To see the other types of publications on this topic, follow the link: Biometric systems.

Journal articles on the topic 'Biometric systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Biometric systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.

Full text
Abstract:
Biometrics is the discipline to measure physical human characteristics for the identification and authentication of an individual. Since ancient times, people have used voice, face, and other characteristics for the identification of an individual. With evolution, we take the individual characteristics like fingerprint scans, retina and iris images, etc., as inputs to the computer systems and then store or verify them with existing records. This report discusses biometrics and its recent roles found in the field of healthcare, medicine, genetics, and biotechnology. It includes the concept of biometrics, the system used for biometric recognition and its working, types of biometric systems, the different system algorithms applied, and system modules which are well illustrated with flow charts and block diagrams. Some of the health institutes in developed countries have started using biometric systems for checking patients and/or doctors. Biometry has enabled the proper organization and storage of the health records of individuals in medical institutes. Biometric authentication is also finding a distinct role in foiling medical claims fraud highlighting the advantages it. Even after processing via a very accurate biometric system, there is a chance of a false result due to some disease or injury to the body part subjected to biometry or faulty system leading to some error. There is also a possibility that the biometric system may harm our bodies. Moreover, biometric records need really tight system security to prevent any kind of misuse. Biometrics has a great potential to find a lot more uses in the field of healthcare. Many ideas are being proposed for implementation. In the future, biometrics can be used to detect potential disease and risks by using methods like adiposity measurement and Gas Discharge Visualization (GDV).
APA, Harvard, Vancouver, ISO, and other styles
2

Shopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, and Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions." Journal of Cybersecurity and Privacy 1, no. 3 (August 31, 2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.

Full text
Abstract:
Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article concludes with open questions and provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.
APA, Harvard, Vancouver, ISO, and other styles
3

Buciu, Ioan, and Alexandru Gacsadi. "Biometrics Systems and Technologies: A survey." International Journal of Computers Communications & Control 11, no. 3 (March 24, 2016): 315. http://dx.doi.org/10.15837/ijccc.2016.3.2556.

Full text
Abstract:
In a nutshell, a biometric security system requires a user to provide some biometric features which are then verified against some stored biometric templates. Nowadays, the traditional password based authentication method tends to be replaced by advanced biometrics technologies. Biometric based authentication is becoming increasingly appealing and common for most of the human-computer interaction devices. To give only one recent example, Microsoft augmented its brand new Windows 10 OS version with the capability of supporting face recognition when the user login in. This chapter does not intend to cover a comprehensive and detailed list of biometric techniques. The chapter rather aims at briefly discussing biometric related items, including principles, definitions, biometric modalities and technologies along with their advantages, disadvantages or limitations, and biometric standards, targeting unfamiliar readers. It also mentions the attributes of a biometric system as well as attacks on biometrics. Important reference sources are pointed out so that the interested reader may gain deeper in-depth knowledge by consulting them.
APA, Harvard, Vancouver, ISO, and other styles
4

Reddy, M. V. Bramhananda, and V. Goutham. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research -GRANTHAALAYAH 6, no. 1 (January 31, 2018): 80–90. http://dx.doi.org/10.29121/granthaalayah.v6.i1.2018.1596.

Full text
Abstract:
Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using iris or along with other biometrics for security with great precision. Multimodal biometric systems came into existence for better accuracy in human authentication. However, iris is considered to be most discriminatory of facial biometrics. Study of iris based human identification in ideal and non-cooperative environments can provide great insights which can help researchers and organizations that depend on iris-based biometric systems. The technical knowhow of iris strengths and weaknesses can be great advantage. This is more important in the wake of widespread use of smart devices which are vulnerable to attacks. This paper throws light into various iris-based biometric systems, issues with iris in the context of texture comparison, cancellable biometrics, iris in multi-model biometric systems, iris localization issues, challenging scenarios pertaining to accurate iris recognition and so on.
APA, Harvard, Vancouver, ISO, and other styles
5

Choudhury, Bismita, Patrick Then, Biju Issac, Valliappan Raman, and Manas Kumar Haldar. "A Survey on Biometrics and Cancelable Biometrics Systems." International Journal of Image and Graphics 18, no. 01 (January 2018): 1850006. http://dx.doi.org/10.1142/s0219467818500067.

Full text
Abstract:
Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results.
APA, Harvard, Vancouver, ISO, and other styles
6

Mudhafer Taher Al Mossawy, Mais, and Loay E. George. "A digital signature system based on hand geometry - Survey." Wasit Journal of Computer and Mathematics Science 1, no. 1 (April 1, 2022): 1–14. http://dx.doi.org/10.31185/wjcm.vol1.iss1.18.

Full text
Abstract:
In recent years large number of emerging automated applications faces the need to have recognition abilities of persons using their own self biometrics, before they can access the applications services. Nowadays, Biometric recognition is used, it can be used as automatic identification or automatic verification of persons based on their physiological or behavioral characteristics. There are no perfect biometric measurements;each biometry has its advantages and limitations. Each biometry requires specific vital identity to answer the identification or verification question. The suitability of a particular biometry for a particular application depends on many factors. Hand geometry/shape is a very simple biometric technology that uses the measurements of human hand to verify the identity of the individuals. The measurements include the distance between certain mark points, shape and width of fingers and size of palm. The biometric systems that employing hand geometry become widely used since they have high public acceptance. This article aims to survey several articles found in literature about hand based biometric system, and to compare different methods of biometric recognition that based on hand geometry.
APA, Harvard, Vancouver, ISO, and other styles
7

Rajvanshi, Saumya, Shiv Chauhan, and Savneet Kaur. "A New Wave in Biometric System: Systematic Study." CGC International Journal of Contemporary Technology and Research 4, no. 2 (August 5, 2022): 300–305. http://dx.doi.org/10.46860/cgcijctr.2022.07.31.300.

Full text
Abstract:
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometrics like face recognition, fingerprint recognition, iris recognition and behavioral biometrics like signature recognition and voice recognition. All these recognition systems are discussed in this research paper. Biometric systems work on three levels: Enrollment, Verification, and Identification. Enrollment is the process in which patterns are captured from the user and stored in the database. Verification means to confirm that the sample entered by the user belongs to him or not. When the user wants to access the data then the user must use his/her biometrics so that the system checks that the person who wants to access the data is the real owner of the data or not. This process is identification. All three levels are the working levels of the Biometric System. In earlier years, biometrics were used only at ground levels to provide basic security to data but now the tables have turned. It is playing a major role in providing security to our data. Biometrics are not only used in day-to-day life in phone unlocking, phone assistants, attendance systems but also used at advanced levels like in airports, border security, cloud computing etc. In this research paper, we will discuss the future scope of biometric systems and how it could even change the future.
APA, Harvard, Vancouver, ISO, and other styles
8

S. Raju, A., and V. Udayashankara. "A Survey on Unimodal, Multimodal Biometrics and Its Fusion Techniques." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 689. http://dx.doi.org/10.14419/ijet.v7i4.36.24224.

Full text
Abstract:
Presently, a variety of biometric modalities are applied to perform human identification or user verification. Unimodal biometric systems (UBS) is a technique which guarantees authentication information by processing distinctive characteristic sequences and these are fetched out from individuals. However, the performance of unimodal biometric systems restricted in terms of susceptibility to spoof attacks, non-universality, large intra-user variations, and noise in sensed data. The Multimodal biometric systems defeat various limitations of unimodal biometric systems as the sources of different biometrics typically compensate for the inherent limitations of one another. The objective of this article is to analyze various methods of information fusion for biometrics, and summarize, to conclude with direction on future research proficiency in a multimodal biometric system using ECG, Fingerprint and Face features. This paper is furnished as a ready reckoner for those researchers, who wish to persue their work in the area of biometrics.
APA, Harvard, Vancouver, ISO, and other styles
9

Chinyemba, Melissa K., and Jackson Phiri. "Gaps in the Management and Use of Biometric Data: A Case of Zambian Public and Private Institutions." Zambia ICT Journal 2, no. 1 (June 29, 2018): 35–43. http://dx.doi.org/10.33260/zictjournal.v2i1.49.

Full text
Abstract:
The current physical and cybersecurity systems rely on traditional three-factor authentication to mitigate the threats posed by insider attacks. Key is the use of biometric information. Biometrics are a unique measurement and analysis of the unique physiological special traits such as voice, eye structure and others that can be used in the discipline of varying person identification. Biometry, which is the analysis of these biometrics is a complex process but guarantees identification and non-repudiation. If used to identify humans then several issues such as where is the biometric data stored? Who has access to it? And how does one ensure that such data satisfies the principle of availability. To achieve availability, secure transportation arises. To achieve transportation, non-repudiation, confidentiality and authentication, integrity arise. A storage and transport system is recommended to these challenges. In this paper, we explore the gaps into how public and private institution store and manage biometrics information. We benchmarked each organization again the ISO 30107 and ISO 24745. Our results show that while most companies are adopting and using biometrics systems, few have adopted the ISO biometrics standards that govern the storage and management of biometric information and hence creating security risk.
APA, Harvard, Vancouver, ISO, and other styles
10

Kulikov, A. A. "Application of biometric systems in face identification technologies." Russian Technological Journal 9, no. 3 (June 28, 2021): 7–14. http://dx.doi.org/10.32362/2500-316x-2021-9-3-7-14.

Full text
Abstract:
The paper presents an analytical review of the application of biometric recognition systems in relation to facial image identification technologies. The classification of biometric systems is presented. The trends of technological progress in the field of biometrics and facial recognition capabilities are considered. It is determined that in 2020 there is a trend of transition from the use of biometric recognition technologies in traditional state security systems to the sphere of commercial and user applications. The process of «linking» encryption keys and passwords with the biometric parameters of the data subject is described. It is proposed that a biometric feature and a biometrics parameter mean a certain value that has a physical meaning that characterizes the subject itself. The possibility of using circular neighborhood and bilinear interpolation of pixel intensity values in biometrics is also presented. This will make it possible to build a local binary template. In order to solve the problem of identification of persons, it is advisable to investigate the essence of biometric systems in the technologies of identification of persons, their types, identifying the shortcomings of each of them, on the basis of which to present the directions of elimination and search for the most reliable technologies. The essence of the use of biometric systems in the technologies of identification of persons is, for example, that the user can provide the bank or other counterparty with evidence that it is he who wants to use the services on his accounts. At the same time, the demand has increased for contactless biometric solutions. These technologies are implemented in order to conduct additional biometric verification of users. This allows to minimize possible fraud or violation of the internal rules of the service, for example, the transfer of accounts of some registered users to others.
APA, Harvard, Vancouver, ISO, and other styles
11

Hausawi, Yasser. "Role of Usability on using Biometrics for Cybersecurity." Transactions on Networks and Communications 7, no. 4 (November 8, 2019): 19–26. http://dx.doi.org/10.14738/tnc.74.7244.

Full text
Abstract:
ABSTRACT Biometrics are traits that allow individuals to be identified. Popular biometrics include fingerprints, faces, and irides. A common use of biometric systems is for authentication of users desiring access to a system or resource. However, the use of biometrics presents challenges and opportunities unique to other authentication methods, such as passwords and tokens. Biometric systems are also vulnerable to poor usability. Such systems must be engineered with wide user accessibility and acceptability in mind, but must still provide robust security as well. As lack of usability causes systems' failures, and enhancing systems' usability reduces such failures. This article first presents an overview of biometric systems employed today, including their usage and security merits. We then consider the specific role usability plays on both the development and long-term utility of biometric systems used for Cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
12

Singh, Sukhdev, and Chander Kant. "Biometric Systems in Mobile Devices." International Journal of Distributed Artificial Intelligence 11, no. 1 (January 2019): 18–24. http://dx.doi.org/10.4018/ijdai.2019010102.

Full text
Abstract:
Growth of mobile devices uses has favored the user experience with different digital platforms, from basic activities such as sending messages, phone calls, taking pictures for social networks, email, bank account management, and commerce. These are some examples of daily tasks performed from mobile devices, which makes it essential to provide security of information. Therefore, privacy of stored information has become a main point in the development of mobile devices. This article presents research about the impact that mobile devices have in people's lives and the presence of biometric systems in this kind of device. Papers related with biometrics on mobile devices were examined to find which devices have integrated biometric systems; in addition to identifying biometric features used to authenticate people and find out what mobile platforms were created for. It was found that the smartphone is the device with more biometrics systems, and fingerprints are the most used feature; also, that the Android operating system is the most widely used mobile platform for these purposes.
APA, Harvard, Vancouver, ISO, and other styles
13

Medjahed, Chahreddine, Abdellatif Rahmoun, Christophe Charrier, and Freha Mezzoudj. "A deep learning-based multimodal biometric system using score fusion." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 1 (March 1, 2022): 65. http://dx.doi.org/10.11591/ijai.v11.i1.pp65-80.

Full text
Abstract:
Recent trends in artificial intelligence tools-based biometrics have overwhelming attention to security matters. The hybrid approaches are motivated by the fact that they combine mutual strengths and they overcome their limitations. Such approaches are being applied to the fields of biomedical engineering. A biometric system uses behavioural or physiological characteristics to identify an individual. The fusion of two or more of these biometric unique characteristics contributes to improving the security and overcomes the drawbacks of unimodal biometric-based security systems. This work proposes efficent multimodal biometric systems based on matching score concatenation fusion of face, left and right palm prints. Multimodal biometric identification systems using convolutional neural networks (CNN) and k-nearest neighbors (KNN) are proposed and trained to recognize and identify individuals using multi-modal biometrics scores. Some popular biometrics benchmarks such as FEI face dataset and IITD palm print database are used as raw data to train the biometric systems to design a strong and secure verification/identification system. Experiments are performed on noisy datasets to evaluate the performance of the proposed model in extreme scenarios. Computer simulation results show that the CNN and KNN multi-modal biometric system outperforms most of the most popular up to date biometric verification techniques.
APA, Harvard, Vancouver, ISO, and other styles
14

Assouma, Abdoul Kamal, Tahirou Djara, and Abdou-Aziz Sobabe. "Multi-Biometrics: Survey and Projection of a New Biometric System." International Journal of Engineering and Advanced Technology 12, no. 3 (February 28, 2023): 80–87. http://dx.doi.org/10.35940/ijeat.c4008.0212323.

Full text
Abstract:
Multi-biometric systems using feature-level fusion allow more accuracy and reliability in recognition performance than uni-biometric systems. But in practice, this type of fusion is difficult to implement especially when we are facing heterogeneous biometric modalities or incompatible features. The major challenge of feature fusion is to produce a representation of each modality with an excellent level of discrimination. Beyond pure biometric modalities, the use of metadata has proven to improve the performance of biometric systems. In view of these findings, our work focuses on multi-origin biometrics which allows the use of pure biometric modalities and metadata in a feature fusion strategy. The main objective of this paper is to present an overview of biometrics as bordered in the literature with a particular focus on multibiometrics and to propose a model of a multi-origin biometric system using pure biometric and soft biometric modalities in a feature-level fusion strategy. The curvelet transformation and the order statistics are proposed respectively for the extraction the feature of the pure biometric modalities, and for the selection of the relevant feature of each modality in order to ensure a good level of discrimination of the individuals. In this paper, we have presented the overview of biometrics through its concepts, modalities, advantages, disadvantages and implementation architectures. A focus has been put on multi-biometrics with the presentation of a harmonized process for feature fusion. For the experiments, we proposed a global model for feature fusion in a multi-origin system using face and iris modalities as pure biometrics, and facial skin color as metadata. This system and the results will be presented in future work.
APA, Harvard, Vancouver, ISO, and other styles
15

Jain, Rubal, and Chander Kant. "Attacks on Biometric Systems: An Overview." International Journal of Advances in Scientific Research 1, no. 7 (September 3, 2015): 283. http://dx.doi.org/10.7439/ijasr.v1i7.1975.

Full text
Abstract:
Biometrics is a pattern recognition system that refers to the use of different physiological (face, fingerprints, etc.) and behavioral (voice, gait etc.) traits for identification and verification purposes. A biometrics-based personal authentication system has numerous advantages over traditional systems such as token-based (e.g., ID cards) or knowledge-based (e.g., password) but they are at the risk of attacks. This paper presents a literature review of attack system architecture and makes progress towards various attack points in biometric system. These attacks may compromise the template resulting in reducing the security of the system and motivates to study existing biometric template protection techniques to resist these attacks.
APA, Harvard, Vancouver, ISO, and other styles
16

Shihab A. Shawkat and Raya N. Ismail. "Biometric Technologies in Recognition Systems: A Survey." Tikrit Journal of Pure Science 24, no. 6 (November 3, 2019): 132–37. http://dx.doi.org/10.25130/tjps.v24i6.449.

Full text
Abstract:
The ability to recognize people uniquely and to associate personal attributes such as name and nationality with them has been very important to the fabric of human society. Nowadays, modern societies have an explosion in population growth and increased mobility which necessitated building advanced identity management systems for recording and maintaining people’s identities. In the last decades, biometrics has played an important role in recognizing people instead of traditional ways such as passwords and keys which can be forgotten or be stolen. Biometric systems employ physiological and/or behavioral characteristics of people to verify their identities. There are different biometric modalities that can be used to recognize people such as fingerprints, face, hand geometry, voice, iris, signature, etc. In this paper, a comprehensive overview have been provided on the major issues of biometric systems including general biometric system architecture, major biometric traits, biometric systems performance, and some relevant works.
APA, Harvard, Vancouver, ISO, and other styles
17

Shawkat1, Shihab A., and Raya N. Ismail2. "Biometric Technologies in Recognition Systems: A Survey." Tikrit Journal of Pure Science 24, no. 6 (November 3, 2019): 132. http://dx.doi.org/10.25130/j.v24i6.899.

Full text
Abstract:
The ability to recognize people uniquely and to associate personal attributes such as name and nationality with them has been very important to the fabric of human society. Nowadays, modern societies have an explosion in population growth and increased mobility which necessitated building advanced identity management systems for recording and maintaining people’s identities. In the last decades, biometrics has played an important role in recognizing people instead of traditional ways such as passwords and keys which can be forgotten or be stolen. Biometric systems employ physiological and/or behavioral characteristics of people to verify their identities. There are different biometric modalities that can be used to recognize people such as fingerprints, face, hand geometry, voice, iris, signature, etc. In this paper, a comprehensive overview have been provided on the major issues of biometric systems including general biometric system architecture, major biometric traits, biometric systems performance, and some relevant works. http://dx.doi.org/10.25130/tjps.24.2019.120
APA, Harvard, Vancouver, ISO, and other styles
18

Singh, Bhanu, and Nirvisha Singh. "MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics." Information 11, no. 6 (June 8, 2020): 308. http://dx.doi.org/10.3390/info11060308.

Full text
Abstract:
With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. Organizations encourage their members to use biometrics, but they are hesitant to use them due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. We propose a server-specific add-on biometric security layer model (MoLaBSS) to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show good potential of this framework to enhance users’ confidence level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.
APA, Harvard, Vancouver, ISO, and other styles
19

B.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.

Full text
Abstract:
Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric Modalities and Face recognition Techniques.
APA, Harvard, Vancouver, ISO, and other styles
20

Tot, Ivan, Jovan Bajčetić, Boriša Jovanović, Mladen Trikoš, Dušan Bogićević, and Tamara Gajić. "Biometric standards and methods." Vojnotehnicki glasnik 69, no. 4 (2021): 963–77. http://dx.doi.org/10.5937/vojtehg69-32296.

Full text
Abstract:
Introduction/purpose: Nowadays, user identification systems play a very important role in modern society. Complex security requirements have led experts to explore ways in which biometric data can be used to identify user identities. This paper presents an overview of biometric standards and methods which can be used to identify users in biometric systems, and therefore to protect information and communication systems. Methods: This paper deals with the problem of standardization in the field of biometrics. The first part of the paper presents concrete examples of the most widely used biometric standards. The second part of the paper gives an overview of the most used biometric methods. Results: The obtained results show that the development of biometric systems and biometric sensors contributes to better protection of identity from misuse, because biometric technologies have great potential for improving the security and accuracy of system operation. Biometric systems improve the security of users and also provide much greater precision in establishing identity. Conclusion: The development of biometric standards should focus on their interconnectivity, as well as on increasing connectivity with other IT standards.
APA, Harvard, Vancouver, ISO, and other styles
21

Rudall, B. H. "Biometric systems." Kybernetes 33, no. 8 (September 2004): 1235–43. http://dx.doi.org/10.1108/03684920410545225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Omar, Bayan. "Fusion Method with Mean-discrete Algorithm in Feature level for Identical twins Identification." UHD Journal of Science and Technology 4, no. 2 (December 27, 2020): 141. http://dx.doi.org/10.21928/uhdjst.v4n2y2020.pp141-150.

Full text
Abstract:
The study on twins is an important form of study in the forensic and biometrics field as twins share similar genetic traits. A biometric is one of the common types of pattern recognition which acquires biometric data from a person. From these data, a feature is established and extracted where these features can be used to identify individual. Exiting works in biometric identification concentrate on unimodal biometric identification. The high similarity in a pair of twin’s biometric may lead to miss performance. Hence, due to their great accurateness, multimodal biometric systems have become more favored than unimodal biometric systems in identical twins identification. However, these systems are highly complex. We proposed Mean-Discrete feature based fusion algorithm for Kurdish handwriting and fingerprint for identical twins detection. Its viability and advantage over the unimodal biometric systems are highlighted. This paper employed 800 images from 50 pairs of identical twins from Kurdistan Region to carry out the experiment.
APA, Harvard, Vancouver, ISO, and other styles
23

Iula, Antonio. "Ultrasound Systems for Biometric Recognition." Sensors 19, no. 10 (May 20, 2019): 2317. http://dx.doi.org/10.3390/s19102317.

Full text
Abstract:
Biometric recognition systems are finding applications in more and more civilian fields because they proved to be reliable and accurate. Among the other technologies, ultrasound has the main merit of acquiring 3D images, which allows it to provide more distinctive features and gives it a high resistance to spoof attacks. This work reviews main research activities devoted to the study and development of ultrasound sensors and systems for biometric recognition purposes. Several transducer technologies and different ultrasound techniques have been experimented on for imaging biometric characteristics like fingerprints, hand vein pattern, palmprint, and hand geometry. In the paper, basic concepts on ultrasound imaging techniques and technologies are briefly recalled and, subsequently, research studies are classified according to the kind of technique used for collecting the ultrasound image. Overall, the overview demonstrates that ultrasound may compete with other technologies in the expanding market of biometrics, as the different commercial fingerprint sensors integrated in portable electronic devices like smartphones or tablets demonstrate.
APA, Harvard, Vancouver, ISO, and other styles
24

Kulanbay, Sh B., G. S. Beketova, and E. N. Tulegenova. "RESEARCH AND DEVELOPMENT OF BIOMETRIC METHODS." Herald of the Kazakh-British technical university 20, no. 2 (July 2, 2023): 115–24. http://dx.doi.org/10.55452/1998-6688-2023-20-2-115-124.

Full text
Abstract:
Identification systems play a very important role in today's society. Complex security requirements have prompted experts to explore ways in which biometrics can be used to identify customers. In this article, the concept of biometrics, biometric data and its variants are considered. The purpose of the article is to study the process of identification, to produce its improved version and introduce innovation. Thus, the following points served as a research method:- Initialization.- Fitness functions.- Unclear clusterleu method.The results showed that the advancement of biometric systems and biometric sensors can improve the identity and prevent others from using the identity, the system has great potential to improve the security and accuracy of the biometric technology system. Biometric systems increase the security of users, as well as ensure accuracy in the identification of personal identity. Thus, the accuracy of the proposed method is compared with four modern methods. The comparison shows that the proposed approach provided a high accuracy of about 99.89% and a low error rate of 0.18%. It turns out that there is real potential for the integration of fingerprints and iris biometrics in many subjects with the appropriate assessment.
APA, Harvard, Vancouver, ISO, and other styles
25

Chandra, Akhilesh, and Thomas G. Calderon. "Toward a Biometric Security Layer in Accounting Systems." Journal of Information Systems 17, no. 2 (September 1, 2003): 51–70. http://dx.doi.org/10.2308/jis.2003.17.2.51.

Full text
Abstract:
This paper discusses theoretical and practical issues related to the use of a biometric-enabled security layer in accounting systems aimed at enhancing user authentication and reducing control risk. Originating in criminology, biometric technology has matured over the years with applications in diverse disciplines. However, its use in business and accounting is still in its infancy, and many issues about its role in information systems security are unresolved. The paper proposes an access decision framework that draws from the strategy and risk assessment literature to model processes where biometrics might be used to reduce control risk. Despite its potential strengths, biometric technology is not a panacea and represents one element in a portfolio of security mechanisms needed to protect information resources. The paper discusses challenges in implementing biometric technology and identifies avenues for future research.
APA, Harvard, Vancouver, ISO, and other styles
26

Jovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.

Full text
Abstract:
Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digital identity management and MMBio framework for multimodal biometrics. Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data. Developed prototype confirms possible integration of identity management and multimodal biometric systems.
APA, Harvard, Vancouver, ISO, and other styles
27

Mróz-Gorgoń, Barbara, Wojciech Wodo, Anna Andrych, Katarzyna Caban-Piaskowska, and Cyprian Kozyra. "Biometrics Innovation and Payment Sector Perception." Sustainability 14, no. 15 (August 1, 2022): 9424. http://dx.doi.org/10.3390/su14159424.

Full text
Abstract:
This paper presents an analysis of innovations in the biometrics market, which have started to play a very important role in personal identification and identification systems. The aim of the study was to analyze current customs and opinions regarding payment methods, as well as to identify threats and opportunities for new biometric solutions in this area. First, the history of the biometrics market is presented. Acceptance patterns of new technologies are explored and modified. The authors used literature reviews, qualitative research (focus groups), and quantitative research (questionnaire survey) as methods. The main value and importance of biometrics is the uniqueness of biometric patterns (e.g., face, fingerprint, iris, etc.), which takes the security of these systems to a new level. The results of the quantitative study based on the qualitative survey show positive verification of the hypothesized reasons; e.g., importantly, that the age of potential users of biometric payments influences the fear about personal data. Fear of losing personal data affects the perceived safety of biometric payments. Perceived security has a very strong influence on attitudes towards biometric payments, which is the strongest predictor of behavioral intention to use biometric payments.
APA, Harvard, Vancouver, ISO, and other styles
28

Taha, Mohammed A., and Hanaa M. Ahmed. "A fuzzy vault development based on iris images." EUREKA: Physics and Engineering, no. 5 (September 13, 2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.

Full text
Abstract:
Biometric systems gather information from the person's biometric attributes, used extensively to authorize the individuals. Due to the obvious convenience of using specific individual traits such as face, fingerprints, palm veins, and irises, biometric authentication is becoming more common. In particular, Iris systems are in high demand for high-assurance applications, because they contain a broad feature set and remain stable. Authentication methods based on iris biometrics are now commonly used in a variety of fields. This is due to the fact that iris biometric authentication is both safer and more comfortable than conventional passwords. Template Security is a major concern in biometric systems. The template security mechanism ensures reusable, permanent, and un-linkable models. The Fuzzy Vault strategy is one of the most popular security schemes for Template protection. Fuzzy vault has demonstrated to be an effective protection method but lacks revocability and security attacks. This article introduced an improved fuzzy vault system. The improved fuzzy vault system was introduced, which uses more than one key to protect biometric data. Different keys make the search space more detailed. The additional key was used to encrypt vault data, which stopped the intruder from accessing the information on the person's biometry. The system was tested using CASIA.v1 and IITD.v1 datasets, and findings showed that the system ensures the protection and authentication of the iris templates without compromising performance. The proposed modification gave a 0.0 % False Accepted Rate (FAR) for both the dataset and False Rejected Rate (FRR), 0.14 % for CASIA v1 and 0.12 % for ITTD v1 False Rejected rate
APA, Harvard, Vancouver, ISO, and other styles
29

Barzut, Srđan, Milan Milosavljević, Saša Adamović, Muzafer Saračević, Nemanja Maček, and Milan Gnjatović. "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks." Mathematics 9, no. 7 (March 28, 2021): 730. http://dx.doi.org/10.3390/math9070730.

Full text
Abstract:
Modern access controls employ biometrics as a means of authentication to a great extent. For example, biometrics is used as an authentication mechanism implemented on commercial devices such as smartphones and laptops. This paper presents a fingerprint biometric cryptosystem based on the fuzzy commitment scheme and convolutional neural networks. One of its main contributions is a novel approach to automatic discretization of fingerprint texture descriptors, entirely based on a convolutional neural network, and designed to generate fixed-length templates. By converting templates into the binary domain, we developed the biometric cryptosystem that can be used in key-release systems or as a template protection mechanism in fingerprint matching biometric systems. The problem of biometric data variability is marginalized by applying the secure block-level Bose–Chaudhuri–Hocquenghem error correction codes, resistant to statistical-based attacks. The evaluation shows significant performance gains when compared to other texture-based fingerprint matching and biometric cryptosystems.
APA, Harvard, Vancouver, ISO, and other styles
30

Sujana, S., and V. S. K. Reddy. "Comparison of levels and fusion approaches for multimodal biometrics." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (August 1, 2021): 791. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp791-801.

Full text
Abstract:
The biometric-based authentication system occupies maximal space in the field of security administration. Biometric applications are swiftly accelerating in day-to-day life such as computer login, smart homes, online banking, hospitals, border areas, industries, forensics, e-voting attendance system and investigation of crime. A reliable and accurate recognition body can be achieved with multimodal biometric methodologies. In this paper, we discuss starting with an introduction to biometric systems followed by their classification, and advantages as well as disadvantages. In today’s world, most of the systems are unimodal biometrics having a lot of limitations to overcome those multimodal biometrics comes in to picture. In this paper we have discussed comprehensive representation on the system of multimodal biometric, various modes of undertakings, the significance of information fusion, a different section is allotted on the various possible levels of fusion involving sensor-level, feature-level, score-level, and decision -level as well as different rules of fusion.
APA, Harvard, Vancouver, ISO, and other styles
31

Pathak, Mrunal. "Multimodal Biometric Authentication for Smartphones." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1559–68. http://dx.doi.org/10.22214/ijraset.2021.39569.

Full text
Abstract:
Abstract: Smartphones have become a crucial way of storing sensitive information; therefore, the user's privacy needs to be highly secured. This can be accomplished by employing the most reliable and accurate biometric identification system available currently which is, Eye recognition. However, the unimodal eye biometric system is not able to qualify the level of acceptability, speed, and reliability needed. There are other limitations such as constrained authentication in real time applications due to noise in sensed data, spoof attacks, data quality, lack of distinctiveness, restricted amount of freedom, lack of universality and other factors. Therefore, multimodal biometric systems have come into existence in order to increase security as well as to achieve better performance.[1] This paper provides an overview of different multimodal biometric (multibiometric) systems for smartphones being employed till now and also proposes a multimodal biometric system which can possibly overcome the limitations of the current biometric systems. Keywords: Biometrics, Unimodal, Multimodal, Fusion, Multibiometric Systems
APA, Harvard, Vancouver, ISO, and other styles
32

Chiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions." BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.

Full text
Abstract:
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.
APA, Harvard, Vancouver, ISO, and other styles
33

Yang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (September 14, 2021): 6163. http://dx.doi.org/10.3390/s21186163.

Full text
Abstract:
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
34

Mashagba, Eman Fares Al. "Human Identification Based on Geometric Feature Extraction Using a Number of Biometric Systems Available: Review." Computer and Information Science 9, no. 2 (May 2, 2016): 140. http://dx.doi.org/10.5539/cis.v9n2p140.

Full text
Abstract:
<span style="font-size: 10.5pt; font-family: 'Times New Roman','serif'; mso-ansi-language: EN-US; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-font-kerning: 1.0pt; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">Biometric technology has attracted much attention in biometric recognition. Significant online and offline applications satisfy security and human identification based on this technology. Biometric technology identifies a human based on unique features possessed by a person. Biometric features may be physiological or behavioral. A physiological feature is based on the direct measurement of a part of the human body such as a fingerprint, face, iris, blood vessel pattern at the back of the eye, vascular patterns, DNA, and hand or palm scan recognition. A behavioral feature is based on data derived from an action performed by the user. Thus, this feature measures the characteristics of the human body such as signature/handwriting, gait, voice, gesture, and keystroke dynamics. A biometric system is performed as follows: acquisition, comparison, feature extraction, and matching. The most important step is feature extraction, which determines the performance of human identification. Different methods are used for extraction, namely, appearance- and geometry-based methods. This paper reports on a review of human identification based on geometric feature extraction using several biometric systems available. We compared the different biometrics in biometric technology based on the geometric features extracted in different studies. Several biometric approaches have more geometric features, such as hand, gait, face, fingerprint, and signature features, compared with other biometric technology. Thus, geometry-based method with different biometrics can be applied simply and efficiently. The eye region extracted from the face is mainly used in face recognition. In addition, the extracted eye region has more details as the iris features.</span>
APA, Harvard, Vancouver, ISO, and other styles
35

UDROIU, Adriana-Meda, and Ștefan-Antonio DAN-ȘUTEU. "USABLE SECURITY IN BIOMETRIC AUTHENTICATION SYSTEMS." STRATEGIES XXI - Command and Staff College 17, no. 1 (July 22, 2021): 287–92. http://dx.doi.org/10.53477/2668-2028-21-37.

Full text
Abstract:
Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.
APA, Harvard, Vancouver, ISO, and other styles
36

SIMANJUNTAK, ROCKY. "EVALUATION OF ELECTRONIC LIMITED STAY NOTIFICATION SYSTEMS IN THE IMMIGRATION OFFICE CLASS I PEKANBARU." TEMATICS: Technology ManagemenT and Informatics Research Journals 2, no. 2 (April 27, 2020): 17–24. http://dx.doi.org/10.52617/tematics.v2i2.99.

Full text
Abstract:
Presidential Regulation Number 20 of 2018 concerning the Use of Foreign Workers as a trimmer of bureaucracy so that Foreign Workers who will come to Indonesia have the licensing process not as complicated as before. However, the reality in the field still finds some systemic problems that occur in the ITAS extension process, including: Electronic ITAS notification sending that does not go to the sponsor's email and has to be resent and the network when taking Biometrics (taking photos and fingerprints) is slow and the Biometric Matching System (BMS) to the center used by all applications requiring biometric checks is also slow. This certainly hinders immigration officers from issuing ITAS. System problems that occur include: Electronic ITAS notification sending that does not go to the sponsor's email and has to be resent and the network when taking Biometrics (taking photos and fingerprints) is slow and Biometric Matching System (BMS) to the center used by all applications requires slow biometric checks too. This certainly hinders immigration officers from issuing ITAS.
APA, Harvard, Vancouver, ISO, and other styles
37

Sable, Harsh, and Divya Bajpai Tripathy. "A Review on Comparative Analysis on Different Sort of Physiological and Behavioral Biometric Framework." International Journal of Advance Research and Innovation 9, no. 2 (2021): 1–9. http://dx.doi.org/10.51976/ijari.922101.

Full text
Abstract:
Biometrics as the investigation of seeing an individual ward on their physical or conduct characteristics, biometric have now been conveyed in diverse business, ordinary resident and national security applications. Customarily the usage of biometrics devices has improved our capacity to give approved entry to material foundations. Biometric is the usage of a person's novel physiological, lead, and morphological trademark to give valuable person distinguishing proof. Biometric structures that are starting at now available today break down fingerprints, engravings, iris and retina models, and face. Mechanisms that are similar to biometrics anyway are not named such are lead systems, for instance, voice, imprint and keystroke mechanisms. These days biometrics is in effect effectively executed in numerous fields like measurable, security, recognizable proof and approval frameworks.
APA, Harvard, Vancouver, ISO, and other styles
38

Rukhiran, Meennapa, Sorapak Pukdesree, and Paniti Netinant. "Biometric Cloud Services for Web-Based Examinations." International Journal of Information Technology and Web Engineering 17, no. 1 (January 2022): 1–25. http://dx.doi.org/10.4018/ijitwe.299022.

Full text
Abstract:
Biometric recognition may be used in conjunction with human authentication on a smartphone to improve accuracy, reliability, and simplicity, and to aid in fraud prevention and user authentication. While single biometric authentication addresses environmental degradation and sensor noise limitations, and the single point of failure scenario in biometric systems can result in more robust biometric systems, multimodal biometric authentication can improve the accuracy of identification and recognition. The purpose of this research is to propose a facial and speech authentication system that is cloud-based and supports a web-based examination approach. The system enables students' biometrics to be registered, students to be recognized, and student recognition results to be reported. The confusion matrix is used to compare the results of positive and negative detection in various ways, including accuracy score, precision value, and recall value. Adaptive multimodal biometric authentication should be designed and evaluated for further research using the optimal weights for each biometric.
APA, Harvard, Vancouver, ISO, and other styles
39

Yin, Jing Hai, Zheng Dong Mu, and Jian Feng Hu. "Design of Identification System Based on BCI." Applied Mechanics and Materials 496-500 (January 2014): 1975–78. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1975.

Full text
Abstract:
Nowadays EEG-based identification biometric research becomes a new topic. Due to the current biometric technology are still exist some problems, therefore, an urgent needed is to find a new biometric technology. In this paper, we use EEG signals as biometrics, which is home to a new biometric research trends, cutting-edge and exploratory nature, there is a good prospect. We establish a set of EEG-based identification systems and medium-sized EEG signatures, explore effective methods of analysis biometric technology to make up for past deficiencies, to further improve and develop the theory of biometric technologies and applications for EEG-based identification technology promotion foundation.
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Min, Xuefei Yin, Yanming Zhu, and Jiankun Hu. "Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey." Sensors 22, no. 14 (July 7, 2022): 5111. http://dx.doi.org/10.3390/s22145111.

Full text
Abstract:
Cognitive biometrics is an emerging branch of biometric technology. Recent research has demonstrated great potential for using cognitive biometrics in versatile applications, including biometric recognition and cognitive and emotional state recognition. There is a major need to summarize the latest developments in this field. Existing surveys have mainly focused on a small subset of cognitive biometric modalities, such as EEG and ECG. This article provides a comprehensive review of cognitive biometrics, covering all the major biosignal modalities and applications. A taxonomy is designed to structure the corresponding knowledge and guide the survey from signal acquisition and pre-processing to representation learning and pattern recognition. We provide a unified view of the methodological advances in these four aspects across various biosignals and applications, facilitating interdisciplinary research and knowledge transfer across fields. Furthermore, this article discusses open research directions in cognitive biometrics and proposes future prospects for developing reliable and secure cognitive biometric systems.
APA, Harvard, Vancouver, ISO, and other styles
41

Faridah, Y., Haidawati Nasir, A. K. Kushsairy, Sairul I. Safie, Sheroz Khan, and Teddy S. Gunawan. "Fingerprint Biometric Systems." Trends in Bioinformatics 9, no. 2 (September 15, 2016): 52–58. http://dx.doi.org/10.3923/tb.2016.52.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

de Luis-Garcı́a, Rodrigo, Carlos Alberola-López, Otman Aghzout, and Juan Ruiz-Alzola. "Biometric identification systems." Signal Processing 83, no. 12 (December 2003): 2539–57. http://dx.doi.org/10.1016/j.sigpro.2003.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

kumar, Amit, and Sunita Sangwan. "Biometric Security Systems." International Journal of Engineering Trends and Technology 11, no. 4 (May 25, 2014): 169–70. http://dx.doi.org/10.14445/22315381/ijett-v11p233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Pisani, Paulo Henrique, Abir Mhenni, Romain Giot, Estelle Cherrier, Norman Poh, André Carlos Ponce de Leon Ferreira de Carvalho, Christophe Rosenberger, and Najoua Essoukri Ben Amara. "Adaptive Biometric Systems." ACM Computing Surveys 52, no. 5 (October 19, 2019): 1–38. http://dx.doi.org/10.1145/3344255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Sandhya, Mulagala, and Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 04 (February 2, 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.

Full text
Abstract:
The increased use of biometric-based authentication systems in a variety of applications has made biometric template protection an important issue. Unlike conventional systems, biometric cannot be revoked or changed. This made template protection a critical issue to be considered in the recent years. This paper proposes a cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme. The method is built by combining cancelable biometrics and biometric cryptosystems. First, we compute transformed minutiae features using multiple spiral curves. Further, these transformed features are encrypted using fuzzy commitment scheme. Hence, a secure template is obtained. Experimental results and analysis prove the credibility of proposed method with recently presented methods of fingerprint template protection.
APA, Harvard, Vancouver, ISO, and other styles
46

Sabharwal, Munish. "Multi-Modal Biometric Authentication and Secure Transaction Operation Framework for E-Banking." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 102–16. http://dx.doi.org/10.4018/ijbdcn.2017010109.

Full text
Abstract:
The rationale of the research work is to suggest a multi-modal biometric authentication and secure transaction operation framework for E-Banking. The literature survey identifies the various types of E-Banking Channels available as on-date, the various types of biometric technologies available as on-date as well the significant metrics affecting their performance while deploying them in various different e-banking channels. The performance analysis of various types of biometric technologies based on significant metrics for Biometrics Implementation further identifies the currently implementable biometric technologies for the various different e-banking channels. Subsequently a requirement analysis of potential e-banking channels is followed by System Suitability Analysis to identify which multi-biometrics and support mechanisms are suitable for particular e-banking channels. The final conclusion suggests a viable multi-modal biometric authentication and secure transaction operation framework for various e-banking channels.
APA, Harvard, Vancouver, ISO, and other styles
47

Dong, Xingbo, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho, and Andrew Beng Jin Teoh. "Secure Chaff-less Fuzzy Vault for Face Identification Systems." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 3 (July 22, 2021): 1–22. http://dx.doi.org/10.1145/3442198.

Full text
Abstract:
Biometric cryptosystems such as fuzzy vaults represent one of the most popular approaches for secret and biometric template protection. However, they are solely designed for biometric verification, where the user is required to input both identity credentials and biometrics. Several practical questions related to the implementation of biometric cryptosystems remain open, especially in regard to biometric template protection. In this article, we propose a face cryptosystem for identification (FCI) in which only biometric input is needed. Our FCI is composed of a one-to-N search subsystem for template protection and a one-to-one match chaff-less fuzzy vault (CFV) subsystem for secret protection. The first subsystem stores N facial features, which are protected by index-of-maximum (IoM) hashing, enhanced by a fusion module for search accuracy. When a face image of the user is presented, the subsystem returns the top k matching scores and activates the corresponding vaults in the CFV subsystem. Then, one-to-one matching is applied to the k vaults based on the probe face, and the identifier or secret associated with the user is retrieved from the correct matched vault. We demonstrate that coupling between the IoM hashing and the CFV resolves several practical issues related to fuzzy vault schemes. The FCI system is evaluated on three large-scale public unconstrained face datasets (LFW, VGG2, and IJB-C) in terms of its accuracy, computation cost, template protection criteria, and security.
APA, Harvard, Vancouver, ISO, and other styles
48

Herbadji, Abderrahmane, Zahid Akhtar, Kamran Siddique, Noubeil Guermat, Lahcene Ziet, Mohamed Cheniti, and Khan Muhammad. "Combining Multiple Biometric Traits Using Asymmetric Aggregation Operators for Improved Person Recognition." Symmetry 12, no. 3 (March 10, 2020): 444. http://dx.doi.org/10.3390/sym12030444.

Full text
Abstract:
Biometrics is a scientific technology to recognize a person using their physical, behavior or chemical attributes. Biometrics is nowadays widely being used in several daily applications ranging from smart device user authentication to border crossing. A system that uses a single source of biometric information (e.g., single fingerprint) to recognize people is known as unimodal or unibiometrics system. Whereas, the system that consolidates data from multiple biometric sources of information (e.g., face and fingerprint) is called multimodal or multibiometrics system. Multibiometrics systems can alleviate the error rates and some inherent weaknesses of unibiometrics systems. Therefore, we present, in this study, a novel score level fusion-based scheme for multibiometric user recognition system. The proposed framework is hinged on Asymmetric Aggregation Operators (Asym-AOs). In particular, Asym-AOs are estimated via the generator functions of triangular norms (t-norms). The extensive set of experiments using seven publicly available benchmark databases, namely, National Institute of Standards and Technology (NIST)-Face, NIST-Multimodal, IIT Delhi Palmprint V1, IIT Delhi Ear, Hong Kong PolyU Contactless Hand Dorsal Images, Mobile Biometry (MOBIO) face, and Visible light mobile Ocular Biometric (VISOB) iPhone Day Light Ocular Mobile databases have been reported to show efficacy of the proposed scheme. The experimental results demonstrate that Asym-AOs based score fusion schemes not only are able to increase authentication rates compared to existing score level fusion methods (e.g., min, max, t-norms, symmetric-sum) but also is computationally fast.
APA, Harvard, Vancouver, ISO, and other styles
49

KOPCZEWSKI, Marian, and Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (October 2, 2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.

Full text
Abstract:
Possibilities for the use of biometric data are growing and hence their practical application is also increasing. Therefore, an important element to be considered in the design, construction and exploitation of systems using biometrics is the question of identifying a specific person and assigning him or her to the relevant data contained in the documents or databases. The ability and, in some cases, the need to use biometric data results from the growing use of information technology in everyday life and the ever increasing attempts to steal the identity of those using these technologies. Modern IT systems often have a high level of security in terms of protection and access to data, and in particular the management of security systems. The article presents an outline of the theory related to the possibility of using and applying biometric data to provide security and have the ability to inspect officers of various departments. The subject of analysis also considered the possibility of using security measures in the form of biometric data identification for the purpose of securing the security services.
APA, Harvard, Vancouver, ISO, and other styles
50

Heynen, Robert. "Biometric Aesthetics." Public 30, no. 60 (March 1, 2020): 108–25. http://dx.doi.org/10.1386/public_00009_7.

Full text
Abstract:
This article examines contemporary biometric science against the backdrop of its development in nineteenth century eugenic and biostatistical practices, most notably the composite photography of Francis Galton. Focusing on automated face recognition, the article argues that contemorary biometric science is inextricable from its aesthetic investments, which in turn shape the ways in which faces and bodies are differentiated in identification systems. Based on a close reading of biometric engineering texts and projects, this aesthetico-scientific approach offers new ways of conceptualizing how biometrics constitutes rather than merely reflects bodies, and encodes racist, misogynist, and other social logics into the conception and design of technologies themselves. These are not biases that can be corrected, as ostensibly progressive biometric projects like IBM’s Diversity in Faces initiative suggest, but rather are inextricable from the biometric desire to render faces and bodies as transparent and machine-readable.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography