A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Estimation of Performance in Multimodal Biometric based Authentication System using Various Clustering
2016
Indian Journal of Science and Technology
Methods: In this paper, Rough set with different classifiers are discussed to improve the performance of biometric system based authentication. ...
This paper presents software systems based on rough sets comparing performance evaluation with different classifier techniques, fusion methods, filtering techniques and it provide sophisticated graphical ...
Estimation of Performance in Multimodal Biometric based Authentication System using Various Clustering 2
Estimation of Performance in Multimodal Biometric based Authentication System using Various ...
doi:10.17485/ijst/2016/v9i13/90545
fatcat:ua7reygjdja5vhwjlpyhhzilgi
Review of Hand Feature of Unimodal and Multimodal Biometric System
2016
International Journal of Computer Applications
As only biometrics, the authentication of individuals using biological identities, can offer true proof of identity. ...
In this age of digital impersonation, biometric techniques are being used increasingly for authentication technique to prevent unauthorized access. ...
Based on the rough set theory maximization of rough entropy and minimization of roughness of the image lead Image binarization is obtained. ...
doi:10.5120/ijca2016907853
fatcat:ygmikotqire7bcfh2r5ldnucrq
A State-of-the-Art on Continuous Authentication
2015
Mediterranean Journal of Social Sciences
Lastly, we suggest the use of a new algebraic approach, near-set theory, for the classification of both features and users. ...
From the three types of authenticators (passwords, tokens and biometrics) we are focused on the use of biometrics to ensure the continuous authentication of users. ...
Pattern recognition and set theory techniques: they include k-means algorithm, the model AR, decision trees and random forests, rough sets, etc. ...
doi:10.5901/mjss.2015.v6n2p526
fatcat:twu2i7lzordijbc7jakhkgxfe4
Validating data acquired with experimental multimodal biometric system installed in bank branches
2017
Journal of Intelligent Information Systems
The decision-related sets were approximated by the Rough Set method offering efficient algorithms and tools for finding hidden patterns in data. ...
Prediction of evaluated biometric data quality, based on enrollment samples and on user subjective opinions was made employing the developed method. ...
PBS3/B3/26/2015 entitled "Multimodal biometric system for bank client identity verification" co-funded by the Polish National Center for Research and Development. ...
doi:10.1007/s10844-017-0491-2
fatcat:de2s4nrvmjhvlpjmfeez4bsdcy
Review on EEG-Based Authentication Technology
2021
Computational Intelligence and Neuroscience
In cryptography, the key is the core basis of authentication in the cryptographic system, and cryptographic technology can effectively improve the security of biometric authentication and protect biometrics ...
This review mainly introduced the method of EEG-based authentication and systematically introduced EEG-based biometric cryptosystems for authentication for the first time. ...
Bajwa and Dantu [76] first used traditional EEG biometric classification authentication and used the key generated by EEG for authentication in the second phase. e first data set is based on five mental ...
doi:10.1155/2021/5229576
pmid:34976039
pmcid:PMC8720016
fatcat:gjmcu3362rhqzbpbpofkrvfpnu
COMPARATIVE STUDY OF COMPUTATIONAL INTELLIGENCE PARADIGMS FOR INTELLIGENT ACCESS CONTROL BASED ON BIOMETRICS METHODOLOGIES
2020
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
In addition, represents biometrics characteristics in general. The Biometric feature is used to determine human identity including the brain signals. ...
In this study, we first presented a survey of the Computational intelligence techniques in biometrics. All previous studies used brain EEG signals. ...
(Zhendong Mu, 2015) stated that Rough set theory has been successfully employed in different information mining fields. ...
doi:10.26782/jmcms.2020.08.00049
fatcat:67ciu4v2f5dlvagt56lybjnwcu
Enhancing 3D Face Recognition based PCA by using Rough Set Theory
2015
International Journal of Computer Applications
Sophisticated commercial systems have been developed that achieve high recognition rates. The proposed method of 3D facial recognition based on Rough set technique. ...
In this paper PCA (Principal Component Analysis) approach has been used to reduce Feature vector, for selection of feature have been used the concept of Rough set approach that can be based on the minimal ...
In this paper the authors attempt to enhance the performance of the PCA, we proposed system based on rough set theory, which take facial features as input data. ...
doi:10.5120/20013-1984
fatcat:gf7nyfwaavbl3frgjoy4ftmz7a
The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity
[article]
2017
arXiv
pre-print
To accomplish this, we propose specification and implementation of a decentralized biometric credential storage option via blockchains using DIDs and DID documents within the IEEE 2410-2017 Biometric Open ...
Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. ...
cant manage the massive number of IDs, passwords and data Biometric-based authentication systems [12] operate in two
required to interact ...
arXiv:1711.07127v1
fatcat:efogl2ls25fhhbvy7gxav6kt44
Rethinking Authentication on Smart Mobile Devices
2018
Wireless Communications and Mobile Computing
It is our hope that this special issue will advance the understanding and research of User Authentication on Smart Mobile Devices. We hope you enjoy the papers.
Ding Wang Jian Shen Joseph K. ...
Based on the attribute reduction method from rough set theory, the authors further present a pruning method. ...
in biometrics. ...
doi:10.1155/2018/7079037
fatcat:v52bgxp5enbqddcqy557hilstm
Object Selection as a Biometric
2022
Entropy
In biometric authentication, feature extraction is a very vital stage, although some of the extracted features that are not very useful may lead to the degradation of the biometric system performance. ...
Biometric authentication involves the use of physical or behavioral characteristics to identify people. ...
Biometric Authentication As one of the countermeasures to the problems encountered with the use of passwords, the adoption of biometric authentication systems emerged. ...
doi:10.3390/e24020148
pmid:35205444
pmcid:PMC8870805
fatcat:acude3jp5jgmzd2c454odmdnay
Protecting Biometric Templates With Sketch: Theory and Practice
2007
IEEE Transactions on Information Forensics and Security
Secure storage of biometric templates has become an increasingly important issue in biometric authentication systems. ...
We further discuss how to use secure sketch in the design of multi-factor authentication systems that allow easy revocation of user credentials. ...
CONCLUSIONS In this paper we study the problem of secure storage of biometric templates in biometric-based authentication systems. ...
doi:10.1109/tifs.2007.902022
fatcat:mal6nlretnbotfuiiriptmvyfa
IRIS RECOGNITION FOR SAFETY
2021
IJARCCE
The discriminating powers of all biometric technologies depend on the amount of entropy they are able to encode and use in matching. ...
Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex ...
Biometric authentication is a promising technology that will eliminate the usual authentication schemes using a password. ...
doi:10.17148/ijarcce.2021.101013
fatcat:onbmjva2k5bt5nofqtwdm63any
Keystroke dynamics as a biometric for authentication
2000
Future generations computer systems
In this paper we examine an emerging non-static biometric technique that aims to identify users based on analyzing habitual rhythm patterns in the way they type. ...
This paper presents our results for an authentication system based on the use of keystroke dynamics. ...
keystroke dynamics allows for the design of more robust authentication systems than traditional password based alternatives alone. ...
doi:10.1016/s0167-739x(99)00059-x
fatcat:aqqyhb6275e2fcxb4yybqkwn5m
Keystroke dynamics with low constraints SVM based passphrase enrollment
2009
2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems
They are very well perceived by users, they may be one of the cheapest biometric system (as no specific material is required) even if they are not commonly spread and used [1] . ...
Keystroke dynamics biometric systems have been studied for more than twenty years. ...
Biometrics systems The access of entities to controlled resources is managed by authentication systems which provide answers to two questions (i) who is the user ? ...
doi:10.1109/btas.2009.5339028
fatcat:3ll6ezbaqnedtctovf6htb2ofa
A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems
[article]
2011
arXiv
pre-print
We present a theoretical framework for the analysis of privacy and security tradeoffs in secure biometric authentication systems. ...
We use this framework to conduct a comparative information-theoretic analysis of two biometric systems that are based on linear error correction codes, namely fuzzy commitment and secure sketches. ...
Authentication Attacks with Multiple Systems In situations where some subset of systems based on the same biometric have been compromised, an attacker may be able to use the compromised data to enhance ...
arXiv:1112.5630v1
fatcat:76tovecrrvgbnkfskknvzo4fae
« Previous
Showing results 1 — 15 out of 815 results