To see the other types of publications on this topic, follow the link: Vulnerabilities of biometric system.

Dissertations / Theses on the topic 'Vulnerabilities of biometric system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Vulnerabilities of biometric system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Osoka, Agu. "Assessing and protecting against vulnerabilities of biometric systems." Thesis, University of Kent, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Higbee, Matthew Somers. "Deriving System Vulnerabilities Using Log Analytics." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/6139.

Full text
Abstract:
System Administrators use many of the same tactics that are implemented by hackers to validate the security of their systems, such as port scanning and vulnerability scanning. Port scanning is slow, and can be highly inaccurate. After a scan is complete, the results of the scan must be cross checked with a vulnerability database to discover if any vulnerabilities are present. While these techniques are useful, they have severe limitations. System Administrators have full access to all of their machines. They should not have to rely exclusively on port scanning them from the outside of their ma
APA, Harvard, Vancouver, ISO, and other styles
3

Jayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.

Full text
Abstract:
Security is very important in present day life. In this highly-interconnected world, most of our daily activities are computer based, and the data transactions are protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords related to an individual that can lead to attacks. Indeed, remembering several passwords can become a tedious task. Biometrics is a science that measures an individual’s physical characteristics in a unique way. Thus, biometrics serves as a method to replace the cumbersome us
APA, Harvard, Vancouver, ISO, and other styles
4

Bansal, Mamta. "Face based multimodal biometric authentication system." Thesis, IIT Delhi, 2015. http://eprint.iitd.ac.in:80//handle/2074/8179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Swabey, Matthew A. "The human auditory system as a biometric." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Muthu, Rajesh. "Development of a secure biometric recognition system." Thesis, Northumbria University, 2016. http://nrl.northumbria.ac.uk/31618/.

Full text
Abstract:
Biometric based security systems are becoming an integral part of many security agencies and organisations. These systems have a number of applications ranging from national security, law enforcement, the identification of people, particularly for building access control, the identification of suspects by the police, driver’s licences and many other spheres. However, the main challenge is to ensure the integrity of digital content under different intentional and non-intentional distortions; along with the robustness and security of the digital content. This thesis focuses on improving the secu
APA, Harvard, Vancouver, ISO, and other styles
7

Shonubi, Felix, Ciara Lynton, Joshua Odumosu, and Daryl Moten. "Exploring Vulnerabilities in Networked Telemetry." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596435.

Full text
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV<br>The implementation of Integrated Network Enhanced Telemetry (iNET) in telemetry applications provides significant enhancements to telemetry operations. Unfortunately such networking brings the potential for devastating cyber-attacks and networked telemetry is also susceptible to these attacks. This paper demonstrates a worked example of a social engineering attack carried out on a test bed network
APA, Harvard, Vancouver, ISO, and other styles
8

Poon, Hoi Ting. "Towards a practical and secure biometric authentication system." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/28017.

Full text
Abstract:
The idea of merging biometrics technology with cryptography brought interesting possibilities in enhancing the security and privacy of biometrics systems. Conventional systems generally require large databases, which represent a security risk and raise privacy concerns. Biometric encryption is a method devised to hide biometric features along with a cryptographic key, which could remove the need for such biometric databases. The Fuzzy Vault scheme is one of the promising candidates for biometric encryption. This thesis analyzes the scheme and attempts to provide solutions to problems impeding
APA, Harvard, Vancouver, ISO, and other styles
9

McCracken, Wendy Margaret. "Service Delivery To Deaf Children : Vulnerabilities Within The System." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brown, Allanah. "The fuel transportation system in British Columbia : attributes and vulnerabilities." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59065.

Full text
Abstract:
Disasters can, and do lead to widespread disruption, often crippling transportation systems in complex ways. Transportation systems need to be designed not only to operate on an ordinary day; they need to be designed to respond to man-made and natural disasters. Proactive planning can allow transport to resume service, and deal with crises, as quickly as possible post-disaster. This thesis provides information to assist in the development of plans and protocols for emergency scenarios. Coastal communities throughout British Columbia (BC) are heavily dependent on maritime transportation for the
APA, Harvard, Vancouver, ISO, and other styles
11

Han, Wei. "An integrated and distributed biometric-based user authentication architecture." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27851.

Full text
Abstract:
Biometric authentication systems are used to guide the system security for many years in the computer world and make the user's identification easier and more convenient. Meanwhile, the systems encounter lots of challenges, attacks and threats, privacy protection and system management requirements, which affect the user's acceptance. Differing from the commonly used solutions, in this thesis the approach is to modify the system to meet these requirements, which results in a distributed architecture which can be composed in real time, and resolves the above challenges in one solution. A system
APA, Harvard, Vancouver, ISO, and other styles
12

Kuan, Hung-i. "Evaluation of a biometric keystroke typing dynamics computer security system." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/26530.

Full text
Abstract:
Approved for public release; distribution is unlimited.<br>This study evaluates an inexpensive personal computer access control system that relies on biometric keystroke typing dynamics technology, BioPassword Model 2100 (BioPassword). Enrollment time, verification time, false rejection error rate, false acceptance error rate, and user acceptance were evaluated for this system. The results show that BioPassword provides multilayer security through the inclusion of privilege control, audit functions, passwords, and verification of a personal behavioral characteristic, the rate and variation of
APA, Harvard, Vancouver, ISO, and other styles
13

Assaad, Firas Souhail. "Biometric Multi-modal User Authentication System based on Ensemble Classifier." University of Toledo / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1418074931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.

Full text
Abstract:
Biometric systems are being increasingly used, from daily entertainment to critical applications such as security access and identity management. It is known that biometric systems should meet the stringent requirement of low error rate. In addition, for critical applications, the security and privacy issues of biometric systems are required to be concerned. Otherwise, severe consequence such as the unauthorized access (security) or the exposure of identity-related information (privacy) can be caused. Therefore, it is imperative to study the vulnerability to potential attacks and identify the
APA, Harvard, Vancouver, ISO, and other styles
15

Mohamed, Abdul Cader Akmal Jahan. "Finger biometric system using bispectral invariants and information fusion techniques." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/134464/1/Akmal%20Jahan_Mohamed%20Abdul%20Cader_Thesis.pdf.

Full text
Abstract:
Contactless hand biometric systems are better accepted than contact prints as they are hygienic and accelerate data acquisition. This research is one of the few investigating contactless biometrics of the full hand by proposing a novel algorithm based on ridge orientation information along lines connecting key points, higher order spectral features, and fusion. It was investigated with contactless finger images acquired from 81 users, and found to be robust to hand orientation and image size, and provide acceptable performance using two fingers with fusion. The algorithm has potential to use i
APA, Harvard, Vancouver, ISO, and other styles
16

Coffman, James Wyatt. "Web-enabling an early warning and tracking system for network vulnerabilities." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hasegawa, Robert Shigehisa. "Using synthetic images to improve iris biometric performance." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Clarke, Dalton H., and W. Tracy Young. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4607.

Full text
Abstract:
Approved for public release, distribution unlimited<br>The Defense Manpower Data Center (DMDC) manages the Defense Biometric Identification System (DBIDS). DBIDS captures personal and biometric information to manage DoD-wide access, control, and personnel accountability. DBIDS equipment is installed globally, and managed by a central office on the Monterey peninsula. Program managers track data about the numbers and type of equipment installed at each site. Program managers were tracking DBIDS data using a single Microsoft Excel workbook comprised of several, interlinking worksheets (DB
APA, Harvard, Vancouver, ISO, and other styles
19

Young, W. Tracy Clarke Dalton H. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FYoung.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2009.<br>Thesis Advisor(s): Pfeiffer, Karl D. "September 2009." Description based on title screen as viewed on 6 November, 2009. Author(s) subject terms: Database, Database Development Life Cycle, Rapid Prototyping, Business Process Management Software, Business Process Improvement, Business Process Redesign. Includes bibliographical references (p. 63-65). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
20

Arteaga, Falconi Juan Sebastian. "Towards an Accurate ECG Biometric Authentication System with Low Acquisition Time." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40129.

Full text
Abstract:
Biometrics is the study of physical or behavioral traits that establishes the identity of a person. Forensics, physical security and cyber security are some of the main fields that use biometrics. Unlike traditional authentication systems—such as password based—biometrics cannot be lost, forgotten or shared. This is possible because biometrics establishes the identity of a person based on a physiological/behavioural characteristic rather than what the person possess or remembers. Biometrics has two modes of operation: identification and authentication. Identification finds the identity of a pe
APA, Harvard, Vancouver, ISO, and other styles
21

Bashir, Muzaffar [Verfasser], and Hans Robert [Akademischer Betreuer] Kalbitzer. "A novel multisensoric system recording and analyzing human biometric features for biometric and biomedical applications / Muzaffar Bashir. Betreuer: Hans Robert Kalbitzer." Regensburg : Universitätsbibliothek Regensburg, 2011. http://d-nb.info/102331214X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Michaud, David 1975. "Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34817.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design & Management Program, 2005.<br>Includes bibliographical references (p. 93-96).<br>The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities in these infrastructures. This Thesis presents a methodology for the identification and prioritization of vulnerabilities in a water supply system. Existing methods are mostly based either on an adaptation of the minimal-cut-set
APA, Harvard, Vancouver, ISO, and other styles
23

Cook, Hugh Stephen Thomas. "The reality of a 'High Performance Work System' : internal and external vulnerabilities." Thesis, University of Leeds, 2012. http://etheses.whiterose.ac.uk/4378/.

Full text
Abstract:
This thesis contributes to knowledge and understanding about the implementation of systems of Human Resource Management. It does this through intensive case based research at Ultico, the largest private sector employer in the UK and the leading UK food retail establishment. Much literature exists on HRM systems and their relationship with performance, yet significantly less has addressed the complex internal social processes associated with their implementation. Similarly, while research has considered the importance of the external context on HRM, little has addressed the processes through wh
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Jae Hyung S. M. Massachusetts Institute of Technology. "Systematic approach to analyzing security and vulnerabilities of blockchain systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121793.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019<br>Cataloged from PDF version of thesis. Page 150 blank.<br>Includes bibliographical references (pages 119-149).<br>Recent hacks into blockchain systems and heists from such systems have raised serious questions about whether this new technology can be secured from ongoing, evolving cyberattacks. While the technology is known to provide an environment that is fundamentally safer than other existing centralized systems offer, security professionals warn that the current
APA, Harvard, Vancouver, ISO, and other styles
25

Okonoboh, Matthias Aifuobhokhan, and Sudhakar Tekkali. "Real-Time Software Vulnerabilities in Cloud Computing : Challenges and Mitigation Techniques." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2645.

Full text
Abstract:
Context: Cloud computing is rapidly emerging in the area of distributed computing. In the meantime, many organizations also attributed the technology to be associated with several business risks which are yet to be resolved. These challenges include lack of adequate security, privacy and legal issues, resource allocation, control over data, system integrity, risk assessment, software vulnerabilities and so on which all have compromising effect in cloud environment. Organizations based their worried on how to develop adequate mitigation strategies for effective control measures and to balancing
APA, Harvard, Vancouver, ISO, and other styles
26

Khan, Shaharyar S. M. Massachusetts Institute of Technology. "Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122437.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 123-128).<br>Recent cyber-physical attacks, such as Stuxnet, Triton etc., have invoked an ominous realization about the lethality of such attacks and the vulnerability of critical infrastructure, including power, gas and water distribution control systems. The traditional industrial practice to enhance security posture by utilizing IT security-biased protection methods narrowly focuse
APA, Harvard, Vancouver, ISO, and other styles
27

Feng, Yicheng. "Template protecting algorithms for face recognition system." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Abraham, Arya. "It is I: An Authentication System for a Reconfigurable Radio." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/34353.

Full text
Abstract:
The security of a radio system hinges on its ability to effectively authenticate a user. This work proposes a two-factor authentication scheme using a token and a biometric. The users' access rights are determined during authentication and the users are served only those channels of data that they are privileged to receive. The strengths and the weaknesses of the implementation in reconfigurable hardware are identified. The capabilities of the scheme are put into perspective by comparing it to a high-end authentication system and by evaluating the use of standardized APIs and low-end authentic
APA, Harvard, Vancouver, ISO, and other styles
29

Louw, Lloyd A. B. "Automated face detection and recognition for a login system." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lam, Lawrence G. "Digital Health-Data platforms : biometric data aggregation and their potential impact to centralize Digital Health-Data." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106235.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2015.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (page 81).<br>Digital Health-Data is being collected at unprecedented rates today as biometric micro sensors continue to diffuse into our lives in the form of smart devices, wearables, and even clothing. From this data, we hope to learn more about preventative health so that we can spend less money on the doctor. To help users aggre
APA, Harvard, Vancouver, ISO, and other styles
31

McMillan, Stephen. "Design and analysis of a biometric access control system using an electronic olfactory device to identify human odour characteristics." Thesis, University of Greenwich, 2000. http://gala.gre.ac.uk/13136/.

Full text
Abstract:
The use of an electronic olfactory device, termed an electronic 'nose', was investigated for the detection of unique human odour characteristics. The detection of these unique odours was applied to the field of biometrics for access control, where a human's unique characteristics were used to authenticate a user of an access control system. An electronic odour sensing device was designed and constructed using an array of conducting polymer gas sensors in order to facilitate the regular screening of a group of human subjects over a period of six weeks. A static sampling method was used to measu
APA, Harvard, Vancouver, ISO, and other styles
32

Graziano, Timothy Michael. "Establishment of a Cyber-Physical Systems (CPS) Test Bed to Explore Traffic Collision Avoidance System (TCAS) Vulnerabilities to Cyber Attacks." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104624.

Full text
Abstract:
Traffic Collision Avoidance Systems (TCAS) are safety-critical, unauthenticated, ranging systems required in commercial aircraft. Previous work has proposed TCAS vulnerabilities to attacks from malicious actors with low cost software defined radios (SDR) and inexpensive open-source software (GNU radio) where spoofing TCAS radio signals in now possible. This paper outlines a proposed threat model for several TCAS vulnerabilities from an adversarial perspective. Periodic and aperiodic attack models are explored as possible low latency solutions to spoof TCAS range estimation. A TCAS test bed is
APA, Harvard, Vancouver, ISO, and other styles
33

Nadipelly, Vinaykumar. "Dynamic Scoping for Browser Based Access Control System." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1149.

Full text
Abstract:
We have inorganically increased the use of web applications to the point of using them for almost everything and making them an essential part of our everyday lives. As a result, the enhancement of privacy and security policies for the web applications is becoming increasingly essential. The importance and stateless nature of the web infrastructure made the web a preferred target of attacks. The current web access control system is a reason behind the victory of attacks. The current web consists of two major components, the browser and the server, where the effective access control system need
APA, Harvard, Vancouver, ISO, and other styles
34

Костомаха, Марія Володимирівна, та Mariia Kostomakha. "Комп’ютерна система біометричної аутентифікації особи за відбитком пальця". Bachelor's thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2021. http://elartu.tntu.edu.ua/handle/lib/35567.

Full text
Abstract:
У кваліфікаційній роботі спроектовано комп’ютерну систему біометричної аутентифікації особи за відбитком пальців, що відповідає вимогам технічного завдання. Основними апаратними пристроями спроектованої системи є: сканер відбитків пальців на основі ZFM-20; пристрій керування процесом зчитування та аутентифікації особи Raspberry PI Model B; компонента виводу інформаційних повідомлень для взаємодії з користувачем LCD 2*16. Взаємодію між сканером відбитків пальців і Raspberry PI забезпечено шляхом використання USB Serial адаптера. Логіку роботи програмного забезпечення реалізовано засобами мови
APA, Harvard, Vancouver, ISO, and other styles
35

Varshney, Rimpu. "Towards Designing Open Secure IoT System - Insights for practitioners." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20199.

Full text
Abstract:
IoT industry is growing at a rapid pace since everyone wants to connect everything to internet in order to use various services and applications using shared data. Openness is observed as an emerging trend in IoT industry. Security & privacy of the data are very important aspects in the design and deployment of the connected devices or Internet of Things. Fast growth in number of connected devices, heterogeneity, constrained resources, privacy, software upgrades and operational environment create important security related challenges in this domain. It is difficult to address challenges even w
APA, Harvard, Vancouver, ISO, and other styles
36

Boudermine, Antoine. "A dynamic attack graphs based approach for impact assessment of vulnerabilities in complex computer systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT046.

Full text
Abstract:
De nos jours, les réseaux informatiques sont utilisés dans de nombreux domaines et leur défaillance peut avoir un fort impact sur notre vie quotidienne. L'évaluation de leur sécurité est une nécessité pour réduire le risque de compromission par un attaquant. Néanmoins, les solutions proposées jusqu'à présent sont rarement adaptées à la grande complexité des systèmes informatiques modernes. Elles reposent souvent sur un travail humain trop important et les algorithmes utilisés ne sont pas assez performants. De plus, l'évolution du système dans le temps est rarement modélisée et n'est donc pas p
APA, Harvard, Vancouver, ISO, and other styles
37

Semerád, Lukáš. "Generování kryptografického klíče z biometrických vlastností oka." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236038.

Full text
Abstract:
The main topic of the thesis is creation of formulas for the amount of information entropy in biometric characteristics of iris and retina. This field of science in biometrics named above is unstudied yet, so the thesis tries to initiate research in this direction. The thesis also discusses the historical context of security and identification fields according to biometric characteristics of a human being with an overlap for potential usage in biometrics of iris and retina. The Daugman&#8217;s algorithm for converting iris image into the binary code which can be used as a cryptographic key is
APA, Harvard, Vancouver, ISO, and other styles
38

PASI, RICCARDO. "Flood impact over urban system : how to assess and manage urban vulnerabilities to adapt spatial planning practices at the municipal scale." Doctoral thesis, Università IUAV di Venezia, 2017. http://hdl.handle.net/11578/278743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Li, Jiawei. "Person re-identification with limited labeled training data." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/541.

Full text
Abstract:
With the growing installation of surveillance video cameras in both private and public areas, it is an immediate requirement to develop intelligent video analysis system for the large-scale camera network. As a prerequisite step of person tracking and person retrieval in intelligent video analysis, person re-identification, which targets in matching person images across camera views is an important topic in computer vision community and has been received increasing attention in the recent years. In the supervised learning methods, the person re-identification task is formulated as a classifica
APA, Harvard, Vancouver, ISO, and other styles
40

Jomaa, Diala. "Fingerprint Segmentation." Thesis, Högskolan Dalarna, Datateknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:du-4264.

Full text
Abstract:
In this thesis, a new algorithm has been proposed to segment the foreground of the fingerprint from the image under consideration. The algorithm uses three features, mean, variance and coherence. Based on these features, a rule system is built to help the algorithm to efficiently segment the image. In addition, the proposed algorithm combine split and merge with modified Otsu. Both enhancements techniques such as Gaussian filter and histogram equalization are applied to enhance and improve the quality of the image. Finally, a post processing technique is implemented to counter the undesirable
APA, Harvard, Vancouver, ISO, and other styles
41

Kwaa-Aidoo, Ephrem K. "Culturally aligned security in banking. A system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.

Full text
Abstract:
This thesis is an investigation into the unique rural banking system in Ghana and the role of information systems in fraud control. It presents a robust information security and internal control model to deal with fraud for the banking system. The rural banking industry has been noted for poor internal control leading to fraud. This has resulted in poor performance and even the collapse of some banks. The Focus of the study was on the processes used to deliver banking services. To design a protection system, a number of rural banks were visited. This was to understand the environment, regulat
APA, Harvard, Vancouver, ISO, and other styles
42

Öberg, Fredrik. "Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42294.

Full text
Abstract:
Biometric identification has already been applied to society today, as today’s mobile phones use fingerprints and other methods like iris and the face itself. With growth for technologies like computer vision, the Internet of Things, Artificial Intelligence, The use of face recognition as a biometric identification on ordinary doors has become increasingly common. This thesis studies is looking into the possibility of replacing regular door locks with face recognition or supplement the locks to increase security by using a pre-trained state-of-the-art face recognition method based on a convolu
APA, Harvard, Vancouver, ISO, and other styles
43

Kwaa-Aidoo, Ephrem Kwaku. "Culturally aligned security in banking : a system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.

Full text
Abstract:
This thesis is an investigation into the unique rural banking system in Ghana and the role of information systems in fraud control. It presents a robust information security and internal control model to deal with fraud for the banking system. The rural banking industry has been noted for poor internal control leading to fraud. This has resulted in poor performance and even the collapse of some banks. The Focus of the study was on the processes used to deliver banking services. To design a protection system, a number of rural banks were visited. This was to understand the environment, regulato
APA, Harvard, Vancouver, ISO, and other styles
44

Svoboda, Jan. "System for Recognition of 3D Hand Geometry." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412913.

Full text
Abstract:
V posledním desetiletí došlo ke zvýšení zájmu o užití 3D dat k biometrické identifikaci osob. Možná vůbec největší výzkum proběhl v oblasti 3D rozpoznávání podle obličeje, přičemž je v současné době dostupných vícero komerčních zařízení. V oblastni rozpoznávání podle 3D geometrie ruky byl v minulých letech proveden určitý výzkum jehož výsledkem však nebylo žádné komerční zařízení. Nezávisle na tomto výzkumu se v posledních letech velmi rozšířil trh s cenově dostupnými 3D sensory, což potenciálně umožňuje jejich nasazení v mnoha typech biometrických systémů. Hlavním cílem této práce je vytvořit
APA, Harvard, Vancouver, ISO, and other styles
45

Mehdi, Ali. "Developing a Computer System for the Generation of Unique Wrinkle Maps for Human Faces. Generating 2D Wrinkle Maps using Various Image Processing Techniques and the Design of 3D Facial Ageing System using 3D Modelling Tools." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5144.

Full text
Abstract:
Facial Ageing (FA) is a very fundamental issue, as ageing in general, is part of our daily life process. FA is used in security, finding missing children and other applications. It is also a form of Facial Recognition (FR) that helps identifying suspects. FA affects several parts of the human face under the influence of different biological and environmental factors. One of the major facial feature changes that occur as a result of ageing is the appearance and development of wrinkles. Facial wrinkles are skin folds; their shapes and numbers differ from one person to another, therefore, an adva
APA, Harvard, Vancouver, ISO, and other styles
46

Janečka, Petr. "Multimodální biometrický systém kombinující duhovku a sítnici." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234910.

Full text
Abstract:
This diploma thesis focuses on multibiometric systems, specifically on biometric fusion. The thesis describes eye biometrics, i.e. recognition based on retina and iris. The key part consists of design and implementation specification of a biometric system based on retina and iris recognition.
APA, Harvard, Vancouver, ISO, and other styles
47

Falcão, Thiago Azevedo. "Comparação do desempenho do classificador de novidades com o classificador do vizinho mais próximo no reconhecimento facial." Universidade Federal do Amazonas, 2014. http://tede.ufam.edu.br/handle/tede/3297.

Full text
Abstract:
Made available in DSpace on 2015-04-22T22:00:50Z (GMT). No. of bitstreams: 1 Thiago Falcao.pdf: 1370921 bytes, checksum: ec7b9ab219f2028eded75407403140be (MD5) Previous issue date: 2014-01-13<br>This work proposes the new classifier for face recognition, novelty classifier, which is based on novelty filter proposed by Kohonen. In order to evaluate the new classifier performance, it is performed a comparison with nearest neighboard classifier, which uses the Euclidian distance as distance metric. ORL face database was chosen to be used in this comparison. There was not any pre-processing (p
APA, Harvard, Vancouver, ISO, and other styles
48

Alsolami, Eesa. "An examination of keystroke dynamics for continuous user authentication." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/54730/1/Eesa_Alsolami_Thesis.pdf.

Full text
Abstract:
Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric auth
APA, Harvard, Vancouver, ISO, and other styles
49

Laurinavičiūtė, Viktorija. "Nekilnojamojo turto įmonės darbo efektyvumo didinimas naudojant biometrinę pelytę." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090615_104023-15073.

Full text
Abstract:
Baigiamajame magistro darbe nagrinėjamas nekilnojamojo turto įmonių darbuotojų darbo efektyvumas ir jo didinimo galimybės panaudojant naujausias technologijas – biometrinę kompiuterio pelytę bei VGTU studentų ir dėstytojų sukurtą internetinę ekspertinę sistemą, duodančią patarimus darbuotojų našumui didinti. Darbe apibendrintai aprašomas Lietuvos ūkio darbo našumas, jo pasikeitimai per pastaruosius metus, bei veiksniai, turintys didžiausią įtaką darbo našumui. Taip pat darbe aprašomos biometrinės technologijos, apžvelgiamas jų panaudojimas nekilnojamojo turto sektoriuje ir galimybė jas pritaik
APA, Harvard, Vancouver, ISO, and other styles
50

LAUDATO, Gennaro. "Innovative information systems to monitor biomedical parameters during high demanding tasks." Doctoral thesis, Università degli studi del Molise, 2021. http://hdl.handle.net/11695/100496.

Full text
Abstract:
The objective of this PhD project is, as its research core, the application of Machine Learning techniques and Big Data analytics to monitor, in a non-invasive way, vital parameters of individuals engaged in tasks that require a high psychophysical effort. The industrial partners of this project are Formula Medicine (as Italian industrial partner with advisor Dr. Riccardo Ceccarelli) and AOTech (foreign industrial partner with advisor mr. Sebastien Philippe). Formula Medicine is a sports medicine center able to offer medical assistance and training programs both physical and mental. Its str
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!