The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proposed scheme presents the real time security managing methods that can be implemented using RFID, biometric and smart messaging. Entry doors to restricted areas are controlled using the biometric machines. Registered staff manages their entry through their RFID card, which is verified with biometric. The relay in the biometric reader will unlock the door if the verification is successful after...
Biometric template protection is an important issue to be resolved so that practical biometric authentication systems can be deployed. In this paper, we propose a non-invertible transform to perpendicularly project the distances between a pair of minutiae to a circle to generate the features. To achieve good performance, other local features such as relative angles between the minutiae pair, and global...
Biometrics is a unique area of multidisciplinary engineering practice. We address this specific-application area in our classes on ??Fundamentals of Biometric System Design?? for the senior undergraduate electrical, computer, and software engineering students. This one-semester course covers various aspects of engineering design of biometric systems such as formulation and analysis of design goals,...
There has been increased concern about security during the past few years. Researchers are looking into developing new tools for security enhancement and this has brought biometrics into the limelight. The analysis of human gait as a biometric is relatively newer compared to finger prints, face or iris. This paper presents a new gait feature based on the wavelet analysis of the cyclic gait motion...
A robust biometric access system for optical communications based on a speaker identification authentication is proposed in this paper. The solution also enables optical access with remote speaker identification. A set of speech features and classifiers were defined to achieve the best recognition rates. The experiments demonstrated the feasibility and importance of using the biometric technology...
Face recognition has been employed in various security-related applications such as surveillance, mugshot identification, e-passport, and access control. Despite its recent advancements, privacy concern is one of several issues preventing its wider deployment. In this paper, we address the privacy concern for a self-exclusion scenario of face recognition, through combining face recognition with a...
Based on the available secured files and information in the companies; they need to be secured by a very high system. Currently, most of companies are accessed by normal keys in order to access the offices. But, those keys might be lost or stolen. In addition, those doors can be hacked easily by thieves. This raises a need to improve security of such information by limiting access only to those who...
Biometric methods numerous advantages are known very well for every computer security specialist and are in general highly valued. One of the most interesting methods used for biometric protection of computer system (and other objects) is speech parameters extraction, analysis and recognition. Problem under consideration is concentrated on methods showing, how to distinguish between voices of particular...
Biometrics is automatic methods for identifying a person on the basis of some biological or behavioral characteristic of the person. Many biological characteristics, such as fingerprints, and behavioral characteristics, such as voice patterns, are distinctive to each person. The purpose of this report is to introduce the revolutionary information system application of biometrics. After collecting...
Digital rights management (DRM) system is the effective schemes for digital transactions. A novel authentication scheme of DRM system for remote users based on multimodal biometrics (such as iris and face feature) verification and watermarking and smart cards is described in this paper, which include two authentication phases, i.e. the client server authentication and the server authentication. For...
Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. Itpsilas not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security....
In this paper we applied a digital image processing using the model of multi-layers of convex polygon to implement fingerprint verification. Our implementation is the result of optimizing the traditional of identification and verification methods being used particular extracted features and trying to approach a secure, accurate and even reliable method (we mentioned that the subtraction of outer polygons)...
Due to the fast development of information technology there is an outstanding heave in the growth of the access control system, which leads to revolutionize the e-commerce and customer relationship management. The endeavor of this paper is to make an association with e-commerce, CRM and biometrics. E-commerce is successful only if CRM is efficient. With out CRM there is no chance of improvement in...
The demonstration focuses on presenting the capabilities of a wireless biometric badge integrating localization and tracking functionalities along with an automatic personal identification mechanism to control the access to restricted areas with a high level of security. The wireless biometric badge is the result of R&D activities conducted by several professors, researchers, and students from...
The National Institutes of Health, along with other healthcare related agencies, continue to define the importance of exchanging medical data between hospitals and other healthcare providers. However, issues within the medical field such as interoperability, scalability and security continue to plague electronic exchange of information within the healthcare sector. In this paper we present an approach,...
BioHashing generates a BioCode from a user's biometric features by projecting them onto user-specific random vectors and then discritizes the projection coefficients into zero or one. Since biometric features are distorted by the non-invertible transforms and template matching is performed in a transformed state, it has been claimed that BioHashing is oneway and a BioCode is as secure as a hashed...
Moving towards an dasiaalways-onpsila, dasiamobilepsila and technology driven lifestyle, people are demanding greater technical triumph to make life more exciting, convenient and trouble-free. Automation at home has already started catering to this growing need. Another major motivating factor for this is the prospect of higher energy efficiency, greater control on home from remote locations and the...
Authentication by biometric verification is becoming increasingly common in corporate, public security and other such systems. There is scads of work done in the area of offline palmprints like palmprint segmentation, crease extraction, special areas, feature matching etc. But to the best of our knowledge no work has been done yet to extract and identify the right hand of a person, given his/her left...
Security of an information system depends to a large extent on its ability to authenticate legitimate users as well as to withstand attacks of various kinds. Confidence in its ability to provide adequate authentication is, however, waning. This is largely due to the wrongful use of passwords by many users. In this paper, the design and development of keystroke pressure-based typing biometrics for...
This paper presents a biometric encryption system that addresses the privacy concern in the deployment of the face recognition technology in real-world systems. In particular, we focus on a self-exclusion scenario (a special application of watch-list) of face recognition and propose a novel design of a biometric encryption system deployed with a face recognition system under constrained conditions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.