The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biometrics has gained a lot of attention over recent years as a way to identify individuals. Of all biometrics-based techniques, the iris-pattern-based systems have recently shown very high accuracies in verifying an individual's identity. The premise here is that iris patterns are unique across people. Only the iris bit code template specific to an individual need be stored for future identity verification...
This paper presents a method for encrypting user's data using RC5 algorithm with a secret key, which is embedded in a biometric fingerprint image using LSB based image steganography techniques and stored in the database. The key can be unpacked only by presenting a genuine fingerprint image. The fingerprint images are compared using an efficient fingerprint matching algorithm that involves a Phase...
Research topic covered was the identification of a characteristic method of authentication based on biometric fingerprint reading to achieve a solution to secure communications. Biometric identification solution based on fingerprint reading was combined with conventional authentication methods to achieve more secure communications and computers better protected.
Biometric identification systems exploit automated methods of recognition based on physiological or behavioural people characteristics. Among these, fingerprints are very affordable biometric identifiers. In order to build embedded systems performing real-time authentication, a fast computational unit for image processing is required. In this paper we propose a parallel architecture that efficiently...
This paper proposes a non-traditional XML database which supports biometric templates and provides an API which can be used by independent applications in mobile device environments. Until recently biometric systems are becoming more and more visible in mobile phone devices including fingerprint recognition or gait recognition. To gain a real understanding of how it is possible to protect the biometric...
In today's world, where terrorist attacks are on the rise, employment of infallible security systems is a must. Iris recognition enjoys universality, high degree of uniqueness and moderate user co-operation. This makes Iris recognition systems unavoidable in emerging security & authentication mechanisms. We propose an iris recognition system based on vector quantization. The proposed system does...
The use of computer has increased rapidly as well as the use of internet applications such as e-commerce, online banking services, webmail, and blogs. All internet applications require a password authentication scheme to make sure only the genuine individual can login to the application. Passwords and personal identification numbers (PIN) have traditionally been used to access such applications [1,...
Demand for reliable biometric systems has highly increased during that past decade. However, despite of the efforts conducted in the biometrics field, there is still a possibility of successful fraud attempts. Institutes and large organizations in attempt to improve the systems false acceptance rate (FAR), depend on the concept of using more than one biometric feature to positively identify a person...
This paper research the influence of the pegs number on a hand based biometric device used for verification. Concisely, it presents the results of a study which compare the performance of different biometric devices with no pegs, 2 pegs, 4 pegs and 5 pegs. We have evaluated the four configurations of the biometric device with a database of 150 users collected during 3 months in an access control scenario...
This paper describes the Iris based authentication system using the Independent Component Analysis (ICA). In this paper, a customized iris extraction algorithm has been applied directly on the unfiltered grayscale image. The polar coordinate system has been used by the researchers for iris processing. Instead, an algorithm based on intrinsic coordinate system has been proposed to save on computation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.