نتایج جستجو برای: mobile biometrics

تعداد نتایج: 178825  

2014
Sushil Shahi

We have seen over the years that the process of manual attendance has been carried out across almost all educational institutions. The process is not only time consuming but also sometimes inefficient resulting in the false marking of attendance. Today, we need not maintain pen and paper based attendance registers. Following this thought, we have proposed an attendance marking and calculation s...

2017
Javed Miya Mayur Bhatt Mayank Gupta Mohammad Anas

The number of touchscreen mobile devices are rapidly increasing each day and so are the number of people that use them. Username-password combination is the most common method of authentication but has many vulnerabilities like shoulder surfing, social engineering, brute force attacks, key-loggers, etc. Keystroke Dynamics provides a novel approach to strengthen this existing method. Typing rhyt...

2005
Kazuo Asakawa

With progress of both fixed and mobile networks, various ubiquitous information services have been brought up to apply in actual business scene. In fact, it becomes possible to receive and send information in various access points not only in offices but also in cars through sophisticated ubiquitous terminals such as PDA, cellular phone, mobile PC and so on. Moreover, the spread of RFID-tag app...

2005
King Hong Cheung Adams Wai-Kin Kong David Zhang Mohamed S. Kamel Jane You Ho-Wang Lam

Cancelable biometrics has been proposed for canceling and re-issuing biometric templates and for protecting privacy in biometrics systems. Recently, new cancelable biometric approaches are proposed based on BioHashing, which are random transformed feature-based cancelable biometrics. In this paper, we consider the accuracy of one of the cancelable biometrics based on BioHashing and face. Throug...

2007
Marcelo Fornazin Danilo B. S. Netto Marcos A. Cavenaghi

This is a work in progress, presenting concepts and techniques directly related to the practical use of the Fuzzy Vault Scheme (FVS) biometrics cryptosystem on human authentication using biometrics. Many applications handle confidential information from their users. These information need to be handled in a secure way. One way of handling information securely is through cryptography, where the ...

2012
Min-Gu Kim Hae-Min Moon Yongwha Chung Sung Bum Pan

Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information ...

Journal: :Scholarpedia 2010

2008
Varun Kartik Almaula

...................................................................................................................................................... viii 1. Chapter 1 Problem Statement................................................................................................................1 2. Chapter 2 Background and Related Work............................................................

2004
Anil Jain Ruud Bolle Sharath Pankanti

Biometrics deals with identification of individuals based on their biological or behavioral characteristics. Biometrics has lately been receiving attention in popular media. it is widely believed that biometrics will become a significant component of the identification technology as (i) the prices of biometrics sensors continue to fall, (ii) the underlying technology becomes more mature, and (i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید