نتایج جستجو برای: mobile biometrics
تعداد نتایج: 178825 فیلتر نتایج به سال:
In the last decade of computer security, using biometrics for various types of security problems becomes more and more popular. The uniqueness of biometrics for any specific humanbeing makes the identification system more secure. Biometrics are widely used in person identification and verification. But using biometrics by means of cryptography is a new research area and there is less work in li...
The term Biometrics is becoming highly important in computer security world. The human physical characteristics like fingerprints, face, hand geometry, voice and iris are known as biometrics. These features are used to provide an authentication for computer based security systems. The existing computer security systems used at various places like banking, passport, credit cards, smart cards, PI...
Innovation has formed much of the rich history in biometrics. The field of soft biometrics was originally aimed to augment the recognition process by fusion of metrics that were sufficient to discriminate populations rather than individuals. This was later refined to use measures that could be used to discriminate individuals, especially using descriptions that can be perceived using human visi...
Biometrics is automated methods for identifying a person or verifying the identity of a person based on a physiological or behavioral characteristic has the capability to reliably distinguish between an authorized person and an imposter. Since biometric characteristics are distinctive, can not be forgotten or lost, and the person to be authenticated needs to be physically present at the point o...
In this paper we survey the state of the art in direct and indirect human computer interaction based biometrics. Direct HCI biometrics are based on abilities, style, preference, knowledge, or strategy used by people while working with a computer. The indirect HCI-based biometrics are events that can be obtained by monitoring users’ HCI behavior indirectly via observable low-level actions of com...
The lessons and best practices that have become required operating procedure in software development groups can often be applied outside the immediate field of software engineering. This article details a groundbreaking new, multi-year, large-scale biometric dataset that is designed to improve the accuracy and robustness of iris recognition algorithms. We identify several challenges associated ...
While humans share many physical characteristics, they are not replicas of one another in appearance. Despite their uniqueness, common features mean that comparisons can be made. The ability to identify someone by face has been the most fundamental ways have connected with each other as distinct persons <xref ref-type="bibr" rid="ref1" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink=...
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید