To see the other types of publications on this topic, follow the link: Biometry. Computer security. Computers Computer software.

Journal articles on the topic 'Biometry. Computer security. Computers Computer software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Biometry. Computer security. Computers Computer software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chinwe C, Ibebuogu, Philip Seth, and Anyaduba Obiageli J. "Biometric Authentication System Using Face Geometry." International Journal of Engineering and Computer Science 8, no. 08 (2019): 24805–13. http://dx.doi.org/10.18535/ijecs/v8i08.4332.

Full text
Abstract:
This seminar paper deals with biometric authentication, using human facial geometry as the login verification parameter. Biometric is the measurement and statistical analysis of human's unique physical and behavioral characteristics by mapping face geometry, fingerprints, iris, and voice. The aim of this seminar paper is to develop a functional Biometric Authentication System Using Face Geometry as the authentication method. Facial Geometry Authentication is a category of biometric technology that maps an individual's facial features mathematically and stores the data as face-prints in a database. Meanwhile the objective of this paper is to improve data access security, enhance identification accuracy, and contribute to the improvement of the existing facial recognition systems, focusing mainly on increasing its accuracy performance. On the other hand, hacking into users’ privacy, loss of confidential information, and high running costs, among others geared the motivation to develop a biometric authentication system using face geometry. Furthermore, the software engineering methodology adopted in this seminar paper is the Structural System Analysis and Design Methodology (SSADM). The software is developed in Visual C-sharp, and the database in SQL Server 2012; using Microsoft Visual Studio 2012 as the integrated development environment. Besides, OpenCV 2.4.8 library is used for image processing, image mapping, and computer vision. The expected result of this seminar paper include: improved user data security, and increased efficiency in facial detection/recognition.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhifang Wang, Shuangshuang Wang, and Qun Ding. "Security of Multimodal Biometric Fusion System." International Journal of Digital Content Technology and its Applications 5, no. 4 (2011): 264–70. http://dx.doi.org/10.4156/jdcta.vol5.issue4.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Хайдаров, Александр Александрович, Сергей Александрович Бодячевский, and Николай Николаевич Толстых. "RISK ASSESSMENT OF SUCCESSFUL IMPLEMENTATION OF SPOOFING ATTACKS ON VOICE AUTHENTICATION ELEMENTS IN DISTRIBUTED COMPUTER SYSTEMS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 9, 2021): 115–26. http://dx.doi.org/10.36622/vstu.2021.24.1.011.

Full text
Abstract:
Цель исследования заключается в рекомендациях по улучшению мер защиты голосовых систем аутентификации от реализации спуфинг-атак. В работе рассмотрены разнообразные виды спуфинг-атак и выделены самые опасные на данный момент. Разработана методика оценки защищенности голосовых систем аутентификации, учитывающая воздействие различных видов спуфиг-атак на системы голосовой аутентификации. Проведены количественные эксперименты, показывающие преимущество разработанной методики, в сравнении с существующими аналогами. Описан комплекс программных средств оценки защищенности систем голосовой аутентификации, который позволяет автоматизировать процесс оценки при проведении технологических испытаний. Полученные результаты могут быть использованы не только для оценки защищенности систем голосовой аутентификации, но и для проведения функционального и нагрузочного тестирования. Применение предложенного комплекса и методики оценки в дальнейшем может помочь в разработке технических решений по увеличению защищенности голосовых биометрических систем от реализации спуфинг-атак. The purpose of the study is to provide recommendations for improving the protection of voice authentication systems against spoofing attacks. The paper considers various types of spoofing attacks and identifies the most dangerous ones at the moment. A method for assessing the security of voice authentication systems has been developed, taking into account the impact of various types of spoofing attacks on voice authentication systems. Quantitative experiments were carried out, showing the advantage of the developed method in comparison with existing analogues. A set of software tools for assessing the security of voice authentication systems is described, which allows you to automate the evaluation process during technological tests. The results obtained can be used not only to assess the security of voice authentication systems, but also to conduct functional and load testing. The use of the proposed complex and evaluation methodology in the future can help in the development of technical solutions to increase the security of voice biometric systems from spoofing attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Milinković, Milorad, Miroslav Minović, and Miloš Milovanović. "Applying Technical Standards to Biometric Systems." International Journal of Decision Support System Technology 8, no. 2 (2016): 50–59. http://dx.doi.org/10.4018/ijdsst.2016040104.

Full text
Abstract:
Nowadays, the development and the application of biometric systems on one hand, and the large number of hardware and software manufacturers on the other, caused two the most common problems of biometric systems: a problem of interoperability between system's components as well as between different biometric systems and a problem of biometric data security and privacy protection, both in storage and exchange. Specifications and standards, such as BioAPI and CBEFF, registered and published as multiple standards by ISO (International Organization for Standardization), propose the establishment of single platform (BioAPI) to facilitate the functioning of the biometric systems regardless of hardware or software manufacturers, and unique format for data exchange (CBEFF) to secure biometric data. In this paper, these standards are analyzed in detail and considered as possible solutions to aforementioned problems.
APA, Harvard, Vancouver, ISO, and other styles
5

Singleton, Tommie. "Biometric Security Systems: The Best Infosec Solution?" EDPACS 30, no. 9 (2003): 1–24. http://dx.doi.org/10.1201/1079/43292.30.9.20030301/41230.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smiatacz, Maciej, and Bogdan Wiszniewski. "Just look at to open it up:." Multimedia Tools and Applications 80, no. 13 (2021): 20089–124. http://dx.doi.org/10.1007/s11042-021-10533-8.

Full text
Abstract:
AbstractElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface to encrypted documents with a biometric facial identity verification providing highly personalized security mechanism based on pseudo-identities. In consequence the encrypted document can be unlocked with the legitimate user’s face, while for everyone else stays encrypted with a hard to crack text password. This paper makes two contributions: (1) The proposed scheme enables password autofill without referring to any external service, which significantly limits the possibilities of an attack by adversaries when opening, reading and editing the protected document, (2) By the adoption of biometric verification techniques enabling fine-tuning of false acceptance and false rejection rates, it provides for responsible adaptation to users.
APA, Harvard, Vancouver, ISO, and other styles
7

Paul, Padma P., and Marina L. Gavrilova. "Cancelable Fusion of Face and Ear for Secure Multi-Biometric Template." International Journal of Cognitive Informatics and Natural Intelligence 7, no. 3 (2013): 80–94. http://dx.doi.org/10.4018/ijcini.2013070105.

Full text
Abstract:
Biometric fusion to achieve multimodality has emerged as a highly successful new approach to combat problems of unimodal biometric system such as intraclass variability, interclass similarity, data quality, non-universality, and sensitivity to noise. The authors have proposed new type of biometric fusion called cancelable fusion. The idea behind the cancelable biometric or cancelability is to transform a biometric data or feature into a new one so that the stored biometric template can be easily changed in a biometric security system. Cancelable fusion does the fusion of multiple biometric trait in addition it preserve the properties of cancelability. In this paper, the authors present a novel architecture for template generation within the context of the cancelable multibiometric fusion. The authors develop a novel cancelable biometric template generation algorithm using cancelable fusion, random projection and transformation-based feature extraction and selection. The authors further validate the performance of the proposed algorithm on a virtual multimodal face and ear database.
APA, Harvard, Vancouver, ISO, and other styles
8

Yadav, Amit Kumar, Neeraj Gupta, Aamir Khan, and Anand Singh Jalal. "Robust Face Recognition Under Partial Occlusion Based on Local Generic Features." International Journal of Cognitive Informatics and Natural Intelligence 15, no. 3 (2021): 47–57. http://dx.doi.org/10.4018/ijcini.20210701.oa4.

Full text
Abstract:
Face recognition has drawn significant attention due to its potential use in biometric authentication, surveillance, security, robotics, and so on. It is a challenging task in the field of computer vision. Although the various state-of-the-art methods of face recognition in constrained environments have achieved satisfactory results, there are still many issues which are untouched in unconstrained environments, such as partial occlusions, large pose variations, etc. In this paper, the authors have proposed an approach which utilized the local generic feature (LGF) to recognize the face in the partial occlusion by fusing features scale invariant feature transform (SIFT) and multi-block local binary pattern (MB-LBP). It also utilizes robust kernel method for classification of the query image. They have validated the effectiveness of the proposed approach on the benchmark AR face database. The experimental outcomes illustrate that the proposed approach outperformed the state-of-art methods for robust face recognition.
APA, Harvard, Vancouver, ISO, and other styles
9

Vigila, Soosai Antony Maria Celestin, Karuppiah Muneeswaran, and William Thomas Berkin Albert Antony. "Biometric security system over finite field for mobile applications." IET Information Security 9, no. 2 (2015): 119–26. http://dx.doi.org/10.1049/iet-ifs.2013.0286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hassan, Basma Mohammed, Khaled Mohammed Fouad, and Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing." International Journal of Enterprise Information Systems 11, no. 4 (2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.

Full text
Abstract:
Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as a biometric authentication technique is strongly Candidate for the security issues in cloud computing technology. Keystroke dynamics as a security system did not need extra hardware because the authentication device will be the existing keyboard based on everyone has a unique style for writing. The other biometric methods are addressed with each advantage and disadvantage along with keystroke method. In this paper, all known studies about keystroke technique are explained and compared between them according to the classification technique, number of the participated users and each study results then introduces a survey on software and hardware of other biometric authentication techniques and after the literature review is addressed then keystroke as a biometric authentication system is suggested to access cloud computing environment because it has many advantages to being a part of the known security systems which spread in our world.
APA, Harvard, Vancouver, ISO, and other styles
11

Deane, Frank, Ron Henderson, Doug Mahar, and Anthony Saliba. "Theoretical examination of the effects of anxiety and electronic performance monitoring on behavioural biometric security systems." Interacting with Computers 7, no. 4 (1995): 395–411. http://dx.doi.org/10.1016/0953-5438(96)87700-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kanak, Alper. "Biometric ontology for semantic biometric‐as‐a‐service (BaaS) applications: a border security use case." IET Biometrics 7, no. 6 (2018): 510–18. http://dx.doi.org/10.1049/iet-bmt.2018.5067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Soutar, Colin. "Implementation of Biometric Systems — Security and Privacy Considerations." Information Security Technical Report 7, no. 4 (2002): 49–55. http://dx.doi.org/10.1016/s1363-4127(02)00406-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Das, Srijan, Khan Muhammad, Sambit Bakshi, et al. "Lip biometric template security framework using spatial steganography." Pattern Recognition Letters 126 (September 2019): 102–10. http://dx.doi.org/10.1016/j.patrec.2018.06.026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wati, Vera, Kusrini Kusrini, Hanif Al Fatta, and Nitika Kapoor. "Security of facial biometric authentication for attendance system." Multimedia Tools and Applications 80, no. 15 (2021): 23625–46. http://dx.doi.org/10.1007/s11042-020-10246-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Biggio, B., Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli. "Security evaluation of biometric authentication systems under real spoofing attacks." IET Biometrics 1, no. 1 (2012): 11. http://dx.doi.org/10.1049/iet-bmt.2011.0012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Sarkar, Arpita, and Binod K. Singh. "A review on performance,security and various biometric template protection schemes for biometric authentication systems." Multimedia Tools and Applications 79, no. 37-38 (2020): 27721–76. http://dx.doi.org/10.1007/s11042-020-09197-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

CHOU, I.-HSIN, and CHIN-FENG FAN. "AN OBJECT-ORIENTED SECURITY KNOWLEDGE FRAMEWORK FOR THE NUCLEAR SAFETY SYSTEM PROJECT." International Journal of Software Engineering and Knowledge Engineering 20, no. 03 (2010): 347–65. http://dx.doi.org/10.1142/s0218194010004797.

Full text
Abstract:
As computers are used in nuclear safety systems, security engineering is becoming more and more important in the nuclear industry. Like all highly technical endeavours, the development of nuclear safety systems is a knowledge intensive task. Unfortunately, not only do nuclear scientists and software engineers lack the security knowledge, they are also not familiar with the new security requirements. Besides, few young people are studying nuclear science, nuclear engineering and related fields. Therefore, knowledge management can play a central role in encapsulating, storing and spreading the related discipline and knowledge more efficiently in the nuclear industry. In this paper, we propose a security knowledge framework to gather and store security knowledge from those regulatory-based security activities. We adopt an object-oriented paradigm which is easy for software engineers to understand and to express tacit and explicit knowledge. Its aim is intended to decouple between platform-independent security knowledge and platform-specific security controls. Finally, an example is presented to demonstrate the feasibility of linking between security controls and knowledge ontology in our framework.
APA, Harvard, Vancouver, ISO, and other styles
19

Ballard, Lucas, Daniel Lopresti, and Fabian Monrose. "Forgery Quality and Its Implications for Behavioral Biometric Security." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 37, no. 5 (2007): 1107–18. http://dx.doi.org/10.1109/tsmcb.2007.903539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Siconolfi, Richard M. "A Toxicologist's Viewpoint of the Quality of Computer-Captured Data and Data Audits." Journal of the American College of Toxicology 8, no. 2 (1989): 323–31. http://dx.doi.org/10.3109/10915818909019557.

Full text
Abstract:
As computers become more common in toxicology laboratories, the need of handwritten data decreases. The good laboratory practice standards taught the toxicology community to prepare adequate standard operating procedures and how to document all phases of a nonclinical laboratory study. Have computers helped us with our SOPs or documentation? Maybe. Computers have streamlined many of the mundane tasks in data collection. However, they have also opened up a whole list of problems: data security, data audits, computer-generated backups, technician training and periodic updates, system validation (software, hardware, and data), and “data thieves.” A system of checks and balances must be developed, implemented, and reviewed constantly to assure the quality of data collected. This cannot be the responsibility of one person or one department but requires input from many, the cooperation of all, and support from management, without which quality would suffer.
APA, Harvard, Vancouver, ISO, and other styles
21

Joshi, Mahesh, Bodhisatwa Mazumdar, and Somnath Dey. "A comprehensive security analysis of match-in-database fingerprint biometric system." Pattern Recognition Letters 138 (October 2020): 247–66. http://dx.doi.org/10.1016/j.patrec.2020.07.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Quadry, Khaja Mizbahuddin, A. Govardhan, and Mohammed Misbahuddin. "Design, Analysis, and Implementation of a Twofactor Authentication Scheme using Graphical Password." International Journal of Computer Network and Information Security 13, no. 3 (2021): 39–51. http://dx.doi.org/10.5815/ijcnis.2021.03.04.

Full text
Abstract:
With the increase in the number of e-services, there is a sharp increase in online financial transactions these days. These services require a strong authentication scheme to validate the users of these services and allow access to the resources for strong security. Since two-factor authentication ensures the required security strength, various organizations employ biometric-based or Smart Card or Cryptographic Token-based methods to ensure the safety of user accounts. But most of these methods require a verifier table for validating users at a server. This poses a security threat of stolen-verifier attack. To address this issue, there is a strong need for authentication schemes for e-services that do not require a verifier table at the server. Therefore, this paper proposes the design of an authentication scheme for eservices which should be resistant to various attacks including a stolen verifier attack. The paper will also discuss: 1) The proposed scheme analyzed for security provided against the known authentication attacks 2) The concept implementation of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
23

Verma, Dipti, and Sipi Dubey. "Fuzzy Brain Storm Optimization and Adaptive Thresholding for Multimodal Vein-Based Recognition System." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 05 (2017): 1756007. http://dx.doi.org/10.1142/s0218001417560079.

Full text
Abstract:
Nowadays, conventional security method of using passwords can be easily forged by unauthorized person. Hence, biometric cues such as fingerprints, voice, palm print, and face are more preferable for recognition but to preserve the liveliness, another one important biometric trait is vein pattern, which is formed by the subcutaneous blood vessels that contain all the achievable recognition properties. Accordingly, in this paper, we propose a multibiometric system using palm vein, hand vein, and finger vein. Here, Holoentropy-based thresholding mechanism is newly developed for extracting the vein patterns. Also, Fuzzy Brain Storm Optimization (FBSO) method is proposed for score level fusion to achieve the better recognition performance. These two contributions are effectively included in the biometric recognition system and the performance analysis of the proposed method is carried out using the benchmark datasets of palm vein image, finger vein image, and hand vein image. The quantitative results are analyzed with the help of FAR, FRR, and accuracy. From outcome, we proved that the proposed FBSO approach attained a higher accuracy of 81.3% than the existing methods.
APA, Harvard, Vancouver, ISO, and other styles
24

Chandra, Akhilesh, and Thomas G. Calderon. "Toward a Biometric Security Layer in Accounting Systems." Journal of Information Systems 17, no. 2 (2003): 51–70. http://dx.doi.org/10.2308/jis.2003.17.2.51.

Full text
Abstract:
This paper discusses theoretical and practical issues related to the use of a biometric-enabled security layer in accounting systems aimed at enhancing user authentication and reducing control risk. Originating in criminology, biometric technology has matured over the years with applications in diverse disciplines. However, its use in business and accounting is still in its infancy, and many issues about its role in information systems security are unresolved. The paper proposes an access decision framework that draws from the strategy and risk assessment literature to model processes where biometrics might be used to reduce control risk. Despite its potential strengths, biometric technology is not a panacea and represents one element in a portfolio of security mechanisms needed to protect information resources. The paper discusses challenges in implementing biometric technology and identifies avenues for future research.
APA, Harvard, Vancouver, ISO, and other styles
25

Konyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.

Full text
Abstract:
Computers are involved in every aspect of modern society and have become an essential part of our lives, but their vulnerability is of increasing concern to us. Security flaws are inherent in the operation of computers Most flaws are caused by errors in the process of software engineering or unforeseen mishaps and it is difficult to solve these problems by conventional methods. A radical way of constantly monitoring the system for newly disclosed vulnerabilities is required. In order to devise such a system, this work draws an analogy between computer immune systems and the human immune system. The computer immune system is the equivalent of the human immune system. The primary objective of this paper is to use an intrusion detection system in the design and implementation of a computer immune system that would be built on the framework of the human immune system. This objective is successfully realized and in addition a prevention mechanism using the windows IP Firewall feature has been incorporated. Hence the system is able to perform intrusion detection and prevention. Data was collected about events occurring in a computer network that violate predefined security policy, such as attempts to affect the confidentiality, integrity or its availability using Snort rules for known attacks and adaptive detection for the unknown attacks. The system was tested using real-time data and Intrusion Detection evaluation (IDEVAL) Department of Defense Advanced Research Projects Agency (DARPA) data set. The results were quite encouraging as few false positive were recorded.
APA, Harvard, Vancouver, ISO, and other styles
26

Gumaei, Abdu, Rachid Sammouda, Abdul Malik S. Al-Salman, and Ahmed Alsanad. "Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation." Journal of Parallel and Distributed Computing 124 (February 2019): 27–40. http://dx.doi.org/10.1016/j.jpdc.2018.10.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ali, Syed Sadaf, Iyyakutti Iyappan Ganapathi, Surya Prakash, Pooja Consul, and Sajid Mahyo. "Securing biometric user template using modified minutiae attributes." Pattern Recognition Letters 129 (January 2020): 263–70. http://dx.doi.org/10.1016/j.patrec.2019.11.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Evangelin, L. Nisha, and A. Lenin Fred. "Securing recognized multimodal biometric images using cryptographic model." Multimedia Tools and Applications 80, no. 12 (2021): 18735–52. http://dx.doi.org/10.1007/s11042-021-10541-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Miao, Fen, Shu-Di Bao, and Ye Li. "Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security." IET Information Security 7, no. 2 (2013): 87–96. http://dx.doi.org/10.1049/iet-ifs.2012.0104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bhatnagar, Gaurav, and Q. M. Jonathan Wu. "Enhancing the transmission security of biometric images using chaotic encryption." Multimedia Systems 20, no. 2 (2013): 203–14. http://dx.doi.org/10.1007/s00530-013-0323-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Yang, Wencheng, Song Wang, Guanglou Zheng, Junaid Chaudhry, and Craig Valli. "ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures." Journal of Supercomputing 74, no. 10 (2018): 4893–909. http://dx.doi.org/10.1007/s11227-018-2266-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Nagar, Abhishek, Karthik Nandakumar, and Anil K. Jain. "A hybrid biometric cryptosystem for securing fingerprint minutiae templates." Pattern Recognition Letters 31, no. 8 (2010): 733–41. http://dx.doi.org/10.1016/j.patrec.2009.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Haiqing, Shiqiang Zheng, Shuhua Hao, and Yuancheng Li. "Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication." Advances in Multimedia 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/9025458.

Full text
Abstract:
With the rise in biometric-based identity authentication, facial recognition software has already stimulated interesting research. However, facial recognition has also been subjected to criticism due to security concerns. The main attack methods include photo, video, and three-dimensional model attacks. In this paper, we propose a multifeature fusion scheme that combines dynamic and static joint analysis to detect fake face attacks. Since the texture differences between the real and the fake faces can be easily detected, LBP (local binary patter) texture operators and optical flow algorithms are often merged. Basic LBP methods are also modified by considering the nearest neighbour binary computing method instead of the fixed centre pixel method; the traditional optical flow algorithm is also modified by applying the multifusion feature superposition method, which reduces the noise of the image. In the pyramid model, image processing is performed in each layer by using block calculations that form multiple block images. The features of the image are obtained via two fused algorithms (MOLF), which are then trained and tested separately by an SVM classifier. Experimental results show that this method can improve detection accuracy while also reducing computational complexity. In this paper, we use the CASIA, PRINT-ATTACK, and REPLAY-ATTACK database to compare the various LBP algorithms that incorporate optical flow and fusion algorithms.
APA, Harvard, Vancouver, ISO, and other styles
34

Cruz, Bruno, Silvana Gómez-Meire, David Ruano-Ordás, Helge Janicke, Iryna Yevseyeva, and Jose R. Méndez. "A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets." Scientific Programming 2019 (July 29, 2019): 1–11. http://dx.doi.org/10.1155/2019/9067512.

Full text
Abstract:
The Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices. This idea fascinated people and originated a boom of IoT devices together with an increasing demand that was difficult to support. Many manufacturers quickly created hundreds of devices implementing functionalities but neglected some critical issues pertaining to device security. This oversight gave rise to the current situation where thousands of devices remain unpatched having many security issues that manufacturers cannot address after the devices have been produced and deployed. This article presents our novel research protecting IOT devices using Berkeley Packet Filters (BPFs) and evaluates our findings with the aid of our Filter.tlk tool, which is able to facilitate the development of BPF expressions that can be executed by GNU/Linux systems with a low impact on network packet throughput.
APA, Harvard, Vancouver, ISO, and other styles
35

Scott, Ralph L. "Wired to the World: Anti-virus Software." North Carolina Libraries 62, no. 1 (2009): 63. http://dx.doi.org/10.3776/ncl.v62i1.157.

Full text
Abstract:
This column is the third installment of a fourpart series on computer security. The recent “Mydoom” virus attack was an example of afast-spreading Internet virus that clogs incoming mail boxes. Many of you have already received a ton of emails from people you have never heard of, or messages from “PAYROLL,” “Message returned,” or “TRAFFIC OFFICE.” These were distributed to you because someone did not keep his/her computer anti-virus software up-to-date and/or opened an e-mail attachment that contained the virus. Outside of the admonition not to open e-mail attachments from people you don’t know, what can you do to prevent the spread of viruses to other computers?
APA, Harvard, Vancouver, ISO, and other styles
36

Revathi, A., N. Sasikaladevi, and C. Jeyalakshmi. "Digital speech watermarking to enhance the security using speech as a biometric for person authentication." International Journal of Speech Technology 21, no. 4 (2018): 1021–31. http://dx.doi.org/10.1007/s10772-018-09563-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bhatnagar, Gaurav, Jonathan Wu, and Balasubramanian Raman. "Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmission." Future Generation Computer Systems 28, no. 1 (2012): 254–67. http://dx.doi.org/10.1016/j.future.2010.11.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hathaliya, Jigna J., Sudeep Tanwar, and Richard Evans. "Securing electronic healthcare records: A mobile-based biometric authentication approach." Journal of Information Security and Applications 53 (August 2020): 102528. http://dx.doi.org/10.1016/j.jisa.2020.102528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ross, Arun, Sudipta Banerjee, and Anurag Chowdhury. "Security in smart cities: A brief review of digital forensic schemes for biometric data." Pattern Recognition Letters 138 (October 2020): 346–54. http://dx.doi.org/10.1016/j.patrec.2020.07.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Zakaria, Y., Rana M. Nassar, Osama Zahran, et al. "Cancelable multi-biometric security system based on double random phase encoding and cepstral analysis." Multimedia Tools and Applications 78, no. 22 (2019): 32333–55. http://dx.doi.org/10.1007/s11042-019-07824-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Punithavathi, P., and S. Geetha. "Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications." Multimedia Tools and Applications 78, no. 18 (2019): 25487–514. http://dx.doi.org/10.1007/s11042-019-7617-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Vijay, M., and G. Indumathi. "Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications." Journal of Information Security and Applications 58 (May 2021): 102707. http://dx.doi.org/10.1016/j.jisa.2020.102707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Mamyrbayev, Orken, Aizat Kydyrbekova, Keylan Alimhan, Dina Oralbekova, Bagashar Zhumazhanov, and Bulbul Nuranbayeva. "Development of security systems using DNN and i & x-vector classifiers." Eastern-European Journal of Enterprise Technologies 4, no. 9(112) (2021): 32–45. http://dx.doi.org/10.15587/1729-4061.2021.239186.

Full text
Abstract:
The widespread use of biometric systems entails increased interest from cybercriminals aimed at developing attacks to crack them. Thus, the development of biometric identification systems must be carried out taking into account protection against these attacks. The development of new methods and algorithms for identification based on the presentation of randomly generated key features from the biometric base of user standards will help to minimize the disadvantages of the above methods of biometric identification of users. We present an implementation of a security system based on voice identification as an access control key and a verification algorithm developed using MATLAB function blocks that can authenticate a person's identity by his or her voice. Our research has shown an accuracy of 90 % for this user identification system for individual voice characteristics. It has been experimentally proven that traditional MFCCs using DNN and i and x-vector classifiers can achieve good results. The paper considers and analyzes the most well-known approaches from the literature to the problem of user identification by voice: dynamic programming methods, vector quantization, mixtures of Gaussian processes, hidden Markov model. The developed software package for biometric identification of users by voice and the method of forming the user's voice standards implemented in the complex allows reducing the number of errors in identifying users of information systems by voice by an average of 1.5 times. Our proposed system better defines voice recognition in terms of accuracy, security and complexity. The application of the results obtained will improve the security of the identification process in information systems from various attacks.
APA, Harvard, Vancouver, ISO, and other styles
44

Ramkumar, E., T. Guna, S. M. Dharshan, and V. S. Ashok Ramanan. "Implementing Facial Recognition by Interfacing MATLAB Along with Arduino." International Journal of Innovative Technology and Exploring Engineering 10, no. 4 (2021): 66–71. http://dx.doi.org/10.35940/ijitee.d8478.0210421.

Full text
Abstract:
Facial recognition has become one of the recent trends in attracting abundant attention within the society of social media network. The face is flat and therefore needs plenty of mathematical computations. Facial knowledge has become one in every of the foremost necessary biometric, we tend to witness it from the day-to-day gadgets like mobile phones. Every transportable electronic device currently being discharged includes a camera embedded in it. Network access management via face recognition not solely makes hackers just about not possible to steal one's "password", however conjointly will increase the user-friendliness in human-computer interaction. For the applications of videophone and conference, the help of face recognition conjointly provides an additional economical secret writing theme. Face detection technologies are employed in an oversized kind of applications like advertising, diversion, video secret writing, digital cameras, CCTV police investigation, and even in military use. Totally different algorithms are used for biometric authentication. The Kanade-Lucas-Tomasi rule makes use of abstraction common intensity transformation to direct the deep explore for the position that shows the simplest match. Another common face detection rule is that the Viola-Jones rule that's the foremost wide used face detection rule. It's employed in most digital cameras and mobile phones to notice faces. It uses cascades to notice edges just like the nose, the ears, etc. Hence, during this paper, we've got planned the Viola-Jones rule because the best one supported our application. The rule is employed within the biometric authentication of individuals and also the pictures are kept during processing. The kept information is employed for recognizing the faces and if the information matches, an impression signal is given to the controller. The MATLAB software is employed to relinquish control signals to the motor, which is employed for gap and shutting the door. The input image is fed by a digital camera and also the image is processed within MATLAB. The output is given to the external controller interfaced with MATLAB. The image process field has several sub-fields, biometric authentication is one in each of them because it gains additional quality for security functions these days. The planned system can be employed in residential buildings, malls, and industrial sectors. Thus, this technique is helpful for homemakers to be safer in their homes.
APA, Harvard, Vancouver, ISO, and other styles
45

UNE, M., A. OTSUKA, and H. IMAI. "Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems." IEICE Transactions on Information and Systems E91-D, no. 5 (2008): 1380–89. http://dx.doi.org/10.1093/ietisy/e91-d.5.1380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

CHEN, XUERONG, and ZHONGLIANG JING. "INFRARED FACE RECOGNITION BASED ON LOG-GABOR WAVELETS." International Journal of Pattern Recognition and Artificial Intelligence 20, no. 03 (2006): 351–60. http://dx.doi.org/10.1142/s0218001406004703.

Full text
Abstract:
Despite the variety of approaches and tools studied, face recognition is not accurate or robust enough to be used in uncontrolled environments. Recently, infrared (IR) imagery of human faces is considered as a promising alternative to visible imagery. IR face recognition is a biometric which offers the security of fingerprints with the convenience of face recognition. However, IR has its own limitations. The presence of eyeglasses has more influence on IR than visible imagery. In this paper, a method based on Log-Gabor wavelets for IR face recognition is proposed. The method first derives a Log-Gabor feature vector from IR face image, then obtains the independent Log-Gabor features by using independent component analysis (ICA). Experimental results show that the proposed method works well, even in challenging situations.
APA, Harvard, Vancouver, ISO, and other styles
47

Vlădoiu, Monica, and Zoran Constantinescu. "Development Journey of QADPZ - A Desktop Grid Computing Platform." International Journal of Computers Communications & Control 4, no. 1 (2009): 82. http://dx.doi.org/10.15837/ijccc.2009.1.2416.

Full text
Abstract:
In this paper we present QADPZ, an open source system for desktop grid computing, which enables users of a local network or Internet to share resources. QADPZ allows a centralized management and use of the computational resources of idle computers from a network of desktop computers. QADPZ users can submit compute-intensive applications to the system, which are then automatically scheduled for execution. The scheduling is performed according to the hardware and software requirements of the application. Users can later monitor and control the execution of the applications. Each application consists of one or more tasks. Applications can be independent, when the composing tasks do not require any interaction, or parallel, when the tasks communicate with each other during the computation. The paper describes both QADPZ functionality and the process of design and implementation, with focus on requirements, architecture, user interface and security. Some future work ideas are also presented.
APA, Harvard, Vancouver, ISO, and other styles
48

LIN, CHIH-LUNG, HSU-YUNG CHENG, KUO-CHIN FAN, CHUN-WEI LU, CHANG-JUNG JUAN, and CHIH-WEI KUO. "BI-FEATURE VERIFICATION FOR PALMPRINT IMAGES CAPTURED IN PEGLESS SCENARIOS." International Journal of Pattern Recognition and Artificial Intelligence 27, no. 05 (2013): 1356007. http://dx.doi.org/10.1142/s0218001413560077.

Full text
Abstract:
This paper presents a reliable and robust palmprint verification approach that involves using a bi-feature, biometric, palmprint feature-point number (FPN) and a histogram of oriented gradient (HOG). The bi-feature was fused and verified using a support vector machine (SVM) at the feature level. The approach has the advantages of capturing palm images in pegless scenarios with a low cost and low-resolution (100 dpi) digital scanner, and one sensor can capture palmprint bi-feature information. The low-resolution images result in a smaller database. Nine thousand palmprint images were collected from 300 people to verify the validity of the proposed approach. The results showed an accurate classification rate of 99.04%. The experimental results demonstrated that the proposed approach is feasible and effective in palmprint verification. Our findings will help extend palmprint verification technology to security access control systems.
APA, Harvard, Vancouver, ISO, and other styles
49

Sato, Yoshihiro, and Yue Bao. "Log-Polar Facial Recognition Using Minimum Feature Band." International Journal of Pattern Recognition and Artificial Intelligence 35, no. 09 (2021): 2156003. http://dx.doi.org/10.1142/s0218001421560036.

Full text
Abstract:
There is an increasing demand for biometric security systems in several fields. This study presents a highly accurate facial recognition method that uses high-speed transformation and facial morphing using region-limited log-polar transformation based on a center point calculated from the coordinates of both eyes and corners of the mouth. Log-polar transformation is limited to the region, so that the region including the feature can be suppressed to the minimum range, thereby facilitating high-speed transformation. Additionally, after facial morphing, the shapes of the eyes and mouth are altered based on the outline of the face, enabling high-precision facial recognition. The efficacy of the proposed method is verified experimentally. Therefore, we can confirm that 91.72% of images using the color FERET database and 96% of images using the FEI face database can be recognized using our method.
APA, Harvard, Vancouver, ISO, and other styles
50

POORNIMA, S., and S. SUBRAMANIAN. "UNCONSTRAINED IRIS AUTHENTICATION THROUGH FUSION OF RGB CHANNEL INFORMATION." International Journal of Pattern Recognition and Artificial Intelligence 28, no. 05 (2014): 1456010. http://dx.doi.org/10.1142/s0218001414560102.

Full text
Abstract:
The unique iris pattern of each human eye is complex, but easily be scanned or captured by a camera. However, the high cost infrared iris scanners used for acquisition causes inconvenience to users by distance related constraints. This restricts its widespread use in real-time applications such as airports and banks. The images captured by cameras under visible wavelength are obstructed by the presence of reflections and shadows which requires additional attention. The main objective of this paper is to propose a secure biometric iris authentication system by fusion of RGB channel information from the real-time data captured under visible wavelength and varying light conditions. The proposed system is adapted to a real-time noisy iris dataset. The effectiveness of this proposed system was tested on two different color iris datasets, namely, a public database UBIRISv1 and a newly created database SSNDS which contains images captured with any digital/mobile camera of minimum 5MP under unconstrained environments. This system supports the cross sensor acquisition and successful iris segmentation from these unconstrained inputs. The features from each channel are extracted using log Gabor filter and a matching is performed using hamming distance based on two thresholds (inter and intra class variations). The performance quality of the proposed biometric system leads to the feasibility of a new cost-effective approach for any real-time application, which requires authentication to ensure quality service, enhance security, eliminate fraud, and maximize effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!