نتایج جستجو برای: mobile biometrics

تعداد نتایج: 178825  

2013
Dang Tran Tri Quynh Chi Truong Tran Khanh Dang

Modern mobile devices (e.g. laptops, mobile phones, etc.) equipped with input sensors open a convenient way to do authentication by using biometrics. However, if these devices are lost or stolen, the owners will confront a highly impacted threat: their stored biometric templates, either in raw or transformed forms, can be extracted and used illegally by others. In this paper, we propose some co...

2010
Egon L. van den Broek

Throughout the last 40 years, the essence of automated identification of users has remained the same. In this article, a new class of biometrics is proposed that is founded on processing biosignals, as opposed to images. After a brief introduction on biometrics, biosignals are discussed, including their advantages, disadvantages, and guidelines for obtaining them. This new class of biometrics i...

Journal: :International Journal of Applied Information Systems 2014

2008
Yanjun Yan Lisa Ann Osadciw

This paper is a survey on biometrics and forensics, especially on the techniques and applications of face recognition in forensics. This paper describes the differences and connections between biometrics and forensics, and bridges each other by formulating the conditions when biometrics can be applied in forensics. Under these conditions, face recognition, as a non-intrusive and non-contact bio...

Journal: :IBM Systems Journal 2001
Nalini K. Ratha Jonathan H. Connell Ruud M. Bolle

Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications su...

2015
Ramadan Gad Nawal El-Fishawy AYMAN EL-SAYED

Multi-biometrics is an exciting and interesting research topic. It is used to recognizing individuals for security purposes; to increase security levels. The recent research trends toward next biometrics generation in real-time applications. Also, integration of biometrics solves some of unimodal system limitations. However, design and evaluation of such systems raises many issues and trade-off...

2008
Andreas Pfitzmann

After a short introduction to biometrics w.r.t. IT security, we derive conclusions on how biometrics should be put to use and how not at all. In particular, we show how to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics in an appropriate way. The main conclusion is that biometrics should be used between human being and his/her personal...

Journal: :Pattern Recognition Letters 2015

2013
K. Brunet C. Rosenberger

This paper deals with a biometric solution for authentication on mobile devices. Among the possible biometric modalities, speaker recognition seems the most natural choice for a mobile phone. This work lies in the continuation of our previous work [1], where we evaluated a candidate algorithm in terms of performance and time processing. The proposed solution is implemented here as an Android ap...

2016
Ala Abdulhakim Alariki Azizah Abdul Manaf Seyed Mojtaba Mousavi

Today, mobile devices are being widely used in personal and professional life. By increasing the popularity of touchscreen platform as an input method in mobiles phones, touch gesture behaviour is becoming more significantly important in interaction with the phone. Due to increasing demand for safer access in touchscreen mobile phones, old strategies like pins, tokens, or passwords have failed ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید