نتایج جستجو برای: biometric study

تعداد نتایج: 3975701  

2014
Milorad Milinković

The rapid development of biometric hardware and software, and the increased use of biometrics in identity management led to the appearance of the problem of interoperability of biometric systems as well as security of biometric information that is transmitted over the network. This paper analyzes the solution to the problem of security of biometric data transactions via network by implementing ...

Journal: :JIPS 2014
Youssef Elmir Zakaria Elberrichi Réda Adjoudj

Biometric performance improvement is a challenging task. In this paper, a hierarchical strategy fusion based on multimodal biometric system is presented. This strategy relies on a combination of several biometric traits using a multi-level biometric fusion hierarchy. The multi-level biometric fusion includes a pre-classification fusion with optimal feature selection and a post-classification fu...

2013
Himanshu Srivastava

A biometric system provides automatic recognition of an individual based on a unique feature or characteristic possessed by the individual. These biometric characteristic may physiological or behavioral. Unlike other identification methods such as id proof, tokens and password, the distinct aspect of biometric recognition comes into light from randomly distributed features in human being. In th...

Journal: :CoRR 2011
Sabu M. Thampi Ann Jisma Jacob

Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area is reversible watermarking in which the original image can be completely restored and the waterm...

2012
Christian Rathgeb Christoph Busch

The term biometrics refers to “automated recognition of individuals based on their behavioral and biological characteristics” (ISO/IEC JTC1 SC37). Several physiological (static) as well as behavioral (non-static) biometric characteristics have been exploited (Jain, Flynn & Ross, 2008) such as fingerprints, iris, face, hand, voice, gait, keystroke dynamics, etc., depending on distinct types of a...

2011
Manivannan

Abstract – Biometric as the science of recognizing an individual based on his or her physical or behavioral traits, it is beginning to gain acceptance as a legitimate method for determining an individual identity. Biometric have now been deployed in various commercial, civilian, and national security applications. Biometric described overview of various biometric techniques and the need to be a...

2015
Sean McKenna

This paper examines the interplay between biometric technologies and advanced analytics, referred to as biometric analytics, as a way to detect fraudulent entries in a biometric system. We follow a systematic approach, based on cost estimating standards, to ascertain whether deploying such a capability is worthwhile. A simple case study is presented that illustrates the key aspects of our analy...

2012
Zahid Akhtar Shabbeer Ahmad Momin

A biometric system is essentially a pattern recognition system being used in adversarial environment. Since, biometric system like any conventional security system is exposed to malicious adversaries, who can manipulate data to make the system ineffective by compromising its integrity. Current theory and design methods of biometric systems do not take into account the vulnerability to such adve...

Journal: :EURASIP J. Information Security 2016
Christian Rathgeb Benjamin Tams Johannes Wagner Christoph Busch

Iris recognition technologies are deployed in numerous large-scale nation-wide projects in order to provide robust and reliable biometric recognition of individuals. Moreover, the iris has been found to be rather stable over time, i.e. iris biometric reference data provides a strong and permanent link between individuals and their biometric traits. Hence, unprotected storage of (iris) biometric...

2016
P. Selvarani

To achieve data storage security in cloud, bio cryptography techniques can be used. This study presents Personal identification using fingerprint and Iris biometric technology. Usually unimodal biometric techniques are used. Cloud computing provides many resources, very convenient charged service and minimum cost computing. This leads the cloud computing to become the most dominant computing in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید