User Verification System

نویسندگان

  • William Baker
  • Arthur Evans
  • Lisa Jordan
  • Saurabh Pethe
چکیده

Currently, small and large scale businesses are in need of advanced security measures to keep both customers and employees safe from today’s possible dangers. An excellent method of security, which is almost essential, is to identify a person quickly, easily and accurately. This type of security hasn’t been accomplished and proven through modern day technology up until now. We describe the technology which makes it possible to use cutting edge software and hardware to implement this particular type of security. The presented paper is an ongoing project in hybridizing multiple biometrics that include Handwriting, Voice, Fingerprinting and Face for verifying the user. The purpose is to develop a high-confidence user verification system that uses multiple biometrics that can be used to alleviate several practical problems which are associated with current personal identification methods. Biometrics are supposed to be possessed by each person in the target population but, in practice no biometrics truly is. For instance, every person has a fingerprint, but a small fraction of the population has a fingerprint which is not easily captured by the features adopted by a given system. A single biometric may not be acceptable to different sections of the target population and one could give users a choice of biometrics. . In addition, identifications from multiple independent biometrics offer increasingly irrefutable proof of the identity of a person, and reinforces confidence and reliability. This is why more than one biometrics were used in this system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Determination of geometric accuracy of radiotherapy fields by port film and DRR using Matlab Graphical User Interface

Introduction: Radiation therapy is one of the methods of cancer treatment. In this method, it is necessary to avoid harming the healthy tissues of the patient which is in the vicinity of the target, as much as possible. Treatment verification is one of the most important steps of radiation therapy which has two usual methods, using Port film and EPID. The accuracy and precision of treatment in ...

متن کامل

Using a verification system to reason about post-completion errors

Faults in the way a system works are often attributed to user error. In critical systems such user errors can be catastrophic. Formal verification is one approach advocated to help avoid catastrophic errors. Previous work has concentrated on ensuring that implementations meet specifications or that safety or liveness properties hold of a specification. However, systems verified in this way are ...

متن کامل

Signal Design at lsolated lntersecaions Using Expert Systems Technology

The procedural steps for developing an expert system for designing signals at isolated intersections are described and the most important development issues for each step are discussed. The steps include problem analysis and definition, preliminary prototype specification, knowledge acquisition strategy development, prototype development plan, knowledge extraction, knowledge representation, too...

متن کامل

Privacy Preserving Speaker Verification Using Adapted GMMs

In this paper we present an adapted UBM-GMM based privacy preserving speaker verification (PPSV) system, where the system is not able to observe the speech data provided by the user and the user does not observe the models trained by the system. These privacy criteria are important in order to prevent an adversary having unauthorized access to the user’s client device from impersonating a user ...

متن کامل

The User Interface of the KIV Verification System — A System Description

This article describes the sophisticated graphical user interface (GUI) of the KIV verification system. KIV is a verification system that works on structured algebraic specifications. The KIV GUI provides means for developing and editing structured algebraic specifications and for developing proofs of theorems. The complete development process is performed through the GUI with two exceptions. F...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002