To see the other types of publications on this topic, follow the link: Biometric verification.

Dissertations / Theses on the topic 'Biometric verification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Biometric verification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sigurnjak, S. K. "Biometric verification using gait." Thesis, Manchester Metropolitan University, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.592681.

Full text
Abstract:
The work presented within this document details the development of a novel gait verification system suitable for a variety of applications such as human motion studies, medical analysis and security situations. The human gait is a spatio temporal process involving the coordination and interaction between the nervous, skeletal and muscular systems. Due to inherent variations in the limb lengths, muscle strengths and body mass gait is inherently individual. To develop a suitable feature extraction process a virtual gait laboratory was developed. The virtual laboratory contains virtual character
APA, Harvard, Vancouver, ISO, and other styles
2

Hmani, Mohamed Amine. "Use of Biometrics for the Regeneration of Revocable Crypto-biometric Keys." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS013.

Full text
Abstract:
Ce travail de thèse vise à régénérer des clés crypto-biométriques (clés cryptographiques obtenues avec des données biométriques) résistantes aux méthodes de cryptanalyse quantique. Le défi est d'obtenir des clés avec une haute entropie pour avoir un haut niveau de sécurité, sachant que l'entropie contenue dans les références biométriques limite l'entropie de la clé. Notre choix a été d'exploiter la biométrie faciale.Nous avons d'abord créé un système de reconnaissance faciale de pointe basé en utilisant des bases de données publiques. Notre architecture utilise des réseaux de neurones profonds
APA, Harvard, Vancouver, ISO, and other styles
3

Salaiwarakul, Anongporn. "Verification of secure biometric authentication protocols." Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/1166/.

Full text
Abstract:
The thesis presents verification of biometric authentication protocols. ProVerif is used as the verification tool for verifying and analysing the protocols. The protocol are analysed in ProVerif model. Various attacks to the protocols are generated in order to verify whether the protocols hold their intended properties. We have selected three biometric authentication protocols and proposed a remote biometric authentication protocol for on-line banking. Each of which has different intended purposes and properties. The first protocol is generic authentication using biometric data. This protocol
APA, Harvard, Vancouver, ISO, and other styles
4

Opperman, Charl Anton. "Peer-to-peer biometric verification using nfc-enabled smartphones." Diss., University of Pretoria, 2014. http://hdl.handle.net/2263/79300.

Full text
Abstract:
The current approach for person identification consists of handing over a paper ID document which consists only of a picture of the person’s face, usually at a much younger age. Human intuition provides the means to make a comparison between the person in the picture and the person handing over the document. With the rise in personal electronic devices such as smartphones and tablets, alternative solutions such as mobile biometrics have become feasible especially since these security mechanisms are also being studied as solutions to securing the mobile devices themselves from unauthorised logi
APA, Harvard, Vancouver, ISO, and other styles
5

Sanderson, Conrad, and conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information." Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.

Full text
Abstract:
Identity verification systems are an important part of our every day life. A typical example is the Automatic Teller Machine (ATM) which employs a simple identity verification scheme: the user is asked to enter their secret password after inserting their ATM card; if the password matches the one prescribed to the card, the user is allowed access to their bank account. This scheme suffers from a major drawback: only the validity of the combination of a certain possession (the ATM card) and certain knowledge (the password) is verified. The ATM card can be lost or stolen, and the password can be
APA, Harvard, Vancouver, ISO, and other styles
6

Chan, Siu Man. "Improved speaker verification with discrimination power weighting /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHANS.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.<br>Includes bibliographical references (leaves 86-93). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
7

Fransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Full text
Abstract:
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began
APA, Harvard, Vancouver, ISO, and other styles
8

ALI, ARSLAN. "Deep learning techniques for biometric authentication and robust classification." Doctoral thesis, Politecnico di Torino, 2021. http://hdl.handle.net/11583/2910084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sanderson, Conrad. "Automatic Person Verification Using Speech and Face Information." Thesis, Griffith University, 2003. http://hdl.handle.net/10072/367191.

Full text
Abstract:
Identity verification systems are an important part of our every day life. A typical example is the Automatic Teller Machine (ATM) which employs a simple identity verification scheme: the user is asked to enter their secret password after inserting their ATM card; if the password matches the one prescribed to the card, the user is allowed access to their bank account. This scheme suffers from a major drawback: only the validity of the combination of a certain possession (the ATM card) and certain knowledge (the password) is verified. The ATM card can be lost or stolen, and the password can be
APA, Harvard, Vancouver, ISO, and other styles
10

Kabbara, Yeihya. "Caractérisation des images à Rayon-X de la main par des modèles mathématiques : application à la biométrie." Thesis, Paris Est, 2015. http://www.theses.fr/2015PEST1015/document.

Full text
Abstract:
Dans son contexte spécifique, le terme « biométrie » est souvent associé à l'étude des caractéristiques physiques et comportementales des individus afin de parvenir à leur identification ou à leur vérification. Ainsi, le travail développé dans cette thèse nous a conduit à proposer un algorithme d'identification robuste, en considérant les caractéristiques intrinsèques des phalanges de la main. Considérée comme une biométrie cachée, cette nouvelle approche peut s'avérer intéressante, notamment lorsqu'il est question d'assurer un niveau de sécurité élevé, robuste aux différentes attaques qu'un s
APA, Harvard, Vancouver, ISO, and other styles
11

Dimitrov, Emanuil. "Fingerprints recognition." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.

Full text
Abstract:
<p>Nowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sampl
APA, Harvard, Vancouver, ISO, and other styles
12

Betschart, Willie. "Applying intelligent statistical methods on biometric systems." Thesis, Blekinge Tekniska Högskola, Avdelningen för signalbehandling, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1694.

Full text
Abstract:
This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The layer is influenced by the general procedure of biometrics in a multimodal behavioural way. It is workin
APA, Harvard, Vancouver, ISO, and other styles
13

Rautenbach, James. "Towards a framework for identity verification of vulnerable children within the Eastern Cape." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/597.

Full text
Abstract:
This dissertation proposes the development of an identification verification model that can be implemented within the context of the Eastern Cape, South Africa in order to ensure that vulnerable children are provided with the requisite care that they deserve from the state. The dissertation provides both a developed and developing world perspective on the identification verification needs of vulnerable children by providing an overview of relevant South African policy with regard to caring for vulnerable children and presenting an international perspective with specific reference to current le
APA, Harvard, Vancouver, ISO, and other styles
14

Mtibaa, Aymen. "Towards robust and privacy-preserving speaker verification systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS002.

Full text
Abstract:
Les systèmes de vérification du locuteur sont une technologie clé dans de nombreux appareils et services tels que les smartphones, les assistants numériques intelligents et les applications bancaires. Pendant la pandémie de COVID-19, les systèmes de contrôle d'accès basés sur des lecteurs d'empreintes digitales ou des claviers augmentent le risque de propagation du virus. Par conséquent, les entreprises repensent maintenant leurs systèmes de contrôle d'accès des employés et envisagent des technologies d'autorisation sans contact, telles que les systèmes de vérification des locuteurs. Cependant
APA, Harvard, Vancouver, ISO, and other styles
15

Bekli, Zeid, and William Ouda. "A performance measurement of a Speaker Verification system based on a variance in data collection for Gaussian Mixture Model and Universal Background Model." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20122.

Full text
Abstract:
Voice recognition has become a more focused and researched field in the last century,and new techniques to identify speech has been introduced. A part of voice recognition isspeaker verification which is divided into Front-end and Back-end. The first componentis the front-end or feature extraction where techniques such as Mel-Frequency CepstrumCoefficients (MFCC) is used to extract the speaker specific features of a speech signal,MFCC is mostly used because it is based on the known variations of the humans ear’scritical frequency bandwidth. The second component is the back-end and handles thes
APA, Harvard, Vancouver, ISO, and other styles
16

Yager, Neil Gordon Computer Science &amp Engineering Faculty of Engineering UNSW. "Hierarchical fingerprint verification." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/27008.

Full text
Abstract:
Fingerprints have been an invaluable tool for law enforcement and forensics for over a century, motivating research into automated fingerprint based identification in the early 1960's. More recently, fingerprints have found an application in the emerging industry of biometric systems. Biometrics is the automatic identification of an individual based on physiological or behavioral characteristics. Due to its security related applications and the current world political climate, biometrics is presently the subject of intense research by private and academic institutions. Fingerprints are emerg
APA, Harvard, Vancouver, ISO, and other styles
17

Ramos, Sanchez M. Ulises. "Aspects of facial biometrics for verification of personal identity." Thesis, University of Surrey, 2000. http://epubs.surrey.ac.uk/792194/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ng, Su Gnee. "Optimisation tools for enhancing signature verification." Thesis, University of Kent, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.327436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Giełczyk, Agata. "Rozpoznawanie osób na podstawie analizy obrazów dłoni za pomocą urządzeń mobilnych." Rozprawa doktorska, Uniwersytet Technologiczno-Przyrodniczy w Bydgoszczy, 2020. http://dlibra.utp.edu.pl/Content/2354.

Full text
Abstract:
Celem tej dysertacji jest zaproponowanie nowych metod biometrycznego rozpoznawania osób na podstawie obrazu dłoni oraz ich przebadanie na urządzeniach mobilnych<br>The main objective of this work is to propose and evaluate new methods of palmprint-based user verification in the mobile scenario
APA, Harvard, Vancouver, ISO, and other styles
20

Salavati, Sadaf. "Biometrics in practice : The security technology of tomorrow's airports." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-874.

Full text
Abstract:
<p>The biometric technology is a method for authentication which has been used since several centuries back. This is a technology which offers several different techniques where the human’s unique characteristics are used for identification and verification of the individual. Biometrics are today at a stage of development that is pointing upwards and many individuals that are well aware of the biometric world believes that this is the technology that will take over the security systems used today.</p><p>Ever since the terror attacks against USA at 2001, USA demanded that all 45 countries that
APA, Harvard, Vancouver, ISO, and other styles
21

Henderson, Neil James. "Polymer thick film sensors for embedded smartcard biometrics and identity verification." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hagemann, Andreas, and Hanna Björk. "A System for Driver Identity Verification." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-4278.

Full text
Abstract:
<p>Different security issues are a top subject around the world, especially since the terror threats seem to intensify. In the same time, the transport industry suffer from problems with smuggling and theft of valuable goods. One way to increase the security might be to have a verification system installed in commercial trucks, in order to assure that the driver is the proper one.</p><p>This thesis has two purposes. One is to find appropriate methods for driver verification and build a prototype of a verification system which can be used for testing and further development. The other is to stu
APA, Harvard, Vancouver, ISO, and other styles
23

Kotulek, Milan. "Jednoduchý textově nezávislý hlasový zámek - Softwarový systém pro verifikaci mluvčích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221256.

Full text
Abstract:
A brief introduction into biometrics is described in this thesis leading to description and to design a solution of verification system using speech analysis. The designed system provides firstly basic signal processing, then vowel recognition in fluent Czech speech. For each found vowel, observed speech features are calculated. The created GUI application was tested on created speaker database and its efficiency is approximately 54 % for short testing utterances, and approx. 88 % for long testing utterances respectively.
APA, Harvard, Vancouver, ISO, and other styles
24

Björk, Hanna, and Andreas Hagemann. "To start this vehicle, please verify yourself : Security and privacy, where shall we draw the line?" Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-4810.

Full text
Abstract:
<p>Different security issues are a top subject around the world, especially since the terror threats seem to intensify. In the same time, the transport industry suffer from problems with smuggling and theft of valuable goods. One way to increase the security might be to have a verification system installed in commercial trucks, in order to assure that the driver is the proper one.</p><p>This thesis has two purposes. One is to find appropriate methods for driver verification and build a prototype of a verification system which can be used for testing and further development. The other is to st
APA, Harvard, Vancouver, ISO, and other styles
25

Mroczkowski, Piotr. "Identity Verification using Keyboard Statistics." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2265.

Full text
Abstract:
<p>In the age of a networking revolution, when the Internet has changed not only the way we see computing, but also the whole society, we constantly face new challenges in the area of user verification. It is often the case that the login-id password pair does not provide a sufficient level of security. Other, more sophisticated techniques are used: one-time passwords, smart cards or biometric identity verification. The biometric approach is considered to be one of the most secure ways of authentication. </p><p>On the other hand, many biometric methods require additional hardware in order to s
APA, Harvard, Vancouver, ISO, and other styles
26

Mekyska, Jiří. "Identifikace osob pomocí otisku hlasu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218235.

Full text
Abstract:
This work deals with the text-dependent speaker recognition in systems, where just a few training samples exist. For the purpose of this recognition, the voice imprint based on different features (e.g. MFCC, PLP, ACW etc.) is proposed. At the beginning, there is described the way, how the speech signal is produced. Some speech characteristics important for speaker recognition are also mentioned. The next part of work deals with the speech signal analysis. There is mentioned the preprocessing and also the feature extraction methods. The following part describes the process of speaker recognitio
APA, Harvard, Vancouver, ISO, and other styles
27

Melo, Marcelo Damasceno de. "User verification using behavioural cancelable templates." PROGRAMA DE P?S-GRADUA??O EM SISTEMAS E COMPUTA??O, 2016. https://repositorio.ufrn.br/jspui/handle/123456789/21418.

Full text
Abstract:
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2016-10-11T20:48:08Z No. of bitstreams: 1 MarceloDamascenoDeMelo_TESE.pdf: 2910788 bytes, checksum: 7a6cf94738a8f5339537bc4eca9e187f (MD5)<br>Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-10-14T00:30:34Z (GMT) No. of bitstreams: 1 MarceloDamascenoDeMelo_TESE.pdf: 2910788 bytes, checksum: 7a6cf94738a8f5339537bc4eca9e187f (MD5)<br>Made available in DSpace on 2016-10-14T00:30:34Z (GMT). No. of bitstreams: 1 MarceloDamascenoDeMelo_TESE.pdf: 2910788 bytes, checksum: 7a6cf94738a8f5339537
APA, Harvard, Vancouver, ISO, and other styles
28

Pešán, Jan. "Rozpoznávání mluvčího na mobilním telefonu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237056.

Full text
Abstract:
Tato práce se zaměřuje na implementaci počítačového systému rozpoznávání řečníka do prostředí mobilního telefonu. Je zde popsán princip, funkce, a implementace rozpoznávače na mobilním telefonu Nokia N900.
APA, Harvard, Vancouver, ISO, and other styles
29

Jagadeesan, Harini. "Design and Verification of Privacy and User Re-authentication Systems." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/32394.

Full text
Abstract:
In the internet age, privacy and security have become major concerns since an increasing number of transactions are made over an unsecured network. Thus there is a greater chance for private data to be misused. Further, insider attacks can result in loss of valuable data. Hence there arises a strong need for continual, non-intrusive, quick user re-authentication. Previously, a number of studies have been conducted on authentication using behavioral attributes. Currently, few successful re-authentication mechanisms are available since they use either the mouse or the keyboard for re-authenticat
APA, Harvard, Vancouver, ISO, and other styles
30

Hentati, Raïda. "Implémentation d'algorithmes de reconnaissance biométrique par l'iris sur des architectures dédiées." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917955.

Full text
Abstract:
Dans cette thèse, nous avons adapté trois versions d'une chaine d'algorithmes de reconnaissance biométrique par l'iris appelés OSIRIS V2, V3, V4 qui correspondent à différentes implémentations de l'approche de J. Daugman pour les besoins d'une implémentation logicielle / matérielle. Les résultats expérimentaux sur la base de données ICE2005 montrent que OSIRIS_V4 est le système le plus fiable alors qu'OSIRIS_V2 est le plus rapide. Nous avons proposé une mesure de qualité de l'image segmentée pour optimiser en terme de compromis coût / performance un système de référence basé sur OSIRIS V2 et V
APA, Harvard, Vancouver, ISO, and other styles
31

Waloszek, Vojtěch. "Identifikace a verifikace osob pomocí záznamu EKG." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442492.

Full text
Abstract:
In the past years, utilization of ECG for verification and identification in biometry is investigated. The topic is investigated in this thesis. Recordings from ECG ID database from PhysioNet and our own ECG recordings recorded using Apple Watch 4 are used for training and testing this method. Many of the existing methods have proven the possibility of using ECG for biometry, however they were using clinical ECG devices. This thesis investigates using recordings from wearable devices, specifically smart watch. 16 features are extracted from ECG recordings and a random forest classifier is used
APA, Harvard, Vancouver, ISO, and other styles
32

Silva, Arnaldo Gualberto de Andrade e. "Classificação e Verificação Multibiométrica por Geometria da Mão e Impressão Palmar com Otimização por Algoritmos Genéticos." Universidade Federal da Paraíba, 2015. http://tede.biblioteca.ufpb.br:8080/handle/tede/7857.

Full text
Abstract:
Submitted by Viviane Lima da Cunha (viviane@biblioteca.ufpb.br) on 2016-02-16T16:06:07Z No. of bitstreams: 1 arquivototal.pdf: 3758225 bytes, checksum: 9b36904ee6da8a9b5182f3af462d91cd (MD5)<br>Made available in DSpace on 2016-02-16T16:06:07Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 3758225 bytes, checksum: 9b36904ee6da8a9b5182f3af462d91cd (MD5) Previous issue date: 2015-10-23<br>Biometrics provides a trusted authentication mechanism by using traits (physical or behavioral) which identify users based on their natural characteristics. Biometric services of classification and verifica
APA, Harvard, Vancouver, ISO, and other styles
33

McCool, Christopher Steven. "Hybrid 2D and 3D face verification." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16436/1/Christopher_McCool_Thesis.pdf.

Full text
Abstract:
Face verification is a challenging pattern recognition problem. The face is a biometric that, we as humans, know can be recognised. However, the face is highly deformable and its appearance alters significantly when the pose, illumination or expression changes. These changes in appearance are most notable for texture images, or two-dimensional (2D) data. But the underlying structure of the face, or three dimensional (3D) data, is not changed by pose or illumination variations. Over the past five years methods have been investigated to combine 2D and 3D face data to improve the acc
APA, Harvard, Vancouver, ISO, and other styles
34

McCool, Christopher Steven. "Hybrid 2D and 3D face verification." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16436/.

Full text
Abstract:
Face verification is a challenging pattern recognition problem. The face is a biometric that, we as humans, know can be recognised. However, the face is highly deformable and its appearance alters significantly when the pose, illumination or expression changes. These changes in appearance are most notable for texture images, or two-dimensional (2D) data. But the underlying structure of the face, or three dimensional (3D) data, is not changed by pose or illumination variations. Over the past five years methods have been investigated to combine 2D and 3D face data to improve the accuracy an
APA, Harvard, Vancouver, ISO, and other styles
35

Melin, Håkan. "Automatic speaker verification on site and by telephone: methods, applications and assessment." Doctoral thesis, KTH, Tal, musik och hörsel, TMH, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4242.

Full text
Abstract:
Speaker verification is the biometric task of authenticating a claimed identity by means of analyzing a spoken sample of the claimant's voice. The present thesis deals with various topics related to automatic speaker verification (ASV) in the context of its commercial applications, characterized by co-operative users, user-friendly interfaces, and requirements for small amounts of enrollment and test data. A text-dependent system based on hidden Markov models (HMM) was developed and used to conduct experiments, including a comparison between visual and aural strategies for prompting claimants
APA, Harvard, Vancouver, ISO, and other styles
36

Panton, Mark Stuart. "Off-line signature verification using ensembles of local Radon transform-based HMMs." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/6903.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2011.<br>ENGLISH ABSTRACT: An off-line signature verification system attempts to authenticate the identity of an individual by examining his/her handwritten signature, after it has been successfully extracted from, for example, a cheque, a debit or credit card transaction slip, or any other legal document. The questioned signature is typically compared to a model trained from known positive samples, after which the system attempts to label said signature as genuine or fraudulent. Classifier fusion is the process of combining individual classifiers,
APA, Harvard, Vancouver, ISO, and other styles
37

Coutinho, Canuto Jânio. "Biomechanical online signature modeling applied to verification." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0026/document.

Full text
Abstract:
Cette thèse porte sur la modélisation et vérification des signatures en ligne. La première partie a pour thème principal la modélisation biomécanique des mouvements de la main. Un modèle basé sur le critère de Minimum de Secousse (MS) a été choisi parmi plusieurs théories du contrôle moteur. Ensuite, le problème de la segmentation des trajectoires en traits qui correspondent au modèle cinématique choisi a été étudié, ce qui a conduit à la mise au point d'une méthode de segmentation itérative. Le choix du modèle et de la méthode de segmentation sont basé sur le compromis entre la qualité de rec
APA, Harvard, Vancouver, ISO, and other styles
38

Chihaoui, Takwa. "Système d'identification de personnes basé sur la rétine." Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1145/document.

Full text
Abstract:
Notre travail s’inscrit dans le cadre de la biométrie par la rétine. La rétine est la couche sensorielle de l’œil, elle présente une texture riche et unique même chez les jumeaux. Ses propriétés ont fait de la biométrie par la rétine un axe de recherche actif. En effet, de nombreuses méthodes ont été proposées pour les différentes étapes de la méthode biométrique allant du prétraitement de l’image rétinienne à son analyse, en passant par sa caractérisation, afin d’identifier et authentifier un individu. Nous nous intéressons dans ces travaux de thèse, à l’étude, la conception, le développement
APA, Harvard, Vancouver, ISO, and other styles
39

Nascimento, Márcia Valdenice Pereira do. "Um método de reconhecimento de indivíduos por geometria da mão." Universidade Federal da Paraíba, 2015. http://tede.biblioteca.ufpb.br:8080/handle/tede/7848.

Full text
Abstract:
Submitted by Viviane Lima da Cunha (viviane@biblioteca.ufpb.br) on 2016-02-16T10:40:56Z No. of bitstreams: 1 arquivototal.pdf: 3979902 bytes, checksum: 82031a2c4d1a58a4f86c60ec63d8630a (MD5)<br>Made available in DSpace on 2016-02-16T10:40:56Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 3979902 bytes, checksum: 82031a2c4d1a58a4f86c60ec63d8630a (MD5) Previous issue date: 2015-02-27<br>Over the past few years, recognition by biometric information has been increasingly adopted in several applications, including commerce, government and forensics. One reason for this choice is based on the
APA, Harvard, Vancouver, ISO, and other styles
40

Kazík, Martin. "Zpracování otisků prstů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218978.

Full text
Abstract:
This diploma thesis deals with the identification of persons by their fingerprints. In the beginning, there is a brief overview of biometric methods. The issue of fingerprints and their automatic processing is very extensive and addresses a large amount of literature. This work describes the various stages processing fingerprints from receiving a fingerprint scan through the methods of enhancing fingerprint, binarization, the detection of minutiae to compare two fingerprints. After a short introduction of biometric techniques is briefly introduced the history of fingerprints as an instrument f
APA, Harvard, Vancouver, ISO, and other styles
41

Bartoň, Jaroslav. "Podpora pro autentizaci pomocí otisků prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-235492.

Full text
Abstract:
The goal of the thesis is the finger-print authentication support within the Linux operating system and the K Desktop Environment (KDE). Theoretical part of the thesis firstly explains main IT security terms and ways to proof the identity. Secondly it describes biometric systems and types of processed biometric characteristics. Lastly the features of finger-prints, their markants as well as types of scanners used in scanning the finger-prints and ways to analyze the scanned material have been elaborated. Practical solution part of the thesis develops and establishes finger-print management app
APA, Harvard, Vancouver, ISO, and other styles
42

Kovář, Martin. "Snímač otisku prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221330.

Full text
Abstract:
This master’s thesis deals with the issue of scanning human fingerprints, which is currently very topical and represents the most widespread biometric technology. The theoretical part of the work acquaints the reader with basics of dactyloscopy and biometrics and concerns technologies used for fingerprinting, image preprocessing methods and commercially available contactless optical scanners. The practical part is a realisation of a contactless optical scanner based on a Raspberry Pi minicomputer, implementation of preprocessing algorithms in Python and testing of the device from the perspecti
APA, Harvard, Vancouver, ISO, and other styles
43

Sandström, Marie. "Liveness Detection in Fingerprint Recognition Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2397.

Full text
Abstract:
<p>Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today. </p><p>Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live
APA, Harvard, Vancouver, ISO, and other styles
44

Lisák, Peter. "Rozpoznávání člověka podle žil prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236991.

Full text
Abstract:
The master's thesis deals with biometric systems, especially these based on human recognition by finger veins. It describes some development principles of the new biometric system. It proposes some new approaches to the comparison of finger vein patterns and their fast identification in sizable databases. Verification is based on templates comparison by similarity and distance measures with proposed alignment approaches. The proposed method of identification is based on the combination of clustering and genetic algorithm. The second option is using the indexing tree structure and searching by
APA, Harvard, Vancouver, ISO, and other styles
45

Cavalcante, Neto Luiz Miranda. "Recuperação de trajetória de ponta de caneta em assinaturas offline com referencial online." Universidade Federal de Sergipe, 2017. https://ri.ufs.br/handle/riufs/5041.

Full text
Abstract:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES<br>The handwritten signature is a form of personal identification widely accepted, both socially and legally, used for centuries to authenticate documents such as bank checks, letters, contracts and any type of service that requires proof of authorship. When signing, an individual inserts a large amount of information to transform the movement of his hand into an identifying element. Writing speed, trajectory traversed, pen inclination, applied pressure, all these data are articulated (in the form of latent variables) to
APA, Harvard, Vancouver, ISO, and other styles
46

Anantharajah, Kaneswaran. "Robust face clustering for real-world data." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/89400/1/Kaneswaran_Anantharajah_Thesis.pdf.

Full text
Abstract:
This thesis has investigated how to cluster a large number of faces within a multi-media corpus in the presence of large session variation. Quality metrics are used to select the best faces to represent a sequence of faces; and session variation modelling improves clustering performance in the presence of wide variations across videos. Findings from this thesis contribute to improving the performance of both face verification systems and the fully automated clustering of faces from a large video corpus.
APA, Harvard, Vancouver, ISO, and other styles
47

Larcher, Anthony. "Modèles acoustiques à structure temporelle renforcée pour la vérification du locuteur embarquée." Phd thesis, Université d'Avignon, 2009. http://tel.archives-ouvertes.fr/tel-00453645.

Full text
Abstract:
La vérification automatique du locuteur est une tâche de classification qui vise à confirmer ou infirmer l'identité d'un individu d'après une étude des caractéristiques spécifiques de sa voix. L'intégration de systèmes de vérification du locuteur sur des appareils embarqués impose de respecter deux types de contraintes, liées à cet environnement : - les contraintes matérielles, qui limitent fortement les ressources disponibles en termes de mémoire de stockage et de puissance de calcul disponibles ; - les contraintes ergonomiques, qui limitent la durée et le nombre des sessions d'entraînement a
APA, Harvard, Vancouver, ISO, and other styles
48

Houmani, Nesma. "Analyse de la qualité des signatures manuscrites en-ligne par la mesure d'entropie." Phd thesis, Institut National des Télécommunications, 2011. http://tel.archives-ouvertes.fr/tel-00765378.

Full text
Abstract:
Cette thèse s'inscrit dans le contexte de la vérification d'identité par la signature manuscrite en-ligne. Notre travail concerne plus particulièrement la recherche de nouvelles mesures qui permettent de quantifier la qualité des signatures en-ligne et d'établir des critères automatiques de fiabilité des systèmes de vérification. Nous avons proposé trois mesures de qualité faisant intervenir le concept d'entropie. Nous avons proposé une mesure de qualité au niveau de chaque personne, appelée "Entropie personnelle", calculée sur un ensemble de signatures authentiques d'une personne. L'originali
APA, Harvard, Vancouver, ISO, and other styles
49

Patino, Villar José María. "Efficient speaker diarization and low-latency speaker spotting." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS003.

Full text
Abstract:
La segmentation et le regroupement en locuteurs (SRL) impliquent la détection des locuteurs dans un flux audio et les intervalles pendant lesquels chaque locuteur est actif, c'est-à-dire la détermination de ‘qui parle quand’. La première partie des travaux présentés dans cette thèse exploite une approche de modélisation du locuteur utilisant des clés binaires (BKs) comme solution à la SRL. La modélisation BK est efficace et fonctionne sans données d'entraînement externes, car elle utilise uniquement des données de test. Les contributions présentées incluent l'extraction des BKs basée sur l'ana
APA, Harvard, Vancouver, ISO, and other styles
50

Patino, Villar José María. "Efficient speaker diarization and low-latency speaker spotting." Thesis, Sorbonne université, 2019. http://www.theses.fr/2019SORUS003/document.

Full text
Abstract:
La segmentation et le regroupement en locuteurs (SRL) impliquent la détection des locuteurs dans un flux audio et les intervalles pendant lesquels chaque locuteur est actif, c'est-à-dire la détermination de ‘qui parle quand’. La première partie des travaux présentés dans cette thèse exploite une approche de modélisation du locuteur utilisant des clés binaires (BKs) comme solution à la SRL. La modélisation BK est efficace et fonctionne sans données d'entraînement externes, car elle utilise uniquement des données de test. Les contributions présentées incluent l'extraction des BKs basée sur l'ana
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!