43

Teodoro, Felipe Gustavo Silva. "Seleção de características para reconhecimento biométrico baseado em sinais de eletrocardiograma." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/100/100131/tde-19122016-003653/.

Full text
Abstract:
O campo da Biometria abarca uma grande variedade de tecnologias usadas para identificar e verificar a identidade de uma pessoa por meio da mensuração e análise de vários aspectos físicos e/ou comportamentais do ser humano. Diversas modalidades biométricas têm sido propostas para reconhecimento de pessoas, como impressões digitais, íris, face e voz. Estas modalidades biométricas possuem características distintas em termos de desempenho, mensurabilidade e aceitabilidade. Uma questão a ser considerada com a aplicação de sistemas biométricos em mundo real é sua robustez a ataques por circunvenção, repetição e ofuscação. Esses ataques estão se tornando cada vez mais frequentes e questionamentos estão sendo levantados a respeito dos níveis de segurança que esta tecnologia pode oferecer. Recentemente, sinais biomédicos, como eletrocardiograma (ECG), eletroencefalograma (EEG) e eletromiograma (EMG) têm sido estudados para uso em problemas envolvendo reconhecimento biométrico. A formação do sinal do ECG é uma função da anatomia estrutural e funcional do coração e dos seus tecidos circundantes. Portanto, o ECG de um indivíduo exibe padrão cardíaco único e não pode ser facilmente forjado ou duplicado, o que tem motivado a sua utilização em sistemas de identificação. Entretanto, a quantidade de características que podem ser extraídas destes sinais é muito grande. A seleção de característica tem se tornado o foco de muitas pesquisas em áreas em que bases de dados formadas por dezenas ou centenas de milhares de características estão disponíveis. Seleção de característica ajuda na compreensão dos dados, reduzindo o custo computacional, reduzindo o efeito da maldição da dimensionalidade e melhorando o desempenho do preditor. O foco da seleção de característica é selecionar um subconjunto de característica a partir dos dados de entrada, que pode descrever de forma eficiente os dados de entrada ao mesmo tempo reduzir os efeitos de ruídos ou características irrelevantes e ainda proporcionar bons resultados de predição. O objetivo desta dissertação é analisar o impacto de algumas técnicas de seleção de característica tais como, Busca Gulosa, Seleção \\textit, Algoritmo Genético, Algoritmo Memético, Otimização por Enxame de Partículas sobre o desempenho alcançado pelos sistemas biométricos baseado em ECG. Os classificadores utilizados foram $k$-Vizinhos mais Próximos, Máquinas de Vetores Suporte, Floresta de Caminhos Ótimos e classificador baseado em distância mínima. Os resultados demonstram que existe um subconjunto de características extraídas do sinal de ECG capaz de fornecer altas taxas de reconhecimento
The field of biometrics includes a variety of technologies used to identify and verify the identity of a person by measuring and analyzing various physical and/or behavioral aspects of the human being. Several biometric modalities have been proposed for recognition of people, such as fingerprints, iris, face and speech. These biometric modalities have distinct characteristics in terms of performance, measurability and acceptability. One issue to be considered with the application of biometric systems in real world is its robustness to attacks by circumvention, spoof and obfuscation. These attacks are becoming more frequent and more questions are being raised about the levels of security that this technology can offer. Recently, biomedical signals, as electrocardiogram (ECG), electroencephalogram (EEG) and electromyogram (EMG) have been studied for use in problems involving biometric recognition. The ECG signal formation is a function of structural and functional anatomy of the heart and its surrounding tissues. Therefore, the ECG of an individual exhibits unique cardiac pattern and cannot be easily forged or duplicated, that have motivated its use in various identification systems. However, the amount of features that can be extracted from this signal is very large. The feature selection has become the focus of much research in areas where databases formed by tens or hundreds of thousands of features are available. Feature Selection helps in understanding data, reducing computation requirement, reducing the effect of curse of dimensionality and improving the predictor performance. The focus of feature selection is to select a subset of features from the input which can efficiently describe the input data while reducing effects from noise or irrelevant features and still provide good prediction results. The aim of this dissertation is to analyze the impact of some feature selection techniques, such as, greedy search, Backward Selection, Genetic Algorithm, Memetic Algorithm, Particle Swarm Optimization on the performance achieved by biometric systems based on ECG. The classifiers used were $k$-Nearest Neighbors, Support Vector Machines, Optimum-Path Forest and minimum distance classifier. The results demonstrate that there is a subset of features extracted from the ECG signal capable of providing high recognition rates
APA, Harvard, Vancouver, ISO, and other styles
44

Alhamdi, Mustafa. "Analysis of human electrocardiogram for arrhythmia auto-classification and biometric recognition systems using analytic and autoregressive modeling parameters." Thesis, University of Portsmouth, 2015. https://researchportal.port.ac.uk/portal/en/theses/analysis-of-human-electrocardiogram-for-arrhythmia-autoclassification-and-biometric-recognition-systems-using-analytic-and-autoregressive-modeling-parameters(7bb302a7-cb94-4df2-b04a-aac1ade0beee).html.

Full text
Abstract:
The electrocardiogram is a skin surface measurement of the electrical activity of the heart over time. This activity is detected by electrodes attached to the surface of the skin and recorded or displayed by an external medical device. Doctors use electrocardiograms to detect and diagnose conditions such as arrhythmias (abnormal heart rhythms) and myocardial infarctions (heartattacks). The work described in this thesis investigates the system designed for two primary applications, electrocardiogram classification system based on autoregressive models which identifies normal (healthy) from abnormal (unhealthy) electrocardiogram signals and the electrocardiogram biometric system based on analytic and modeling features which identifies each person individually from his or her electrocardiogram. In recent years, a number of signal processing techniques have been used to design electrocardiogram signal auto-classification and biometric identification systems. electrocardiogram classification and biometric systems implemented in this thesis are compared with a number of other recently described techniques and methods to identify electrocardiogram signals. The aim of any designed electrocardiogram classification and biometric system described in this work is to achieve high accuracy rate when identifying electrocardiograms. Electrocardiogram classification and biometric systems consists of four major stages, pre-processing of electrocardiogram signal, QRS complex detection, feature extraction and classification algorithms. Each of those steps are discussed and explained in separate chapters with variety of techniques and methods employed to achieve each step. Developed systems based on autoregressive models to design electrocardiogram classification and biometric achieved accurate correct classification rate with high level of productivity due to the small number of extracted parameters using autoregressive models. The proposed electrocardiogram classification and biometric systems of this work achieved 100 % correct classification rate in identifying normal from abnormal electrocardiogram signals and each person individually from his or her electrocardiogram signal. In this work, it has been proven that autoregressive models can represent electrocardiogram signals with 91 % accuracy and matching between the original electrocardiogram signal and the modeled signal.
APA, Harvard, Vancouver, ISO, and other styles
45

Akinbola, Akintunde A. "Estimation of image quality factors for face recognition." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4308.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2005.
Title from document title page. Document formatted into pages; contains vi, 56 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 52-56).
APA, Harvard, Vancouver, ISO, and other styles
46

Ford, Michael K., and LeRoy P. Dennis. "The wireless ubiquitous surveillance testbed." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1124.

Full text
Abstract:
Approved for public release; distribution is unlimited
This thesis research examines the emergence of surveillance and biometrics technologies as a sensible baseline for building a ubiquitous surveillance testbed for the Naval Postgraduate School. This thesis also defines what ubiquitous surveillance is, employs biometric applications and technical strategies to build a working testbed, and addresses developmental issues surrounding the hypothesis for a ubiquitous surveillance testbed. The authors conducted several evaluations of the testbed using different scenarios and recommend emerging biometric and surveillance technologies to promote the maturation of the testbed into a premier ubiquitous habitat.
Lieutenant, United States Navy
Lieutenant, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
47

Brown, Dane. "Investigating combinations of feature extraction and classification for improved image-based multimodal biometric systems at the feature level." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/63470.

Full text
Abstract:
Multimodal biometrics has become a popular means of overcoming the limitations of unimodal biometric systems. However, the rich information particular to the feature level is of a complex nature and leveraging its potential without overfitting a classifier is not well studied. This research investigates feature-classifier combinations on the fingerprint, face, palmprint, and iris modalities to effectively fuse their feature vectors for a complementary result. The effects of different feature-classifier combinations are thus isolated to identify novel or improved algorithms. A new face segmentation algorithm is shown to increase consistency in nominal and extreme scenarios. Moreover, two novel feature extraction techniques demonstrate better adaptation to dynamic lighting conditions, while reducing feature dimensionality to the benefit of classifiers. A comprehensive set of unimodal experiments are carried out to evaluate both verification and identification performance on a variety of datasets using four classifiers, namely Eigen, Fisher, Local Binary Pattern Histogram and linear Support Vector Machine on various feature extraction methods. The recognition performance of the proposed algorithms are shown to outperform the vast majority of related studies, when using the same dataset under the same test conditions. In the unimodal comparisons presented, the proposed approaches outperform existing systems even when given a handicap such as fewer training samples or data with a greater number of classes. A separate comprehensive set of experiments on feature fusion show that combining modality data provides a substantial increase in accuracy, with only a few exceptions that occur when differences in the image data quality of two modalities are substantial. However, when two poor quality datasets are fused, noticeable gains in recognition performance are realized when using the novel feature extraction approach. Finally, feature-fusion guidelines are proposed to provide the necessary insight to leverage the rich information effectively when fusing multiple biometric modalities at the feature level. These guidelines serve as the foundation to better understand and construct biometric systems that are effective in a variety of applications.
APA, Harvard, Vancouver, ISO, and other styles
48

Galvão, João Neto Cronemberger. "MABIS: Sistema Automático de Biometria Modulado." Universidade Federal de Goiás, 2017. http://repositorio.bc.ufg.br/tede/handle/tede/7035.

Full text
Abstract:
Submitted by Cássia Santos (cassia.bcufg@gmail.com) on 2017-03-28T11:45:59Z No. of bitstreams: 2 Dissertação - João Neto Cronemberger Galvão - 2017.pdf: 3677244 bytes, checksum: 131ab2bd6a3da711a718560ca96c89b6 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2017-03-28T13:49:38Z (GMT) No. of bitstreams: 2 Dissertação - João Neto Cronemberger Galvão - 2017.pdf: 3677244 bytes, checksum: 131ab2bd6a3da711a718560ca96c89b6 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2017-03-28T13:49:38Z (GMT). No. of bitstreams: 2 Dissertação - João Neto Cronemberger Galvão - 2017.pdf: 3677244 bytes, checksum: 131ab2bd6a3da711a718560ca96c89b6 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-02-17
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
Over the years, biometrics has become a valuable resource for human identification be- cause it is an affordable, safe and reliable technique. Various security entities throughout the world, public and private, are committed to the use of biometrics in security; both in access control and for identifying suspects. In addition, many crimes can be prevented with tools that allow crosschecking of biometric data. However, biometric systems cur- rently in use are developed and provided by companies as proprietary systems. For this reason, the creation of a free and open tool will bring more security, control and savings for the government. For this reason, the objective of this work is to create a prototype of a free and open tool, developed within the Web Services approach, associated to the development of an API that will aim at a standardization of biometrics services, conside- ring the exchange of data between distinct and independent biometric applications with a low level of coupling and interoperability between systems of different platforms and technologies, so that it is possible to add to the service and use of multiple biometric functionalities such as face recognition, voice, fingerprints, hand geometry, iris, or even a combination, among others, to perform a task of personal identification.
A cada dia que passa, a biometria vem se tornando um recurso valioso para identifica- ção humana, pois trata-se de uma técnica acessível, segura e confiável. Várias entidades de segurança, por todo o mundo, públicas e privadas, estão empenhadas na utilização da biometria na área de segurança, tanto no controle de acesso, quanto para identifica- ção de investigados. Além disso, diversos crimes podem ser evitados com ferramentas que possibilitam o cruzamento de dados biométricos. No entanto, a maioria dos sistemas biométricos em uso atualmente são desenvolvidos e fornecidos por empresas como siste- mas proprietários, desenvolvidos isoladamente, sem o compartilhamento de informações e base de dados, não atendendo, a contento, as necessidades de agentes governamentais no que se refere à escala, controle e economia no uso das aplicações de biometria. Por esta razão, o objetivo deste trabalho será a criação de um protótipo de uma ferramenta livre e aberta, desenvolvida dentro da abordagem de Serviços Web, associado ao desen- volvimento de uma API que visará a padronização dos serviços de biometria, tendo em vista o intercâmbio de dados entre aplicações biométricas distintas e independentes, com um nível reduzido de acoplamento e com interoperabilidade entre sistemas de diferentes plataformas e tecnologias, de modo que seja possível agregar ao serviço o uso de várias funcionalidades biométricas tais como: o reconhecimento de face, a voz, as impressões digitais, a geometria da mão, a íris, ou mesmo a combinação destas, dentre outras, para executar a tarefa de identificação pessoal.
APA, Harvard, Vancouver, ISO, and other styles
49

Pisani, Paulo Henrique. "Biometrics in a data stream context." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08052017-141153/.

Full text
Abstract:
The growing presence of the Internet in day-to-day tasks, along with the evolution of computational systems, contributed to increase data exposure. This scenario highlights the need for safer user authentication systems. An alternative to deal with this is by the use of biometric systems. However, biometric features may change over time, an issue that can affect the recognition performance due to an outdated biometric reference. This effect can be called as template ageing in the area of biometrics and as concept drift in machine learning. It raises the need to automatically adapt the biometric reference over time, a task performed by adaptive biometric systems. This thesis studied adaptive biometric systems considering biometrics in a data stream context. In this context, the test is performed on a biometric data stream, in which the query samples are presented one after another to the biometric system. An adaptive biometric system then has to classify each query and adapt the biometric reference. The decision to perform the adaptation is taken by the biometric system. Among the biometric modalities, this thesis focused on behavioural biometrics, particularly on keystroke dynamics and on accelerometer biometrics. Behavioural modalities tend to be subject to faster changes over time than physical modalities. Nevertheless, there were few studies dealing with adaptive biometric systems for behavioural modalities, highlighting a gap to be explored. Throughout the thesis, several aspects to enhance the design of adaptive biometric systems for behavioural modalities in a data stream context were discussed: proposal of adaptation strategies for the immune-based classification algorithm Self-Detector, combination of genuine and impostor models in the Enhanced Template Update framework and application of score normalization to adaptive biometric systems. Based on the investigation of these aspects, it was observed that the best choice for each studied aspect of the adaptive biometric systems can be different depending on the dataset and, furthermore, depending on the users in the dataset. The different user characteristics, including the way that the biometric features change over time, suggests that adaptation strategies should be chosen per user. This motivated the proposal of a modular adaptive biometric system, named ModBioS, which can choose each of these aspects per user. ModBioS is capable of generalizing several baselines and proposals into a single modular framework, along with the possibility of assigning different adaptation strategies per user. Experimental results showed that the modular adaptive biometric system can outperform several baseline systems, while opening a number of new opportunities for future work.
A crescente presença da Internet nas tarefas do dia a dia, juntamente com a evolução dos sistemas computacionais, contribuiu para aumentar a exposição dos dados. Esse cenário evidencia a necessidade de sistemas de autenticação de usuários mais seguros. Uma alternativa para lidar com isso é pelo uso de sistemas biométricos. Contudo, características biométricas podem mudar com o tempo, o que pode afetar o desempenho de reconhecimento devido a uma referência biométrica desatualizada. Esse efeito pode ser chamado de template ageing na área de sistemas biométricos adaptativos ou de mudança de conceito em aprendizado de máquina. Isso levanta a necessidade de adaptar automaticamente a referência biométrica com o tempo, uma tarefa executada por sistemas biométricos adaptativos. Esta tese estudou sistemas biométricos adaptativos considerando biometria em um contexto de fluxo de dados. Neste contexto, o teste é executado em um fluxo de dados biométrico, em que as amostras de consulta são apresentadas uma após a outra para o sistema biométrico. Um sistema biométrico adaptativo deve então classificar cada consulta e adaptar a referência biométrica. A decisão de executar a adaptação é tomada pelo sistema biométrico. Dentre as modalidades biométricas, esta tese foca em biometria comportamental, em particular em dinâmica da digitação e em biometria por acelerômetro. Modalidades comportamentais tendem a ser sujeitas a mudanças mais rápidas do que modalidades físicas. Entretanto, havia poucos estudos lidando com sistemas biométricos adaptativos para modalidades comportamentais, destacando uma lacuna para ser explorada. Ao longo da tese, diversos aspectos para aprimorar o projeto de sistemas biométricos adaptativos para modalidades comportamentais em um contexto de fluxo de dados foram discutidos: proposta de estratégias de adaptação para o algoritmo de classificação imunológico Self-Detector, combinação de modelos genuíno e impostor no framework do Enhanced Template Update e aplicação de normalização de scores em sistemas biométricos adaptativos. Com base na investigação desses aspectos, foi observado que a melhor escolha para cada aspecto estudado dos sistemas biométricos adaptativos pode ser diferente dependendo do conjunto de dados e, além disso, dependendo dos usuários no conjunto de dados. As diferentes características dos usuários, incluindo a forma como as características biométricas mudam com o tempo, sugerem que as estratégias de adaptação deveriam ser escolhidas por usuário. Isso motivou a proposta de um sistema biométrico adaptativo modular, chamado ModBioS, que pode escolher cada um desses aspectos por usuário. O ModBioS é capaz de generalizar diversos sistemas baseline e propostas apresentadas nesta tese em um framework modular, juntamente com a possibilidade de atribuir estratégias de adaptação diferentes por usuário. Resultados experimentais mostraram que o sistema biométrico adaptativo modular pode superar diversos sistemas baseline, enquanto que abre um grande número de oportunidades para trabalhos futuros.
APA, Harvard, Vancouver, ISO, and other styles
50

Silonosov, Alexandr. "Identifying the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics, an experiment." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20124.

Full text
Abstract:
The ubiquity and speed of Internet access led over the past decade to an exponential increase in the use of thin clients and cloud computing, both taking advantage of the ability to remotely provide computing resources. The work investigates the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics. Authentication based on keystroke dynamics is easy in use, cheap, invisible for user and does not require any additional sensor.I n this project I will investigate how network characteristics affect the keystroke dynamics pattern in remote desktop scenario. Objectives: The aim of this project is to investigate the role of remote display Protocol in behavioral biometric system based on free-text keystroke dynamics, by measuring how network characteristics influence the computation of keystroke pattern in Virtual Desktop Infrastructure (VDI). Method: This thesis will answer all of its research question with the help of a Systematic Literature Review (SLR) and an Experiment. Literature review was conducted to gather information about the keystroke dynamics analysis, the applied algorithms and their performance; and to clarify the controlled changes of networking performance in VDI based scenario. Using the acquired knowledge, implemented keystroke dynamics pattern algorithm based on Euclidian distance statistical method, designed an experiment and performed a series of tests, in order to identify the influence of remote display protocol to keystroke pattern. Results: Through the SLR, keystroke dynamics analysis working structure is identified and illustrated, essential elements are summarized, and a statistical approach based on Euclidian distance is described; a technique to simulate and measure networklatency in VDI scenario is described including essential elements and parameters of VDI testbed. Keystroke analysis algorithm, dataset replication code and VDItestbed are implemented. The controlled experiment provided measurements of the metrics of the algorithm and network performance mentioned in objectives. Conclusions: During experimentation, I found that timing pattern in the keystroke dynamics data is affected by VDI in normal network conditions by 12% in average. Higher latency standard deviation, jitter, packet loss as well as remote display protocol overheads have a significant combined impact onto keystroke pattern. Moreover I found what maximum possible delay values does not affect keystroke pattern in a larger extent.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography