The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The impressive amount of recent technological advancements in the area of information systems have brought along, besides the multitude of positive aspects, some negative aspects too. The most obvious one is represented by the fact that the technological innovations are prone to various categories of threats. Making sure that information stays safe, unaltered and secret is an integral part of providing...
One of the challenges of mobile health is to provide a way of maintaining privacy in the access to the data. Especially, when using ICT for providing access to health services and information. In these scenarios, it is essential to determine and verify the identity of users to ensure the security of the network. A way of authenticating the identity of each patient, doctor or any stakeholder involved...
Brain is a vital part of our body, without brain can't perform any task. Human beings are termed as an intelligence because of the unique properties of the human brain. When we want to do any activity, it generates the signals. On the basis of brain signal our body act accordingly. The signal pattern of brain to give the instruction to the organs is varies person to person. Therefore, by using single...
Mobile technology is changing the data collection and analytics in traditional healthcare practice. The distributed and real time nature of the operation brings security challenges in the gathering, processing, and analysis of personal biometrics data gathered by various wearable health monitoring devices. We present a security framework which identifies the anomalies not only based on the range of...
Airplane cockpit security is of utmost importance in the current scenario of terrorism. To avoid incidents like the September 11 attacks, where unauthorized people took control of airplanes, it is crucial to determine the authenticity of a person occupying the pilot/co-pilot seat(s). In this paper we extend previous results in biometric techniques to accurately recognize the person occupying the seat...
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
Biometric is being increasingly used for authentication of user. During enrolment, an enrolment biometric template is generated from the user's raw biometric data. This template is typically stored in the authentication database and used for matching with the template generated when the user presents himself/herself for login. The stored enrolment template can be vulnerable and lead to security problems...
Cancelable biometrics is one of the possible solutions to security and privacy problems in biometrics-based recognition systems. In this paper we propose the use of two classical transformations, block re-mapping and image warping, for the definition of cancelable biometrics from finger vein pattern images. Specifically, the impact on matching performance of the employed distortions, as well as the...
The single biometric system may be inadequate in many applications such as public security, access control and banking because of noise in data samples or because of unavailability of a sample at a given time. In order to overcome the limitation of the single biometric, a Multi-representation biometric is used. In this paper we present a multimodal personal identification system using the Histogram...
Most of the existing techniques for palmprint recognition are based on metrics that evaluate the distance between a pair of features. These metrics are typically based on static functions. In this paper we propose a new technique for palmprint recognition based on a dynamical system approach, focusing on preliminary experimental results. The essential idea is that the procedure iteratively eliminates...
Cancelable biometrics is newly emerged biometric technology that can provide the protection over different attacks to a biometric system. In this paper, we have presented a multilevel r andom projection on face and ear biometric traits. The multiple random projections are conducted using multiple random projection matrixes. From multiple random projections, we have generated multiple templates for...
Multi-modal biometrics enjoy more merits than their single-modal counterparts in terms of accuracy performance and security. The fusion of hand-based biometrics such as palmprint and palmvein is straightforward since they can be acquired simultaneously with a customized image acquisition device. Conjugate 2DPalmHash Code (CTDPHC), which is constructed by 2DPalmHash Codes (2DPHCs) of palmprint and...
The purpose of developing a biometric identification system is to identify an individual quickly and accurately based on his physiological or behavioral characteristics. The system should ensure that only a person, whose biometric data is there in the database, is accepted. In order to satisfy these requirements, the system should give a false acceptance rate (FAR) approximately equal to zero and...
Biometric based authentication can provide strong security for identifying the users. In addition, the security of biometric data is important, because most biometric data is not changeable in a lifetime. However, cancellable biometrics can stores a non-invertible transformed version of the biometric data. Namely, the biometric data is safely remained even if the storage is compromised. The cryptographic...
We investigated the false accept rates against randomly forged signatures written by each signer by using a DTW-based online signature verification algorithm. The experimental results show that attacks using some signers' signatures are stronger than those using skilled forged signatures and that some signers' signatures can be a wolf against the algorithm considered.
Reliability and accuracy in personal identification system is a dominant concern to the security world. Biometric has gained much attention in this subject recently. Many types of personal identification systems have been developed, and palmprint identification is one of the emerging technologies. This paper presents a novel biometric technique to automatic personal identification system using multispectral...
Multimodal biometric face recognition using speech signal has engrossed much attention and has been applied in various domains primarily for surveillance, security & access control and law enforcement. In recent years much advancement have been made in face recognition techniques to cater to the challenges such as pose, expression, illumination, aging and disguise. However, due to advances in...
Continuous biometric authentication schemes (CBAS) are built around the biometrics supplied by user behavioural characteristics and continuously check the identity of the user throughout the session. The current literature for CBAS primarily focuses on the accuracy of the system in order to reduce false alarms. However, these attempts do not consider various issues that might affect practicality in...
People identification has numerous applications, ranging from surveillance/security to robotics. Face and body movement/ gait biometrics are the most important tools for this task. Traditional biometrics use direct observation of the body, yet in some situations a projection may offer more information than the direct signal, for example the shadow of a person observed from overhead, e.g. from an unmanned...
With the development of face recognition technology, some privacy and security problems arise. Principal component analysis (PCA); is one of the popular approaches for face recognition. Aiming at the leakage for the security of PCA, this paper proposes a secure face recognition algorithm based on adaptive non-uniform quantization (ANUQ) which quantizes the template feature obtained by PCA and stores...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.