Literatura científica selecionada sobre o tema "Biometrisk Data"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Biometrisk Data".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Biometrisk Data":

1

Alam*, Varisha, e Dr Mohammad Arif. "Classification of Large Biometric Data in Database System". International Journal of Innovative Technology and Exploring Engineering 10, n.º 10 (30 de agosto de 2021): 1–8. http://dx.doi.org/10.35940/ijitee.d8592.08101021.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
"Biometrics" is got from the Greek word 'life' and 'measure' which implies living and evaluation take apart. It simply converts into "life estimation". Biometrics uses computerized acknowledgment of people, dependent on their social and natural attributes. Biometric character are data separated from biometric tests, which can use for examination with a biometric orientation. Biometrics involves techniques to unusually recognize people dependent on at least one inherent physical or behavior attribute. In software engineering, specifically, biometric is used as a form of character retrieve the Committee and retrieve command. Biometric identically utilized to recognize people in bunches that are in observation. Biometric has quickly risen like a auspicious innovation for validation and has effectively discovered a spot in most of the scientific safety regions. An effective bunching method suggest for dividing enormous biometrics data set through recognizable proof. This method depends on the changed B+ tree is decreasing the discs get to. It diminishes the information recovery time and also possible error rates. Hence, for bigger applications, the need to reduce the data set to a more adequate portion emerges to accomplish both higher paces and further developed precision. The main motivation behind ordering is to recover a small data set for looking through the inquiry
2

Chinyemba, Melissa K., e Jackson Phiri. "Gaps in the Management and Use of Biometric Data: A Case of Zambian Public and Private Institutions". Zambia ICT Journal 2, n.º 1 (29 de junho de 2018): 35–43. http://dx.doi.org/10.33260/zictjournal.v2i1.49.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The current physical and cybersecurity systems rely on traditional three-factor authentication to mitigate the threats posed by insider attacks. Key is the use of biometric information. Biometrics are a unique measurement and analysis of the unique physiological special traits such as voice, eye structure and others that can be used in the discipline of varying person identification. Biometry, which is the analysis of these biometrics is a complex process but guarantees identification and non-repudiation. If used to identify humans then several issues such as where is the biometric data stored? Who has access to it? And how does one ensure that such data satisfies the principle of availability. To achieve availability, secure transportation arises. To achieve transportation, non-repudiation, confidentiality and authentication, integrity arise. A storage and transport system is recommended to these challenges. In this paper, we explore the gaps into how public and private institution store and manage biometrics information. We benchmarked each organization again the ISO 30107 and ISO 24745. Our results show that while most companies are adopting and using biometrics systems, few have adopted the ISO biometrics standards that govern the storage and management of biometric information and hence creating security risk.
3

Rassolov, I. M., S. G. Chubukova e I. V. Mikurova. "Biometrics in the Context of Personal Data and Genetic Information: Legal Issues". Lex Russica, n.º 1 (1 de janeiro de 2019): 108–18. http://dx.doi.org/10.17803/1729-5920.2019.146.1.108-118.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
In modern society, methods of identification of persons on the basis of their physical, biological or behavioral characteristics are actively developing. European countries are in the process of developing a holistic doctrine on biometric control and are clarifying their position on situations where biometric data are used by individuals.From the position of information law, the paper presents a new author’s approach to the problem of processing biometric data and genetic information. The division of biometrics into “trace” and “non-trace” is losing its meaning. A new classification of biometrics into digital and analog is proposed.Biometric access control should not become a routine phenomenon in the framework of the organization of the company and without any reason to replace other existing types of control. The interested person can be entrusted with the storage of their own biometric data to reduce the risks of leakage and the consequences of exposure to them. Biometric data must be stored on the company’s servers in encrypted form, which makes it impossible to use them without the consent of the person concerned.Biometric data should be protected by a special legal regime. The analysis of the European and Russian legislation made it possible to draw the following conclusions: biometric data is a special type of personal data, a special legal regime and regulation should be established; digital biometrics needs special legal regulation, since it is the most vulnerable type; genetic information does not fully correspond to the concept of personal data, as it can relate to an unlimited number of persons. This determines the need to develop a special law “on genetic information”.
4

Bok, Jin Yeong, Kun Ha Suh e Eui Chul Lee. "Detecting Fake Finger-Vein Data Using Remote Photoplethysmography". Electronics 8, n.º 9 (11 de setembro de 2019): 1016. http://dx.doi.org/10.3390/electronics8091016.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Today, biometrics is being widely used in various fields. Finger-vein is a type of biometric information and is based on finger-vein patterns unique to each individual. Various spoofing attacks have recently become a threat to biometric systems. A spoofing attack is defined as an unauthorized user attempting to deceive a system by presenting fake samples of registered biometric information. Generally, finger-vein recognition, using blood vessel characteristics inside the skin, is known to be more difficult when producing counterfeit samples than other biometrics, but several spoofing attacks have still been reported. To prevent spoofing attacks, conventional finger-vein recognition systems mainly use the difference in texture information between real and fake images, but such information may appear different depending on the camera. Therefore, we propose a method that can detect forged finger-vein independently of a camera by using remote photoplethysmography. Our main idea is to get the vital sign of arterial blood flow, a biometric measure indicating life. In this paper, we selected the frequency spectrum of time domain signal obtained from a video, as the feature, and then classified data as real or fake using the support vector machine classifier. Consequently, the accuracy of the experimental result was about 96.46%.
5

S. Raju, A., e V. Udayashankara. "A Survey on Unimodal, Multimodal Biometrics and Its Fusion Techniques". International Journal of Engineering & Technology 7, n.º 4.36 (9 de dezembro de 2018): 689. http://dx.doi.org/10.14419/ijet.v7i4.36.24224.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Presently, a variety of biometric modalities are applied to perform human identification or user verification. Unimodal biometric systems (UBS) is a technique which guarantees authentication information by processing distinctive characteristic sequences and these are fetched out from individuals. However, the performance of unimodal biometric systems restricted in terms of susceptibility to spoof attacks, non-universality, large intra-user variations, and noise in sensed data. The Multimodal biometric systems defeat various limitations of unimodal biometric systems as the sources of different biometrics typically compensate for the inherent limitations of one another. The objective of this article is to analyze various methods of information fusion for biometrics, and summarize, to conclude with direction on future research proficiency in a multimodal biometric system using ECG, Fingerprint and Face features. This paper is furnished as a ready reckoner for those researchers, who wish to persue their work in the area of biometrics.
6

Vala, Mr Manish, Kajal Patel e Harsh Lad. "Multi Model Biometrics Data Retrieval Through: Big-Data". International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (31 de outubro de 2018): 1273–77. http://dx.doi.org/10.31142/ijtsrd15933.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Ivanov, Alexander, e Alexeiy Sulavko. "Draft of the Third National Standard of Russia for Fast Automatic Learning of Large Correlation Neural Networks on Small Training Samples of Biometric Data". Voprosy kiberbezopasnosti, n.º 3(43) (2021): 84–93. http://dx.doi.org/10.21681/2311-3456-2021-3-84-93.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The aim of the study is to show that a biometrics-to-access code converter based on large networks of correlation neurons makes it possible to obtain an even longer key at the output while ensuring the protection of biometric data from compromise. The research method is the use of large «wide» neural networks with automatic learning for the implementation of the biometric authentication procedure, ensuring the protection of biometric personal data from compromise. Results of the study - the first national standard GOST R 52633.5 for the automatic training of neuron networks was focused only on a physically secure, trusted computing environment. The protection of the parameters of the trained neural network converters biometrics-code using cryptographic methods led to the need to use short keys and passwords for biometric-cryptographic authentication. It is proposed to build special correlation neurons in the meta-space of Bayes-Minkowski features of a higher dimension. An experiment was carried out to verify the patterns of kkeystroke dynamics using a biometrics-to-code converter based on the data set of the AIConstructor project. In the meta-space of features, the probability of a verification error turned out to be less (EER = 0.0823) than in the original space of features (EER = 0.0864), while in the protected execution mode of the biometrics-to-code converter, the key length can be increased by more than 19 times. Experiments have shown that the transition to the mat space of BayesMinkowski features does not lead to the manifestation of the “curse of dimension” problem if some of the original features have a noticeable or strong mutual correlation. The problem of ensuring the confidentiality of the parameters of trained neural network containers, from which the neural network converter biometrics-code is formed, is relevant not only for biometric authentication tasks. It seems possible to develop a standard for protecting artificial intelligence based on automatically trained networks of Bayesian-Minkowski correlation neurons.
8

Lakhera, Manmohan, e Manmohan Singh Rauthan. "Securing Stored Biometric Template Using Cryptographic Algorithm". International Journal of Rough Sets and Data Analysis 5, n.º 4 (outubro de 2018): 48–60. http://dx.doi.org/10.4018/ijrsda.2018100103.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The biometric template protection technique provides the security in many authentication applications. Authentication based on biometrics has more advantages over traditional methods such as password and token-based authentication methods. The advantage of any biometric-based authentication system over a traditional one is that the person must physically be present at that place while recognizing him. So, it is essential to secure these biometrics by combining these with cryptography. In the proposed algorithm, the AES algorithm is used for securing the stored and transmitted biometric templates using helping data. The helping data is a variable type of data which is changed at every attempt for registration. The final symmetric key AES algorithm is a combination of helping data and actual symmetric keys of the AES algorithm. The experimental analysis shows that a brute force attack takes a long time to recover the original biometric template from cipher biometric template. So, the proposed technique provides sufficient security to stored biometric templates.
9

Jovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic e Dejan Simic. "Extending identity management system with multimodal biometric authentication". Computer Science and Information Systems 13, n.º 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digital identity management and MMBio framework for multimodal biometrics. Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data. Developed prototype confirms possible integration of identity management and multimodal biometric systems.
10

Sridevi, T., P. Mallikarjuna Rao e P. V. Ramaraju. "Wireless sensor data mining for e-commerce applications". Indonesian Journal of Electrical Engineering and Computer Science 14, n.º 1 (25 de dezembro de 2018): 462. http://dx.doi.org/10.11591/ijeecs.v14.i1.pp462-470.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Information hiding is the most important criteria today in several sectors, due to security issues. Mostly for the security applications used in Finance & banking sectors, hiding the information about users and their transactions are necessary at present from the hackers in all high security zones. In this consequence biometrics is progressively considered as foundation component for an extensive array of personal authentication solutions, both at the national level (E.g. India UIDAI) and the smaller-scale (E.g. banking ATMs, school lunch payment systems). Biometric fraud is also an area of increasing concern, as the number of deployed biometric systems increases and fraudsters become aware of the potential to compromise them. Organizations are increasingly deploying process and technology solutions to stay one step ahead. At present Bankers are using different single Biometric Modalities for different services. All Biometric features are not suitable, for all services because of various artifacts while extracting features from the sensors due to background noise, lighting conditions, ease of access etc. This paper proposes a multi model system that will show a onetime single solution to meet all their security problems. This paper particularly handles how to incorporate cryptography and steganography in biometric applications.

Teses / dissertações sobre o assunto "Biometrisk Data":

1

Nytorpe, Piledahl Staffan, e Daniel Dahlberg. "Detektering av stress från biometrisk data i realtid". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31248.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
At the time of writing, stress and stress related disease have become the most common reasons for absence in the workplace in Sweden. The purpose of the work presented here is to identify and notify people managing unhealthy levels of stress. Since symptoms of mental stress manifest through functions of the Sympathetic Nervous System (SNS), they are best measured through monitoring of SNS changes and phenomena. In this study, changes in the sympathetic control of heart rate were recorded and analyzed using heart rate variability analysis and a simple runner’s heart rate sensor connected to a smartphone. Mental stress data was collected through stressful video gaming. This was compared to data from non-stressful activities, physical activity and extremely stressful activities such as public speaking events. By using the period between heartbeats and selecting features from the frequency domain, a simple machine learning algorithm could differentiate between the types of data and thus could effectively recognize mental stress. The study resulted in a collection of 100 data points, an algorithm to extract features and an application to continuously collect and classify sequences of heart periods. It also revealed an interesting relationship in the data between different subjects. The fact that continuous stress monitoring can be achieved using minimally intrusive sensors is the greatest benefit of these results, especially when connsidering its potential value in the identification and prevention of stress related disease.
2

Madsen, Angelica, e Carl Nymanson. "Bör du v(AR)a rädd för framtiden? : En studie om The Privacy Paradox och potentiella integritetsrisker med Augmented Reality". Thesis, Malmö universitet, Malmö högskola, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43868.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
I en tid där digitaliseringen är mer utbredd än någonsin ökar också mängden data som samlas och delas online. I takt med att nya tekniker utvecklas öppnas det upp för nya utmaningar för integritetsfrågor. En aktiv användare online ägnar sig med största sannolikhet också åt ett eller flera sociala medier, där ändamålen ofta innebär att dela med sig av information till andra. Eftersom tekniken Augmented Reality används mer frekvent i några av de största sociala medieapplikationerna blev studiens syfte att undersöka potentiella integritetsproblem med Augmented Reality. Studiens tillvägagångssätt har bestått av en empirisk datainsamling för att skapa ett teoretiskt ramverk för studien. Utifrån detta har det genomförts en digital enkät samt intervjuer för att närmare undersöka användarens beteende online och The Privacy Paradox. Utifrån undersökningens resultat kunde The Privacy Paradox bekräftas och ge en bättre förståelse för hur användaren agerar genom digitala kanaler. I studien behandlas olika aspekter kring integritetsfrågor såsom användarvillkor, sekretessavtal, datamäklare, framtida konsekvenser och vad tekniken möjliggör. Studien kommer fram till att användare, företaget och dagens teknik tillåter att en känsligare information kan utvinnas genom ett dataintrång. Även om det ännu inte har inträffat ett dataintrång som grundat sig i Augmented Reality före denna studie, finns det en risk att det endast handlar om en tidsfråga innan detta sker.
In a time when digitalization is more widespread than ever, the amount of data collected and shared is increasing. As new technologies develop, challenges for privacy concerns arises. An active online user is likely to engage in one or many social media platforms, where the purpose often involves sharing information with others. Since Augmented Reality is more frequently supported in some of the biggest social media applications, the purpose of this study was to investigate potential privacy concerns with Augmented Reality. The study’s approach consisted of an empirical data collection to create a theoretical framework for the study. Based on this, a digital survey and interviews were conducted to further investigate the user's behavior online and The Privacy Paradox. Based on the results of the survey, The Privacy Paradox could be confirmed and a better understanding of how the user interacts through digital channels was achieved. The study treats different aspects of privacy concerns such as user terms, privacy policies, data brokers, future consequences and what technology enables. The study reached the conclusion that users, businesses and today's technology allow a more sensitive type of information to be collected through a data breach. Even if there has not yet occurred a data breach enabled by Augmented Reality prior to this study, there is a risk that it is only a matter of time until this happens.
3

Pisani, Paulo Henrique. "Biometrics in a data stream context". Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08052017-141153/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The growing presence of the Internet in day-to-day tasks, along with the evolution of computational systems, contributed to increase data exposure. This scenario highlights the need for safer user authentication systems. An alternative to deal with this is by the use of biometric systems. However, biometric features may change over time, an issue that can affect the recognition performance due to an outdated biometric reference. This effect can be called as template ageing in the area of biometrics and as concept drift in machine learning. It raises the need to automatically adapt the biometric reference over time, a task performed by adaptive biometric systems. This thesis studied adaptive biometric systems considering biometrics in a data stream context. In this context, the test is performed on a biometric data stream, in which the query samples are presented one after another to the biometric system. An adaptive biometric system then has to classify each query and adapt the biometric reference. The decision to perform the adaptation is taken by the biometric system. Among the biometric modalities, this thesis focused on behavioural biometrics, particularly on keystroke dynamics and on accelerometer biometrics. Behavioural modalities tend to be subject to faster changes over time than physical modalities. Nevertheless, there were few studies dealing with adaptive biometric systems for behavioural modalities, highlighting a gap to be explored. Throughout the thesis, several aspects to enhance the design of adaptive biometric systems for behavioural modalities in a data stream context were discussed: proposal of adaptation strategies for the immune-based classification algorithm Self-Detector, combination of genuine and impostor models in the Enhanced Template Update framework and application of score normalization to adaptive biometric systems. Based on the investigation of these aspects, it was observed that the best choice for each studied aspect of the adaptive biometric systems can be different depending on the dataset and, furthermore, depending on the users in the dataset. The different user characteristics, including the way that the biometric features change over time, suggests that adaptation strategies should be chosen per user. This motivated the proposal of a modular adaptive biometric system, named ModBioS, which can choose each of these aspects per user. ModBioS is capable of generalizing several baselines and proposals into a single modular framework, along with the possibility of assigning different adaptation strategies per user. Experimental results showed that the modular adaptive biometric system can outperform several baseline systems, while opening a number of new opportunities for future work.
A crescente presença da Internet nas tarefas do dia a dia, juntamente com a evolução dos sistemas computacionais, contribuiu para aumentar a exposição dos dados. Esse cenário evidencia a necessidade de sistemas de autenticação de usuários mais seguros. Uma alternativa para lidar com isso é pelo uso de sistemas biométricos. Contudo, características biométricas podem mudar com o tempo, o que pode afetar o desempenho de reconhecimento devido a uma referência biométrica desatualizada. Esse efeito pode ser chamado de template ageing na área de sistemas biométricos adaptativos ou de mudança de conceito em aprendizado de máquina. Isso levanta a necessidade de adaptar automaticamente a referência biométrica com o tempo, uma tarefa executada por sistemas biométricos adaptativos. Esta tese estudou sistemas biométricos adaptativos considerando biometria em um contexto de fluxo de dados. Neste contexto, o teste é executado em um fluxo de dados biométrico, em que as amostras de consulta são apresentadas uma após a outra para o sistema biométrico. Um sistema biométrico adaptativo deve então classificar cada consulta e adaptar a referência biométrica. A decisão de executar a adaptação é tomada pelo sistema biométrico. Dentre as modalidades biométricas, esta tese foca em biometria comportamental, em particular em dinâmica da digitação e em biometria por acelerômetro. Modalidades comportamentais tendem a ser sujeitas a mudanças mais rápidas do que modalidades físicas. Entretanto, havia poucos estudos lidando com sistemas biométricos adaptativos para modalidades comportamentais, destacando uma lacuna para ser explorada. Ao longo da tese, diversos aspectos para aprimorar o projeto de sistemas biométricos adaptativos para modalidades comportamentais em um contexto de fluxo de dados foram discutidos: proposta de estratégias de adaptação para o algoritmo de classificação imunológico Self-Detector, combinação de modelos genuíno e impostor no framework do Enhanced Template Update e aplicação de normalização de scores em sistemas biométricos adaptativos. Com base na investigação desses aspectos, foi observado que a melhor escolha para cada aspecto estudado dos sistemas biométricos adaptativos pode ser diferente dependendo do conjunto de dados e, além disso, dependendo dos usuários no conjunto de dados. As diferentes características dos usuários, incluindo a forma como as características biométricas mudam com o tempo, sugerem que as estratégias de adaptação deveriam ser escolhidas por usuário. Isso motivou a proposta de um sistema biométrico adaptativo modular, chamado ModBioS, que pode escolher cada um desses aspectos por usuário. O ModBioS é capaz de generalizar diversos sistemas baseline e propostas apresentadas nesta tese em um framework modular, juntamente com a possibilidade de atribuir estratégias de adaptação diferentes por usuário. Resultados experimentais mostraram que o sistema biométrico adaptativo modular pode superar diversos sistemas baseline, enquanto que abre um grande número de oportunidades para trabalhos futuros.
4

McNulty, Peggy Sue. "Values issues in biometric data collection". Connect to Electronic Thesis (CONTENTdm), 2009. http://worldcat.org/oclc/525070842/viewonline.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Brobeck, Stefan, e Tobias Folkman. "Biometrics : Attitudes and factors influencing a breakthrough in Sweden". Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-148.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:

Biometrics is a collection of methods for identifying and authorizing individuals with something they are, or do. It is considered to be one of the most secure technologies for security, both physical and logical. Security is something very important for organizations today, but yet there has been a low interest in investing in biometrics for security in Sweden.

The purpose of this thesis has been to establish factors to why biometrics has not been implementedto any large extent, even though the technology has been around for long. We have evaluated the attitudes and views of individuals, as well as company leaders. Problem and questions with biometrics that often are discussed are privacy concerns, costs and ROI (return on investment) and user acceptance. Foremost there is a concern about the costs of implementing such a solution, although some claim that money can be saved by avoiding the costs in more traditional security methods, such as password administration and in security cards.

There is a range of different technologies to use, such as facial-scan, voice-scan and the most mature and well known technique, finger-scan which has been around for a long time, especially for identifying criminals. All these techniques have there positive and negative sides, often measured in different levels of universality, uniqueness, permanence and collectability, e.g. eye-scan has a high uniqueness, facial-scan has a high universability and signature-scan has a low permanence level.

We have collected our data through interviews with companies and suppliers of biometric systems as well as a questionnaire given to private persons. By interpreting the data in a qualitative way we have made our analysis and reached a conclusion.

Our result shows that a cost related to biometric solutions is the largest reason why investments have been absent. This verifies the results of other authors, that the cost is the largest obstacle. Another important factor is that companies believe that biometrics is for organizations with a very high security need. Further our result show that individuals are positive towards biometrics.


Biometri är ett samlingsnamn för tekniker som identifierar och auktoriserar individer, antingen något de är eller gör. Biometri anses vara en av de säkraste teknologierna för säkerhet, både fysisk och logisk. Säkerhet är något som är mycket viktigt för organisationer i dagens läge, men än så länge så har investeringar i biometriska säkerhetslösningar i Sverige uteblivit. Syftet med denna magisteruppsats har varit att fastställa faktorer som bidrar till att biometriska lösningar inte har blivit implementerade i någon större utsträckning, trots att teknologin har funnits länge. Vi har utvärderat individers samt företagsledares attityder och synsätt angående biometri.

Frågor och problem som ofta relateras till biometri är personligintegritet, kostnader och avkastning på investering samt användaracceptans. Framförallt är det osäkerheten kring kostnaderna av en implementering av en biometrisklösning. Det finns även de som hävdar att biometriska lösningar kan spara pengar jämfört med traditionella system därför att man undviker till exempel lösenordsadministration och passerkort.

Det finns en rad olika tekniker att använda, exempelvis ansiktsavläsning, röstigenkänning och den mest mogna och kända tekniken, fingeravtrycksläsning som har existerat en längre tid, framförallt för att identifiera kriminella. Det finns positiva och negativa sidor med alla dessa tekniker, de mäts oftast i olika nivåer av hur många som kan använda det, hur unikt biometrin är, beständighet och hur biometrin samlas in.

Genom intervjuer med företag och leverantörer av biometriska lösningar samt en utdelad enkät till privat personer har vi samlat in data. Vi har sedan tolkat data kvalitativt och utfört vår analys och slutligen kommit fram till ett resultat.

Vårt resultat har visat att kostnader relaterade till biometriska system är det största skälet till varför investeringar har uteblivit. Detta bekräftar vad många andra författare tidigare har funnit, att kostnaderna är det största hindret. En annan viktig faktor är att företag anser att biometri är något för verksamheter som kräver den allra högsta säkerheten. Vidare har individer en positiv inställning till biometri.

6

Ugail, Hassan, e Eyad Elyan. "Efficient 3D data representation for biometric applications". IOS Press, 2007. http://hdl.handle.net/10454/2683.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Yes
An important issue in many of today's biometric applications is the development of efficient and accurate techniques for representing related 3D data. Such data is often available through the process of digitization of complex geometric objects which are of importance to biometric applications. For example, in the area of 3D face recognition a digital point cloud of data corresponding to a given face is usually provided by a 3D digital scanner. For efficient data storage and for identification/authentication in a timely fashion such data requires to be represented using a few parameters or variables which are meaningful. Here we show how mathematical techniques based on Partial Differential Equations (PDEs) can be utilized to represent complex 3D data where the data can be parameterized in an efficient way. For example, in the case of a 3D face we show how it can be represented using PDEs whereby a handful of key facial parameters can be identified for efficient storage and verification.
7

Lam, Lawrence G. "Digital Health-Data platforms : biometric data aggregation and their potential impact to centralize Digital Health-Data". Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106235.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (page 81).
Digital Health-Data is being collected at unprecedented rates today as biometric micro sensors continue to diffuse into our lives in the form of smart devices, wearables, and even clothing. From this data, we hope to learn more about preventative health so that we can spend less money on the doctor. To help users aggregate this perpetual growth of biometric "big" data, Apple HealthKit, Google Fit, and Samsung SAMI were each created with the hope of becoming the dominant design platform for Digital Health-Data. The research for this paper consists of citings from technology strategy literature and relevant journalism articles regarding recent and past developments that pertain to the wearables market and the digitization movement of electronic health records (EHR) and protected health information (PHI) along with their rules and regulations. The culmination of these citations will contribute to my hypothesis where the analysis will attempt to support my recommendations for Apple, Google, and Samsung. The ending chapters will encompass discussions around network effects and costs associated with multi-homing user data across multiple platforms and finally ending with my conclusion based on my hypothesis.
by Lawrence G. Lam.
S.M. in Engineering and Management
8

Jašková, Jitka. "Zpracování osobních údajů v rámci EU se zřetelem na policejní a justiční spolupráci". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-18247.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The thesis deals with the approach level, meaning, purpose and benefit of personal data protection in their processing within police and judicial cooperation in the EU. In the introduction the fundamental issues of personal data protection in the context of the EU and the Czech republic are defined, focusing on terminology and explanations of current issues, particularly the area of biometric data and data retention. Extra attention is also given to the conflict of the right to privacy, and the related right to personal data protection and protection of public interests and safety. After that the thesis deals with a performing of police and judicial cooperation in the EU through specific subjects, in particular Europol and Eurojust. The final part of the thesis focuses on the practical implementation of personal data protection in police and judicial cooperation in the EU, and secondly the importance of personal data protection in police and judicial cooperation, as a deduced basic human right, and the difficulties with which the personal data protection in police and judicial cooperation in the EU are joined. The final part of this thesis consider the main sections in which we can find area for adjustment towards more effective police and judicial cooperation in the EU, with full respect for the right to personal data protection.
9

Stevenson, Brady Roos. "Analysis of Near-Infrared Phase Effects on Biometric Iris Data". BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1299.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The purpose of this research is to ascertain potential iris scan data variations from near infrared waves derived from fluorescent illumination. Prior studies of iris data variances from infrared wave interference of halogen, incandescent, and sunlight with iris cameras suggest that similar changes may exist under near infrared wavelengths from fluorescent light. The concern is that the fluorescent energy emission may interfere with the near infrared detection of an iris camera. An iris camera is used to measure human eye characteristics known as biometrics. If such infrared emission is statistically significant, then it can alter the validity of the iris scan data. The experiment utilized nine hundred forty-five (945) scans from sixty-three (63) subjects. Measured results showed increased heat from ambient fluorescent illumination does not statistically alter the biometric readings of human eyes. The test results fail to reject that data loss will not occur as heat is increased in the ambient fluorescent light source.
10

Khanna, Tania. "Low power data acquisition for microImplant biometric monitoring of tremors". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78448.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 97-100).
In recent years, trends in the medical industry have created a growing demand for implantable medical devices. In particular, the need to provide doctors a means to continuously monitor biometrics over long time scales with increased precision is paramount to efficient healthcare. To make medical implants more attractive, there is a need to reduce their size and power consumption. Small medical implants would allow for less invasive procedures, greater comfort for patients, and increased patient compliance. Reductions in power consumption translate to longer battery life. The two primary limitations to the size of small medical implants are the batteries that provide energy to circuit and sensor components and the antennas that enable wireless communication to terminals outside of the body. The theory is applied in the context of the long term monitoring of Parkinson's tremors. This work investigates how to reduce the amount of data needing to acquire a signal by applying compressive sampling thereby alleviating the demand on the energy source. A low energy SAR ADC is designed using adiabatic charging to further reduce energy usage. This application is ideal for adiabatic techniques because of the low frequency of operation and the ease with which we can reclaim energy from discharging the capacitors. Keywords: SAR ADC, adiabatic, compressive sampling, biometric, implants
by Tania Khanna.
Ph.D.

Livros sobre o assunto "Biometrisk Data":

1

Dunstone, Ted, e Neil Yager, eds. Biometric System and Data Analysis. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-77627-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Li, Stan Z. Encyclopedia of Biometrics. Boston, MA: Springer US, 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Conti, Massimo, Natividad Martínez Madrid, Ralf Seepold e Simone Orcioni, eds. Mobile Networks for Biometric Data Analysis. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39700-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

D, Woodward John. Biometrics. New York: McGraw-Hill/Osborne, 2003.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Jain, Anil K. Introduction to Biometrics. Boston, MA: Springer Science+Business Media, LLC, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Shoniregun, Charles A. Securing biometrics applications. London: Springer, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Dunstone, Ted. Biometric system and data analysis: Design, evaluation, and data mining. New York: Springer, 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Traore, Issa. Continuous authentication using biometrics: Data, models, and metrics. Hershey, PA: Information Science Reference, 2012.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kindt, Els J. Privacy and Data Protection Issues of Biometric Applications. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-7522-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Levush, Ruth. Biometric data retention for passport applicants and holders. Washington, D.C.]: The Law Library of Congress, Global Legal Research Center, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Biometrisk Data":

1

Skågeby, Jörgen. "Biometrics". In Encyclopedia of Big Data, 1–2. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_26-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Wingard, Melissa. "Bolstering Biometric Data". In Digital Transformation in a Post-COVID World, 245–62. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003148715-13.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Ashbourn, Julian. "Aligning Biometrics with Data". In Guide to Biometrics for Large-Scale Systems, 113–25. London: Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-467-8_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Kevenaar, Tom. "Protection of Biometric Information". In Security with Noisy Data, 169–93. London: Springer London, 2007. http://dx.doi.org/10.1007/978-1-84628-984-2_11.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Kwon, Young-Bin, e Byoung-Jin Han. "DNA Data Format Standardization". In Encyclopedia of Biometrics, 356–61. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_9046.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Kwon, Young-Bin, e Byoung-Jin Han. "DNA Data Format Standardization". In Encyclopedia of Biometrics, 1–7. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_9046-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Balakirsky, Vladimir B., Anahit R. Ghazaryan e A. J. Han Vinck. "Constructing Passwords from Biometrical Data". In Advances in Biometrics, 889–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_90.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Soh, Jung, Farzin Deravi, Alessandro Triglia e Alex Bazin. "Multibiometrics and Data Fusion, Standardization". In Encyclopedia of Biometrics, 973–80. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_229.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Busch, Christoph, e Greg Canon. "Biometric Data Interchange Format, Standardization". In Encyclopedia of Biometrics, 81–86. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_235.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Sanchez-Reillo, Raul, e Robert Mueller. "Finger Data Interchange Format, Standardization". In Encyclopedia of Biometrics, 409–16. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_236.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Biometrisk Data":

1

Pilepić Stifanich, Ljubica. "TRENDOVI U BIOMETRIJI: METODA AUTENTIFIKACIJE I PRIMJERI KORIŠTENJA U TURIZMU I HOTELIJERSTVU". In 4th International Scientific Conference – EMAN 2020 – Economics and Management: How to Cope With Disrupted Times. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/eman.2020.411.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Cilj ovoga rada je istražiti jednu relativno mladu tehnologiju, koja će po svim pokazateljima postati temelj svih sigurnosnih aplikacija u svijetu u budućnosti. Budući da živimo u brzorastućem, informacijskom i digitalnom dobu gdje se svakoga dana razvijaju nove tehnologije, prikazati će se i detaljno analizirati neke biometrijske metode i tehnike koje su danas u upotrebi s posebnim naglaskom na sektor turizma i hotelijerstva. Radi se o primjeni sustava za identifikaciju lica u turizmu s posebnim osvrtom na biometrijsku provjeru putnika u zračnim lukama, mogućnostima biometrijskog plaćanja otiskom prsta, efikasnijem upravljanju osobljem u području vođenja evidencije radnog vremena i kontroli pristupa. Biometrijska tehnologija tom sektoru nudi mogućnost da se izdigne iznad tradicionalnih koncepata u poboljšanju sigurnosti i cjelokupnog iskustva gostiju. Hoteli na taj način mogu poboljšati sustav upravljanja, a gostima se nudi najviši nivo komfora i pogodnosti. U radu se istražuju mogućnosti, snage i slabosti biometrije te utjecaj biometrije na čovjeka koji je u izravnoj interakciji s njom. Koliko su zapravo pouzdani biometrijski sustavi, štite li našu privatnost i ljudska prava samo su neka od pitanja na koja ovaj rad pokušava iznaći odgovore.
2

De A. S. M., Juliana, e Márjory Da Costa-Abreu. "An evaluation of a three-modal hand-based database to forensic-based gender recognition". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13989.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
In recent years, behavioural soft-biometrics have been widely used to improve biometric systems performance. Information like gender, age and ethnicity can be obtained from more than one behavioural modality. In this paper, we propose a multimodal hand-based behavioural database for gender recognition. Thus, our goal in this paper is to evaluate the performance of the multimodal database. For this, the experiment was realised with 76 users and was collected keyboard dynamics, touchscreen dynamics and handwritten signature data. Our approach consists of compare two-modal and one-modal modalities of the biometric data with the multimodal database. Traditional and new classifiers were used and the statistical Kruskal-Wallis to analyse the accuracy of the databases. The results showed that the multimodal database outperforms the other databases.
3

Pisani, Paulo Henrique, e André C. P. L. F. De Carvalho. "Biometrics in a data stream context". In XXXI Concurso de Teses e Dissertações da SBC. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/ctd.2018.3650.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Biometric systems can provide safer authentication. However, biometric features may change over time, impacting the recognition performance due to outdated biometric references. It raises the need to automatically adapt the references over time, by using adaptive biometric systems. This thesis studied several aspects of adaptive biometric systems in a data stream context. Based on this investigation, it was observed that the best choice for each aspect can be user dependent. This motivated the proposal of a modular adaptive biometric system, which can select a different configuration for each user. It also generalizes several baselines and proposals into a single modular framework, while opening numerous opportunities for future work.
4

Костенко, О. В. "ІДЕНТИФІКАЦІЙНІ ДАНІ: ПРАВОВІ МЕХАНІЗМИ РОЗРОБКИ КЛАСИФІКАТОРІВ". In Proceedings of the XXVI International Scientific and Practical Conference. RS Global Sp. z O.O., 2021. http://dx.doi.org/10.31435/rsglobal_conf/25022021/7418.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Modern society has entered into a full-scale implementation of the scientific and technological revolution 4.0 and economic globalization. One of the driving forces of the new scientific and technological revolution is the development of information and communication technologies and the introduction of technologies for the transmission and use of information. Today, the problem of legal support for the management of the confidentiality of data used to identify subjects and objects by their unique attributes is relevant. The degree of solving the problem of managing the processes of digital identification data is one of the main factors in the modern development of crossborder e-economy and trade. There is a situation when in Ukraine in all spheres of public life modern information and communication technologies are rapidly introduced in the actual absence of legal institutions for the management of identification and personal data, biometrics, IoT devices and artificial intelligence. A significant complication for the development and operation of identification data management systems is the lack of a single strategy in this area, socio-legal model of public relations, a single classifier of identification data and a single scheme of identification of subjects by identification data, mechanisms for legal rights and responsibilities. projects, legal procedures for biometric identification, methods of identification of IoT devices and artificial intelligence.
5

Kanade, Sanjay, Dijana Petrovska-Delacretaz e Bernadette Dorizzi. "Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data". In 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPR Workshops). IEEE, 2009. http://dx.doi.org/10.1109/cvpr.2009.5206646.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Kanade, S., D. Petrovska-Delacretaz e B. Dorizzi. "Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data". In 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2009. http://dx.doi.org/10.1109/cvprw.2009.5206646.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Yampolskiy, Roman V., e Venu Govindaraju. "Generation of artificial biometric data enhanced with contextual information for game strategy-based behavioral biometrics". In SPIE Defense and Security Symposium, editado por B. V. K. Vijaya Kumar, Salil Prabhakar e Arun A. Ross. SPIE, 2008. http://dx.doi.org/10.1117/12.774388.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Shejul, Anjali A., e U. L. Kulkarni. "A DWT Based Approach for Steganography Using Biometrics". In 2010 International Conference on Data Storage and Data Engineering (DSDE). IEEE, 2010. http://dx.doi.org/10.1109/dsde.2010.10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Vielhauer, Claus, e Ton Kalker. "Security for biometric data". In Electronic Imaging 2004, editado por Edward J. Delp III e Ping W. Wong. SPIE, 2004. http://dx.doi.org/10.1117/12.528261.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Kohlwey, Edmund, Abel Sussman, Jason Trost e Amber Maurer. "Leveraging the Cloud for Big Data Biometrics: Meeting the Performance Requirements of the Next Generation Biometric Systems". In 2011 IEEE World Congress on Services (SERVICES). IEEE, 2011. http://dx.doi.org/10.1109/services.2011.95.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Biometrisk Data":

1

Wilson, C. L., P. J. Grother e R. Chandramouli. Biometric data specification for personal identity verification. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-76.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Wilson, C. L., P. J. Grother e R. Chandramouli. Biometric data specification for personal identity verification. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-76-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Podio, Fernando L., Dylan Yaga e Christofer J. McGinnis. BioCTS 2012: Advanced Conformance Test Architectures and Test Suites for Biometric Data Interchange Formats and Biometric Information Records. Gaithersburg, MD: National Institute of Standards and Technology, setembro de 2012. http://dx.doi.org/10.6028/nist.ir.7877.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Podio, Fernando L., Dylan Yaga e Mark Jerde. Conformance test architecture for biometric data interchange formats - version beta 2.0. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7771.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Bossuroy, Thomas, Clara Delavallade e Vincent Pons. Biometric Tracking, Healthcare Provision, and Data Quality: Experimental Evidence from Tuberculosis Control. Cambridge, MA: National Bureau of Economic Research, outubro de 2019. http://dx.doi.org/10.3386/w26388.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Wu, Jin Chu, e Charles L. Wilson. Using Chebyshev's inequality to determine sample size in biometric evaluation of fingerprint data. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.ir.7273.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Cheng, Su Lan, Ross J. Micheals e Z. Q. John Lu. Comparison of confidence intervals for large operational biometric data by parametric and non-parametric methods. Gaithersburg, MD: National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7740.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Newton, Elaine, Gerry Coleman e Patrice Yuh. Information systems-data format for the interchange of fingerprint, facial, & other biometric information- part 2 :. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.500-275.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Podio, Fernando L., Dylan Yaga e Christofer J. McGinnis, eds. Conformance Testing Methodology for ANSI/NIST-ITL 1-2011, Data Format for the Interchange of Fingerprint, Facial and Other Biometric Information (Release 1.0). Gaithersburg, MD: National Institute of Standards and Technology, agosto de 2012. http://dx.doi.org/10.6028/nist.sp.500-295.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Wing, Bradford J. Data Format for the Interchange of Fingerprint, Facial and Other Biometric Information ANSI/NIST-ITL 1-2011 NIST Special Publication 500-290 Edition 2. National Institute of Standards and Technology, agosto de 2013. http://dx.doi.org/10.6028/nist.sp.500-290e2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Vá para a bibliografia