نتایج جستجو برای: biometrics

تعداد نتایج: 7670  

Journal: :A Peer-Reviewed Journal About 2018

Journal: :Journal of Information Technology Research 2022

This manuscript presents the design of a new approach human skin color authentication. Skin is one most popular soft biometric modalities. Since modality alone cannot reliably authenticate an individual, this system designed to combine results with other pure modalities increase recognition performance. In classification process, we first perform facial detection by segmentation using threshold...

Journal: :I. J. Network Security 2016
Chin-Chen Chang Wei-Yuan Hsueh Ting-Fang Cheng

We find that Chuang and Chen’s biometrics-based multiserver authentication scheme is unable to resist against stolen smart card and forgery attacks; in addition, their scheme has weak biometrics detection and privacy preservation problems. Thus, in this paper, we propose an advanced biometrics-based authentication scheme for a multi-server environment with higher security and efficiency. Our sc...

Journal: :Journal of Biomedicine and Biotechnology 2012

Journal: :Big Data Histories 2018

2015
Dan Kim Obi Ogbanufe

The aim of the paper is to shed light on the factors affecting perception shifts in biometrics authentication. This study explores trust relationships in the adoption of biometrics using the valence framework to understand and explain the individual’s evaluation of risk concerning biometrics. Hypotheses are developed to suggest that individuals’ intention to use biometrics is influenced by trus...

2013
Shantanu Rane Ye Wang Stark C. Draper Prakash Ishwar

BIOMETRICS are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, biometrics are fundamentally noisy and irreplaceable. There are always slight variati...

2012

The proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors in this method the concept of changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical diff...

2013
Alawi A. Al-Saggaf Haridas Acharya

By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS), in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statist...

2013
Albert Ali Salah

Biometrics aims at reliable and robust identification of humans from their personal traits, mainly for security and authentication purposes, but also for identifying and tracking the users of smarter applications. Frequently considered modalities are fingerprint, face, iris, palmprint and voice, but there are many other possible biometrics, including gait, ear image, retina, DNA, and even behav...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید