نتایج جستجو برای: mobile biometrics

تعداد نتایج: 178825  

Journal: :I. J. Network Security 2016
Chin-Chen Chang Wei-Yuan Hsueh Ting-Fang Cheng

We find that Chuang and Chen’s biometrics-based multiserver authentication scheme is unable to resist against stolen smart card and forgery attacks; in addition, their scheme has weak biometrics detection and privacy preservation problems. Thus, in this paper, we propose an advanced biometrics-based authentication scheme for a multi-server environment with higher security and efficiency. Our sc...

Journal: :Journal of Biomedicine and Biotechnology 2012

Journal: :Big Data Histories 2018

2015
Dan Kim Obi Ogbanufe

The aim of the paper is to shed light on the factors affecting perception shifts in biometrics authentication. This study explores trust relationships in the adoption of biometrics using the valence framework to understand and explain the individual’s evaluation of risk concerning biometrics. Hypotheses are developed to suggest that individuals’ intention to use biometrics is influenced by trus...

2013
Shantanu Rane Ye Wang Stark C. Draper Prakash Ishwar

BIOMETRICS are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, biometrics are fundamentally noisy and irreplaceable. There are always slight variati...

2012

The proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors in this method the concept of changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical diff...

2013
Alawi A. Al-Saggaf Haridas Acharya

By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS), in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statist...

2013
Albert Ali Salah

Biometrics aims at reliable and robust identification of humans from their personal traits, mainly for security and authentication purposes, but also for identifying and tracking the users of smarter applications. Frequently considered modalities are fingerprint, face, iris, palmprint and voice, but there are many other possible biometrics, including gait, ear image, retina, DNA, and even behav...

2005
LYNNE COVENTRY

The term biometrics is derived from the Greek bio (life) and metric (measure). Biometrics, as a means of identification, can be traced back to both ancient Egypt1 and China. Pioneering work on modern biometrics technologies dates back to the late 1960s, when researchers began looking at voice patterns, fingerprints, and hand geometry as a means for establishing unique individual identity. By th...

Journal: :Pattern Recognition 2008
Fawaz Alsaade Aladdin M. Ariyaeeinia Amit S. Malegaonkar M. Pawlewski Surosh G. Pillay

This paper presents an investigation into the effects, on the accuracy of multimodal biometrics, of introducing unconstrained cohort normalisation (UCN) into the score-level fusion process. Whilst score normalisation has been widely used in voice biometrics, its effectiveness in other biometrics has not been previously investigated. This study aims to explore the potential usefulness of the sai...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید