To see the other types of publications on this topic, follow the link: Biometrisk Data.

Journal articles on the topic 'Biometrisk Data'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Biometrisk Data.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Varisha, Alam, and Arif Mohammad. "Classification of Large Biometric Data in Database System." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 10 (2021): 1–8. https://doi.org/10.35940/ijitee.D8592.08101021.

Full text
Abstract:
"Biometrics" is got from the Greek word 'life' and 'measure' which implies living and evaluation take apart. It simply converts into "life estimation". Biometrics uses computerized acknowledgment of people, dependent on their social and natural attributes. Biometric character are data separated from biometric tests, which can use for examination with a biometric orientation. Biometrics involves techniques to unusually recognize people dependent on at least one inherent physical or behavior attribute. In software engineering, specifically, biometric is used a
APA, Harvard, Vancouver, ISO, and other styles
2

Alam*, Varisha, and Dr Mohammad Arif. "Classification of Large Biometric Data in Database System." International Journal of Innovative Technology and Exploring Engineering 10, no. 10 (2021): 1–8. http://dx.doi.org/10.35940/ijitee.d8592.08101021.

Full text
Abstract:
"Biometrics" is got from the Greek word 'life' and 'measure' which implies living and evaluation take apart. It simply converts into "life estimation". Biometrics uses computerized acknowledgment of people, dependent on their social and natural attributes. Biometric character are data separated from biometric tests, which can use for examination with a biometric orientation. Biometrics involves techniques to unusually recognize people dependent on at least one inherent physical or behavior attribute. In software engineering, specifically, biometric is used as a form of character retrieve the C
APA, Harvard, Vancouver, ISO, and other styles
3

Mr., Manish Vala, Patel Kajal, and Lad Harsh. "Multi Model Biometrics Data Retrieval Through Big Data." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 1273–77. https://doi.org/10.31142/ijtsrd15933.

Full text
Abstract:
This study is devoted to Big Data problems in biometric technologies. Before the traditional database were not capable to handle the large amount of data, so we highlight the concept of using Big Data technology in solution of a wide range of issues faced by the national security, law enforcement system and defence authorities. The study provides information about Big Data in the field of biometric technology. Mr. Manish Vala | Kajal Patel | Harsh Lad "Multi Model Biometrics Data Retrieval Through: Big-Data" Published in International Journal of Trend in Scientific Research and Devel
APA, Harvard, Vancouver, ISO, and other styles
4

Mushtaque, Ahmed. "BIOMETRICS SYSTEM ACKNOWLEDGEMNT BASED ON DATA FUSION." International Journal of Research – Granthaalayah 4, no. 3 (2017): 85–91. https://doi.org/10.5281/zenodo.847003.

Full text
Abstract:
In these days lot of systems have need an efficient and reliable biometrics recognition system. By considering the importance of biometric systems in global world, in this paper we are discussing the importance of a new era of verification. Applications of Biometric systems in accordance to Data fusion and what is the future of biometric systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Mrs., M. Tamil Selvi*1 &. Mrs. A. Sumathi 2. "FUSION TECHNIQUES FOR BIMODAL AND MULTIMODAL BIOMETRIC SYSTEM AUTHENTICATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 9 (2017): 40–45. https://doi.org/10.5281/zenodo.884845.

Full text
Abstract:
Biometrics is the one of the security mechanism for computer network security. It is science and technology of measuring and analyzing biological data of human body, extracting details from the acquired data, and comparing the data to the stored in database. Existing system is unimodal biometric system. The proposed system is supported fusion techniques multimodal biometric system. However Multimodal biometrics requires storage of multiple biometric templates for each user, which results in increased risk to user privacy and system security. This paper will discuss the concept off biometrics,
APA, Harvard, Vancouver, ISO, and other styles
6

Wara, Mastoor, and Nahar Priyank. "Public Increasing Trust of Biometric Technology." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 1073–79. https://doi.org/10.35940/ijeat.C5724.049420.

Full text
Abstract:
Publically agree to technology of biometric is compound based at extreme believe. The bounded function at believe to biometrics usually record in various types of biometrics with correlative samples associated with familiarity and confidential. To develop a complete understand trust of people recognition about biometrics, we employed current theory to develop a regular calculation of trust in biometrics from user’s theory. We increased confidence of first concern in terms of mutual interaction, technology, information systems and adoption of automated technology. Identified common belief
APA, Harvard, Vancouver, ISO, and other styles
7

Bisogni, Carmen, Lucia Cascone, and Fabio Narducci. "Periocular Data Fusion for Age and Gender Classification." Journal of Imaging 8, no. 11 (2022): 307. http://dx.doi.org/10.3390/jimaging8110307.

Full text
Abstract:
In recent years, the study of soft biometrics has gained increasing interest in the security and business sectors. These characteristics provide limited biometric information about the individual; hence, it is possible to increase performance by combining numerous data sources to overcome the accuracy limitations of a single trait. In this research, we provide a study on the fusion of periocular features taken from pupils, fixations, and blinks to achieve a demographic classification, i.e., by age and gender. A data fusion approach is implemented for this purpose. To build a trust evaluation o
APA, Harvard, Vancouver, ISO, and other styles
8

Chinyemba, Melissa K., and Jackson Phiri. "Gaps in the Management and Use of Biometric Data: A Case of Zambian Public and Private Institutions." Zambia ICT Journal 2, no. 1 (2018): 35–43. http://dx.doi.org/10.33260/zictjournal.v2i1.49.

Full text
Abstract:
The current physical and cybersecurity systems rely on traditional three-factor authentication to mitigate the threats posed by insider attacks. Key is the use of biometric information. Biometrics are a unique measurement and analysis of the unique physiological special traits such as voice, eye structure and others that can be used in the discipline of varying person identification. Biometry, which is the analysis of these biometrics is a complex process but guarantees identification and non-repudiation. If used to identify humans then several issues such as where is the biometric data stored
APA, Harvard, Vancouver, ISO, and other styles
9

Hidayat, Taopik, Nurul Khasanah, Daniati Uki Eka Saputri, Umi Khultsum, and Risca Lusiana Pratiwi. "Klasifikasi Gambar Palmprint Berbasis Multi-Kelas Menggunakan Convolutional Neural Network." Jurnal Sistem Informasi 11, no. 1 (2022): 01–06. http://dx.doi.org/10.51998/jsi.v11i1.474.

Full text
Abstract:
Abstract—Biometric technology is developing to be the most relevant mechanism in identity identification. The main purpose of an identity management system is to be able to establish a relationship between individuals and their identities when needed under certain conditions. Among the newly proposed identity verification and personal identification technologies, biometrics is rapidly becoming the most relevant mechanism for identity recognition. This study proposes a new biometric recognition method for authentication and personal identification. Palm image recognition based on image processi
APA, Harvard, Vancouver, ISO, and other styles
10

Rassolov, I. M., S. G. Chubukova, and I. V. Mikurova. "Biometrics in the Context of Personal Data and Genetic Information: Legal Issues." Lex Russica, no. 1 (January 1, 2019): 108–18. http://dx.doi.org/10.17803/1729-5920.2019.146.1.108-118.

Full text
Abstract:
In modern society, methods of identification of persons on the basis of their physical, biological or behavioral characteristics are actively developing. European countries are in the process of developing a holistic doctrine on biometric control and are clarifying their position on situations where biometric data are used by individuals.From the position of information law, the paper presents a new author’s approach to the problem of processing biometric data and genetic information. The division of biometrics into “trace” and “non-trace” is losing its meaning. A new classification of biometr
APA, Harvard, Vancouver, ISO, and other styles
11

Yang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang, and Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors 23, no. 7 (2023): 3566. http://dx.doi.org/10.3390/s23073566.

Full text
Abstract:
The advancement of biometric technology has facilitated wide applications of biometrics in law enforcement, border control, healthcare and financial identification and verification. Given the peculiarity of biometric features (e.g., unchangeability, permanence and uniqueness), the security of biometric data is a key area of research. Security and privacy are vital to enacting integrity, reliability and availability in biometric-related applications. Homomorphic encryption (HE) is concerned with data manipulation in the cryptographic domain, thus addressing the security and privacy issues faced
APA, Harvard, Vancouver, ISO, and other styles
12

Seliverstova, N. S. "Directions of emerging structural changes in the use of biometric data in Russia." Russian Journal of Economics and Law 18, no. 4 (2024): 912–25. https://doi.org/10.21202/2782-2923.2024.4.912-925.

Full text
Abstract:
Objective: to identify the emerging structural changes in the use of biometrics in Russia, namely the multiple growth of market participants and brands, the multiple growth of the number of biometrics samples in a single biometric system, and the multiple growth of market volume and institutional design of biometrics use in Russia. Methods: general scientific, abstract-logical, dialectical, phenomenological methods, observation, description. Results: the article describes approaches to the use of biometric data in some regions of the world, identifies the risks and potential benefits of wider
APA, Harvard, Vancouver, ISO, and other styles
13

Rajvanshi, Saumya, Shiv Chauhan, and Savneet Kaur. "A New Wave in Biometric System: Systematic Study." CGC International Journal of Contemporary Technology and Research 4, no. 2 (2022): 300–305. http://dx.doi.org/10.46860/cgcijctr.2022.07.31.300.

Full text
Abstract:
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometrics like face recognition, fingerprint recognition, iris recognition and behavioral biometrics like signature recognition and voice rec
APA, Harvard, Vancouver, ISO, and other styles
14

Bok, Jin Yeong, Kun Ha Suh, and Eui Chul Lee. "Detecting Fake Finger-Vein Data Using Remote Photoplethysmography." Electronics 8, no. 9 (2019): 1016. http://dx.doi.org/10.3390/electronics8091016.

Full text
Abstract:
Today, biometrics is being widely used in various fields. Finger-vein is a type of biometric information and is based on finger-vein patterns unique to each individual. Various spoofing attacks have recently become a threat to biometric systems. A spoofing attack is defined as an unauthorized user attempting to deceive a system by presenting fake samples of registered biometric information. Generally, finger-vein recognition, using blood vessel characteristics inside the skin, is known to be more difficult when producing counterfeit samples than other biometrics, but several spoofing attacks h
APA, Harvard, Vancouver, ISO, and other styles
15

STOICA, Iulia-Teodora. "The Future Risk of Biometric Data Theft in Cybersecurity." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 49–58. http://dx.doi.org/10.19107/ijisc.2024.01.04.

Full text
Abstract:
The aim of this paper is to analyze the technical and engineering issues surrounding the future risk of biometric data theft in cyber security. Biometric data, such as fingerprints, facial recognition, and voice recognition, are increasingly being used as a means of authentication in various industries. However, the collection, storage, and transmission of biometric data present unique security challenges, as this data is highly personal and cannot be changed if compromised. In this paper, we will examine the vulnerabilities in biometric authentication technologies, the risks associated with t
APA, Harvard, Vancouver, ISO, and other styles
16

Jacobsen, Katja Lindskov. "Biometric data flows and unintended consequences of counterterrorism." International Review of the Red Cross 103, no. 916-917 (2021): 619–52. http://dx.doi.org/10.1017/s1816383121000928.

Full text
Abstract:
AbstractExamining unintended consequences of the makings and processing of biometric data in counterterrorism and humanitarian contexts, this article introduces a two-fold framework through which it analyzes biometric data-makings and flows in Afghanistan and Somalia. It combines Tilley's notion of “living laboratory” and Larkin's notion of infrastructure into a framework that attends to the conditions under which biometric data is made and to subsequent flows of such data through data-sharing agreements or unplanned access. Exploring such unintended consequences, attention needs to be paid to
APA, Harvard, Vancouver, ISO, and other styles
17

Asokawati, Ainunnisa Rezky. "PERLINDUNGAN DATA BIOMETRIK DALAM SEKTOR PERBANKAN DI INDONESIA DAN AMERIKA SERIKAT." Legal Standing : Jurnal Ilmu Hukum 8, no. 3a (2024): 895–907. https://doi.org/10.24269/ls.v8i3a.10775.

Full text
Abstract:
This study aims to analyze and compare the regulation and implementation of biometric data protection in the banking sector in Indonesia and the United States. In addition, this study also evaluates the security risks of biometric data and provides policy recommendations to improve its protection. This study uses a doctrinal method using primary and secondary legal sources. The focus of this study is to examine how the Indonesian State protects biometrics as personal data in a legal context and to compare the regulations and implementation related to biometrics in the banking sector in Indones
APA, Harvard, Vancouver, ISO, and other styles
18

Елена Юрьевна, Фролова, and Кошлыкова Юлия Александровна. "HUMAN IDENTIFICATION BASED ON BIOMETRIC DATA: A REVIEW OF MODERN TECHNOLOGIES." NORTH CAUCASUS LEGAL VESTNIK 1, no. 3 (2022): 167–74. http://dx.doi.org/10.22394/2074-7306-2022-1-3-167-174.

Full text
Abstract:
Biometric identification systems have now become quite widespread, since they use not specialized physical media for recognition, but signs or features of the person himself, which makes it possible to reliably identify a person for a given purpose. Biometric identification is the process of comparing and determining the similarity between a person's data and his biometric "template". Biometrics allows you to identify and verify a person based on a set of specific and unique traits inherent in him from birth. This article discusses certain types of biometric data to be identified, problems and
APA, Harvard, Vancouver, ISO, and other styles
19

Lee, Boo-Ha, and Shin-Uk Park. "Legislative Policy Consideration for Reinforcement of Biometrics Protection." LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, no. 1 (2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.

Full text
Abstract:
Article 23 (1) of the Personal Information Protection Act stipulates that “A personal information controller shall not process any information prescribed by Presidential Decree (hereinafter referred to as ‘sensitive data’), including ideology, belief, admission to or withdrawal from a trade union or political party, political opinions, health, sex life, and other personal information that is likely to markedly threaten the privacy of any data subject.” Article 18 of the Enforcement Decree of the Personal Information Protection Act stipulates that ‘Information prescribed by Presidential Decree’
APA, Harvard, Vancouver, ISO, and other styles
20

Gupta, Ms Neha. "A New Wave in Biometric System: Systematic Study incorporated with Artificial Intelligence." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33563.

Full text
Abstract:
Biometric system is a technique used to identify a person using its personal identification methods. The main concept of biometric systems is to provide confidentiality and security to the user. A number of biometric systems are introduced but some systems are widely used and are famous because of their usage and security they provide. Physiological and Behavioral biometrics are the two types of biometric systems. Biometric systems include physiological biometric like face recognition, finger print recognition, ir is recognition and behavioral biometrics like signature recognition and voice re
APA, Harvard, Vancouver, ISO, and other styles
21

Burganova, Tanzilya, Dilyara Fakhreeva, and Nail Fakhreev. "Method of two-factor authentication of electronic documents using enhanced encrypted non-certified digital signature with the use of security token with biometric data." Telfor Journal 15, no. 2 (2023): 50–55. http://dx.doi.org/10.5937/telfor2302050b.

Full text
Abstract:
The purpose of this study is to develop a method for two-factor authentication of electronic documents using an enhanced encrypted non-certified digital signature with the use of a security token with biometric data (fingerprint image). In order to achieve the goal, the method of comparative analysis was used. Existing algorithms for the electronic signature operation were studied. The method of multi-factor authentication of an electronic signature using biometric data has been studied in detail. Biometric data included: a handwritten password, an autograph, typing biometrics when typing a pa
APA, Harvard, Vancouver, ISO, and other styles
22

TALININGSIH, FAUZI FRAHMA, YUNENDAH NUR FU’ADAH, SYAMSUL RIZAL, ACHMAD RIZAL, and MUHAMMAD ADNAN PRAMUDITO. "Sistem Otentikasi Biometrik Berbasis Sinyal EKG Menggunakan Convolutional Neural Network 1 Dimensi." MIND Journal 7, no. 1 (2022): 1–10. http://dx.doi.org/10.26760/mindjournal.v7i1.1-10.

Full text
Abstract:
ABSTRAKBiometrik merupakan salah satu analisis karakteristik individu yang saat ini banyak digunakan, seperti sidik jari, pengenalan suara, dan pengenalan wajah. Metode biometrik tersebut masih memiliki kelemahan seperti mudah untuk dimanipulasi. Oleh karena itu, penelitian ini akan menggunakan sinyal Elektrokardiogram (EKG) sebagai salah satu metode biometrik. Sinyal EKG memiliki keunikan pada setiap individu sehingga sulit untuk dimanipulasi. Penelitian ini mengembangkan sistem otentikasi biometrik berbasis sinyal EKG. Data yang digunakan berasal dari ECG-ID database dengan jumlah 90 subjek.
APA, Harvard, Vancouver, ISO, and other styles
23

Ivanov, Alexander, and Alexeiy Sulavko. "Draft of the Third National Standard of Russia for Fast Automatic Learning of Large Correlation Neural Networks on Small Training Samples of Biometric Data." Voprosy kiberbezopasnosti, no. 3(43) (2021): 84–93. http://dx.doi.org/10.21681/2311-3456-2021-3-84-93.

Full text
Abstract:
The aim of the study is to show that a biometrics-to-access code converter based on large networks of correlation neurons makes it possible to obtain an even longer key at the output while ensuring the protection of biometric data from compromise. The research method is the use of large «wide» neural networks with automatic learning for the implementation of the biometric authentication procedure, ensuring the protection of biometric personal data from compromise. Results of the study - the first national standard GOST R 52633.5 for the automatic training of neuron networks was focused only on
APA, Harvard, Vancouver, ISO, and other styles
24

Ladhiya, Karan. "Privacy Preserving Bio-Metric Authentication." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 114–24. http://dx.doi.org/10.22214/ijraset.2022.40570.

Full text
Abstract:
Abstract: Biometric authentication is now extensively used in several systems and applications to authenticate users using their biometrics. The biometrics of the users are compared to the biometric templates already stored on the server, and if there is a match, only the user is permitted to enter the system. However, because each user's biometrics are unique, it is more important than the user's actual biometric data is never leaked. Moreover, the utilization of the user's actual biometric data for comparisons during the authentication process can't be done because the revelation of the user
APA, Harvard, Vancouver, ISO, and other styles
25

Ghadeer, Ibrahim Maki, and Basim Abed Sarah. "Multimodal Biometric System Fusion Using Fingerprint and Iris with Convolutional Neural Network." Engineering and Technology Journal 9, no. 09 (2024): 5140–47. https://doi.org/10.5281/zenodo.13768197.

Full text
Abstract:
Biometric sensing technology became everyday life frequent component as a result of world requirement for info security and safety legislation. A strong and efficient individual authentication has appeared because of new developments in multimodal biometrics. Multimodal biometrics integrates different biological traits in trying for creating considerable effect on identification performance. Latent fingerprint biometrics refer to effective human identification system for criminals given the accessible crime evidence shreds. Although, biometric trait restrictions like intra-class variation, sen
APA, Harvard, Vancouver, ISO, and other styles
26

S. Raju, A., and V. Udayashankara. "A Survey on Unimodal, Multimodal Biometrics and Its Fusion Techniques." International Journal of Engineering & Technology 7, no. 4.36 (2018): 689. http://dx.doi.org/10.14419/ijet.v7i4.36.24224.

Full text
Abstract:
Presently, a variety of biometric modalities are applied to perform human identification or user verification. Unimodal biometric systems (UBS) is a technique which guarantees authentication information by processing distinctive characteristic sequences and these are fetched out from individuals. However, the performance of unimodal biometric systems restricted in terms of susceptibility to spoof attacks, non-universality, large intra-user variations, and noise in sensed data. The Multimodal biometric systems defeat various limitations of unimodal biometric systems as the sources of different
APA, Harvard, Vancouver, ISO, and other styles
27

Huang, Quan. "Multimodal Biometrics Fusion Algorithm Using Deep Reinforcement Learning." Mathematical Problems in Engineering 2022 (March 24, 2022): 1–9. http://dx.doi.org/10.1155/2022/8544591.

Full text
Abstract:
Multimodal biometrics fusion plays an important role in the field of biometrics. Therefore, this paper presents a multimodal biometrics fusion algorithm using deep reinforcement learning. In order to reduce the influence of user behavior, user’s personal characteristics, and environmental light on image data quality, data preprocessing is realized through data transformation and single-mode biometric image region segmentation. A two-dimensional Gobar filter was used to analyze the texture of local sub-blocks, qualitatively describe the similarity between the filter and the sub-blocks and extra
APA, Harvard, Vancouver, ISO, and other styles
28

Yanhua Hu, Et al. "Construction And Performance Evaluation of Big Data Prediction Model Based on Fuzzy Clustering Algorithm in Cloud Computing Environment." Journal of Electrical Systems 19, no. 4 (2024): 01–13. http://dx.doi.org/10.52783/jes.620.

Full text
Abstract:
In the evolving landscape of biomedical biometrics, where multimodal approaches are increasingly crucial for reliable user authentication, this research presents a comprehensive study. The primary focus is on the construction and performance evaluation of a robust big data prediction model within a cloud computing environment. The advent of big data and cloud computing has revolutionized the field of biomedical biometrics, offering immense potential for advanced data analysis and prediction. This research presents the development and evaluation of a robust prediction model for multimodal biome
APA, Harvard, Vancouver, ISO, and other styles
29

Ali, Nadir, M. Asghar Khattak, Samina Kanwal, Noreen Farid, Shehrbano Batool, and Mufassar Nishat. "Comparison of Forensic Value of Biometric Analysis in Face & Ear Recognition in the Punjabi Population, Pakistan." Pakistan Journal of Medical and Health Sciences 16, no. 12 (2022): 614–16. http://dx.doi.org/10.53350/pjmhs20221612614.

Full text
Abstract:
Background: The use of face biometrics is very prevalent in forensic investigations for the identification of the perpetrators of crime due to the excessive use of CCTV footage that is usually available at the scene of a crime in urban settings. Ear biometric analysis of ear prints is also in vogue as a result of research advancements in the fields of biometrics. Keeping in view this scenario, it is the need of the hour to analyze the forensic value of this type of forensic evidence and compare these two tools of forensic biometrics. Purpose: To analyze and compare the forensic value of biomet
APA, Harvard, Vancouver, ISO, and other styles
30

Colombo, Cristiano, and Guilherme Damasio Goulart. "New body perimeter and biometrics as personal data." Brazilian Journal of Law, Technology and Innovation 1, no. 1 (2023): 1–22. http://dx.doi.org/10.59224/bjlti.v1i1.1-22.

Full text
Abstract:
This article deals with the new body perimeter and biometrics as personal data, seeking, from a principled point of view, to present recommendations for the application of facial recognition in the São Paulo Metro. Balancing the impacts of biometric techniques and the principles of purpose and necessity of the Brazilian General Data Protection Law, the following question arises: can facial biometrics be applied on the premises of the São Paulo Metro? And, if the answer is positive, what would be its limits, based on the aforementioned principles? With regard to methodology, the research was th
APA, Harvard, Vancouver, ISO, and other styles
31

Tsibong, Selvia Lem. "Biometric Identification System: A Step Towards Better Crime Control in Cameroon." Scholars International Journal of Law, Crime and Justice 8, no. 06 (2025): 116–28. https://doi.org/10.36348/sijlcj.2025.v08i06.001.

Full text
Abstract:
This study examines biometric identification system as a step towards better crime control in Cameroon, with particular interest to fingerprint biometrics, DNA identification, facial recognition as well as their respective data bases. Cameroon’s biometric identification system is a government initiative aimed at enhancing identity management, security, and access to services through the use of biometric technologies. Fingerprint biometrics, DNA identification and facial recognition technologies are used in Cameroon for crime control. Their respective databases are, however, not well developed
APA, Harvard, Vancouver, ISO, and other styles
32

Vala, Mr Manish, Kajal Patel, and Harsh Lad. "Multi Model Biometrics Data Retrieval Through: Big-Data." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 1273–77. http://dx.doi.org/10.31142/ijtsrd15933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mitianov, Z. O. "Compulsory and Voluntary Biometrics: Content and Distinction in Russian Law." Theoretical and Applied Law, no. 3 (October 8, 2024): 63–74. http://dx.doi.org/10.22394/3034-2813-2024-3-63-74.

Full text
Abstract:
The article examines the peculiarities of separation and differentiation of two areas included in the sphere of biometric personal data processing in Russia: compulsory and voluntary biometrics. The definitions of the concepts of these areas are formulated, the peculiarities of their content are considered. Justification of their differentiation, main criteria and specifics of such differentiation are given. The problems of voluntary biometrics in the context of exceptional cases of compulsory processing of biometric personal data are highlighted. The balance of private and public interests in
APA, Harvard, Vancouver, ISO, and other styles
34

Lakhera, Manmohan, and Manmohan Singh Rauthan. "Securing Stored Biometric Template Using Cryptographic Algorithm." International Journal of Rough Sets and Data Analysis 5, no. 4 (2018): 48–60. http://dx.doi.org/10.4018/ijrsda.2018100103.

Full text
Abstract:
The biometric template protection technique provides the security in many authentication applications. Authentication based on biometrics has more advantages over traditional methods such as password and token-based authentication methods. The advantage of any biometric-based authentication system over a traditional one is that the person must physically be present at that place while recognizing him. So, it is essential to secure these biometrics by combining these with cryptography. In the proposed algorithm, the AES algorithm is used for securing the stored and transmitted biometric templat
APA, Harvard, Vancouver, ISO, and other styles
35

Sridevi, T., P. Mallikarjuna Rao, and P. V. Ramaraju. "Wireless sensor data mining for e-commerce applications." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 1 (2018): 462. http://dx.doi.org/10.11591/ijeecs.v14.i1.pp462-470.

Full text
Abstract:
Information hiding is the most important criteria today in several sectors, due to security issues. Mostly for the security applications used in Finance & banking sectors, hiding the information about users and their transactions are necessary at present from the hackers in all high security zones. In this consequence biometrics is progressively considered as foundation component for an extensive array of personal authentication solutions, both at the national level (E.g. India UIDAI) and the smaller-scale (E.g. banking ATMs, school lunch payment systems). Biometric fraud is also an ar
APA, Harvard, Vancouver, ISO, and other styles
36

Jovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.

Full text
Abstract:
Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digi
APA, Harvard, Vancouver, ISO, and other styles
37

Mróz-Gorgoń, Barbara, Wojciech Wodo, Anna Andrych, Katarzyna Caban-Piaskowska, and Cyprian Kozyra. "Biometrics Innovation and Payment Sector Perception." Sustainability 14, no. 15 (2022): 9424. http://dx.doi.org/10.3390/su14159424.

Full text
Abstract:
This paper presents an analysis of innovations in the biometrics market, which have started to play a very important role in personal identification and identification systems. The aim of the study was to analyze current customs and opinions regarding payment methods, as well as to identify threats and opportunities for new biometric solutions in this area. First, the history of the biometrics market is presented. Acceptance patterns of new technologies are explored and modified. The authors used literature reviews, qualitative research (focus groups), and quantitative research (questionnaire
APA, Harvard, Vancouver, ISO, and other styles
38

Pereira, Teresa M. C., Raquel C. Conceição, Vitor Sencadas, and Raquel Sebastião. "Biometric Recognition: A Systematic Review on Electrocardiogram Data Acquisition Methods." Sensors 23, no. 3 (2023): 1507. http://dx.doi.org/10.3390/s23031507.

Full text
Abstract:
In the last decades, researchers have shown the potential of using Electrocardiogram (ECG) as a biometric trait due to its uniqueness and hidden nature. However, despite the great number of approaches found in the literature, no agreement exists on the most appropriate methodology. This paper presents a systematic review of data acquisition methods, aiming to understand the impact of some variables from the data acquisition protocol of an ECG signal in the biometric identification process. We searched for papers on the subject using Scopus, defining several keywords and restrictions, and found
APA, Harvard, Vancouver, ISO, and other styles
39

Nita, Stefania, Marius Mihailescu, and Valentin Pau. "Security and Cryptographic Challenges for Authentication Based on Biometrics Data." Cryptography 2, no. 4 (2018): 39. http://dx.doi.org/10.3390/cryptography2040039.

Full text
Abstract:
Authentication systems based on biometrics characteristics and data represents one of the most important trend in the evolution of the society, e.g., Smart City, Internet-of-Things (IoT), Cloud Computing, Big Data. In the near future, biometrics systems will be everywhere in the society, such as government, education, smart cities, banks etc. Due to its uniqueness, characteristic, biometrics systems will become more and more vulnerable, privacy being one of the most important challenges. The classic cryptographic primitives are not sufficient to assure a strong level of secureness for privacy.
APA, Harvard, Vancouver, ISO, and other styles
40

., Mulyawati Utami, Gede Saindra Santyadiputra, S. T. ,. M. Cs ., and I. Gede Partha Sindu, S. Pd ,. M. Pd . "KORELASI PENERAPAN MESIN ABSENSI BIOMETRIK FACE RECOGNITION TERHADAP KEMUDAHAN MANAJEMEN DATA KEHADIRAN SERTA KEDISIPLINAN CIVITAS SMK N 2 SINGARAJA." Kumpulan Artikel Mahasiswa Pendidikan Teknik Informatika (KARMAPATI) 6, no. 1 (2017): 234. http://dx.doi.org/10.23887/karmapati.v6i1.9701.

Full text
Abstract:
Tujuan dari penelitian ini adalah untuk mengetahui hubungan antara diterapkanya mesin absensi biometrik face recognition terhadap kemudahan manajemen data kehadiran serta kedisiplinan civitas SMK N 2 Singaraja. Ada tiga variabel yang dikaji pada penelitian ini yakni Penerapan Mesin ABsensi Face Recognition sebagai variabel X, Kemudahan Manajemen Data Kehadiran sebagai variabel Y1 dan Kedisiplinan Civitas SMK N 2 Singaraja sebagai variabel Y2 dengan melibatkan 285 responden yang terdiri dari 253 siswa dan 32 orang guru dan pegawai. Variabel penerapan mesin absensi meliputi pendapat tentang dite
APA, Harvard, Vancouver, ISO, and other styles
41

Singh, Bhanu, and Nirvisha Singh. "MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics." Information 11, no. 6 (2020): 308. http://dx.doi.org/10.3390/info11060308.

Full text
Abstract:
With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. Organizations encourage their members to use biometrics, but they are hesitant to use them due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. We propose a server-specific add-on biometric security layer model (MoLaBSS) to enhance confidence in the us
APA, Harvard, Vancouver, ISO, and other styles
42

KHUWAJA, GULZAR A., and A. N. ABU-REZQ. "DATA ACQUISITION AND RECOGNITION OF FINGERPRINTS WITH LVQ." International Journal of Computational Intelligence and Applications 03, no. 01 (2003): 65–88. http://dx.doi.org/10.1142/s1469026803000811.

Full text
Abstract:
A typical biometric system has three distinct phases. These are biometric data acquisition, feature extraction, and decision-making. The first step, the acquisition phase, is extremely important. If high quality images are not obtained, the next phase cannot operate reliably. Fingerprint recognition remains as one of the most prominent biometric identification methods. In this paper, we develop a prototype optical-based fingerprints data acquisition system using a CCD digital still camera to capture a complete impression of finger area required for accurately identifying an individual and pres
APA, Harvard, Vancouver, ISO, and other styles
43

Sharma, Puneet. "Biometrics and Credit Cards: Fingerprints, Faces, and Voices as Your Digital Bodyguards." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem14234.

Full text
Abstract:
In an era of rampant digitalization, the integration of biometrics with credit card technology has emerged as a revolutionary approach to secure transactions. From fingerprints to facial recognition and voice authentication, these digital bodyguards offer a robust, personalized layer of protection against unauthorized access and fraud. Biometrics not only enhances security but also simplifies user experiences, making transactions swift and frictionless. This paper delves into the multifaceted role of biometrics in credit card security, exploring key technologies, their implementation challenge
APA, Harvard, Vancouver, ISO, and other styles
44

Medjahed, Chahreddine, Abdellatif Rahmoun, Christophe Charrier, and Freha Mezzoudj. "A deep learning-based multimodal biometric system using score fusion." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 1 (2022): 65. http://dx.doi.org/10.11591/ijai.v11.i1.pp65-80.

Full text
Abstract:
Recent trends in artificial intelligence tools-based biometrics have overwhelming attention to security matters. The hybrid approaches are motivated by the fact that they combine mutual strengths and they overcome their limitations. Such approaches are being applied to the fields of biomedical engineering. A biometric system uses behavioural or physiological characteristics to identify an individual. The fusion of two or more of these biometric unique characteristics contributes to improving the security and overcomes the drawbacks of unimodal biometric-based security systems. This work propos
APA, Harvard, Vancouver, ISO, and other styles
45

Chahreddine, Medjahed, Rahmoun Abdellatif, Charrier Christophe, and Mezzoudj Freha. "A deep learning-based multimodal biometric system using score fusion." International Journal of Artificial Intelligence (IJ-AI) 11, no. 1 (2022): 65–80. https://doi.org/10.11591/ijai.v11.i1.pp65-80.

Full text
Abstract:
Recent trends in artificial intelligence tools-based biometrics have overwhelming attention to security matters. The hybrid approaches are motivated by the fact that they combine mutual strengths and they overcome their limitations. Such approaches are being applied to the fields of biomedical engineering. A biometric system uses behavioural or physiological characteristics to identify an individual. The fusion of two or more of these biometric unique characteristics contributes to improving the security and overcomes the drawbacks of unimodal biometric-based security systems. This work propos
APA, Harvard, Vancouver, ISO, and other styles
46

KOPCZEWSKI, Marian, and Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.

Full text
Abstract:
Possibilities for the use of biometric data are growing and hence their practical application is also increasing. Therefore, an important element to be considered in the design, construction and exploitation of systems using biometrics is the question of identifying a specific person and assigning him or her to the relevant data contained in the documents or databases. The ability and, in some cases, the need to use biometric data results from the growing use of information technology in everyday life and the ever increasing attempts to steal the identity of those using these technologies. Mod
APA, Harvard, Vancouver, ISO, and other styles
47

Arunarani, S., and R. Gobinath. "A survey on multimodal biometrics for human authentication." International Journal of Engineering & Technology 7, no. 3.3 (2018): 273. http://dx.doi.org/10.14419/ijet.v7i2.33.14167.

Full text
Abstract:
Authentication process identifies an individual to get an endorsed access by entering their login credentials. The inconvenience with this method is the user must remember the keywords, and the passwords can be predicted or if it is hard to guess it will be cracked through brute force. Due to this fault, this method is lack of integrity. Biometrics sample recognize a person based on his behavioral or physiological char-acteristics. Unimodal biometric systems have to resist with a different types of problems such as inconsistent data, intra-class variations, deceit attacks and high error rates.
APA, Harvard, Vancouver, ISO, and other styles
48

Fianyi, Israel, and Tanveer Zia. "Biometric Technology Solutions to Countering Today's Terrorism." International Journal of Cyber Warfare and Terrorism 6, no. 4 (2016): 28–40. http://dx.doi.org/10.4018/ijcwt.2016100103.

Full text
Abstract:
The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification purpose has become important. Consequently, the many ripostes that were renewed on identity management included enhanced use of biometrics to verify and authenticate travellers at various airports as well as the use of video surveillance equipped with facial recognition sensors. The growth in data an
APA, Harvard, Vancouver, ISO, and other styles
49

Argren, Rigmor. "Protection of biometric private life under the European Convention on Human Rights and the law of armed conflict." Military Law and the Law of War Review 62, no. 1 (2024): 61–88. http://dx.doi.org/10.4337/mllwr.2024.01.04.

Full text
Abstract:
By definition, biometrics consists of sensitive data about the individual. Therefore, the State must ensure a higher degree of safeguarding measures in all phases of handling such data. This article argues that data-subjects whose biometrics are gathered for identification are protected through the right to biometric private life under international human rights law at all times. Furthermore, the law of armed conflict also contains relevant provisions. The European Convention on Human Rights provides detailed rules for the protection of biometric private life, subject to limitations and possib
APA, Harvard, Vancouver, ISO, and other styles
50

Channegowda, Arjun Benagatte, and H. N. Prakash. "Multimodal biometrics of fingerprint and signature recognition using multi-level feature fusion and deep learning techniques." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 187. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp187-195.

Full text
Abstract:
Providing security in biometrics is the major challenging task in the current situation. A lot of research work is going on in this area. Security can be more tightened by using complex security systems, like by using more than one biometric trait for recognition. In this paper multimodal biometric models are developed to improve the recognition rate of a person. The combination of physiological and behavioral biometrics characteristics is used in this work. Fingerprint and signature biometrics characteristics are used to develop a multimodal recognition system. Histograms of oriented gradient
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!