نتایج جستجو برای: biometrics
تعداد نتایج: 7670 فیلتر نتایج به سال:
Identity verification becomes a challenging task when it has to be automated with high accuracy and non-repudiability. The existing methods such as passwords and photo identity cards are inadequate to meet such heavy demands. Automated biometrics-based authentication methods can meet all the demands. An overview of the fast developing and exciting area of automated biometrics is provided in thi...
The testing and evaluation of biometrics is a complex and difficult task. The difficulties in such an endeavor include the selection of the number and type of individuals that will that will participate in this process of testing. Determining the amount of data to be collected is another important factor in this process. Choosing an appropriate set of individuals from which to collect biometric...
Apart from making the authentication system reliable, biometric systems reduce the time required for authentication considerably at the airports, borders, and government offices. The paper presents a survey of the unimodal biometric methods that are currently available, and other hybrid forms of biometrics that can be used for security purposes. Some of the latest forms of biometrics that are s...
In this paper we introduce the idea of using behavioral biometrics in intrusion detection applications. We present a new biometrics-based technique, which can be used to detect intrusion without the need for any special hardware implementation and without forcing the user to perform any special actions. The technique is based on using “keystroke dynamics” and “mouse dynamics” biometrics. We dis...
-In this present era, system and network technology is considered as a key tool for a wide variety of applications. Network security affects many organizations, and it becomes one of the major tasks. Biometric is one of the most secure and suitable authentication tools. By using biometrics in a correct way, many problems can be solved by using user identification and passwords. This paper analy...
Traditionally the use of codes or passwords have been used to authenticate access to mobile devices, but now the use of biometrics is increasingly being implemented. However is the use of biometrics a secure way to authenticate access to mobile devices. This paper provides insight into the different areas of biometrics, how they are now implemented on mobile devices as well as their advantages ...
Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometr...
We present results of the largest experimental investigation of 3D ear biometrics to date. ICP-based approaches were carefully explored, and the best rank one recognition rate achieves 98.8%. Only 4 cases out of 302 are incorrectly matched, and all due to poor data quality. This result is encouraging in that it suggests the uniqueness of the human ear and its potential applicability as a biomet...
Biometric signatures, or biometrics, are used to identify individuals by measuring certain unique physical and behavioral characteristics. Individuals must be identified to allow or prohibit access to secure areas—or to enable them to use personal digital devices such as, computer, personal digital assistant (PDA), or mobile phone. Virtually all biometric methods are implemented using the follo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید