815 Hits in 4.9 sec

Estimation of Performance in Multimodal Biometric based Authentication System using Various Clustering

R. Manju, A. Shajin nargunam
2016 Indian Journal of Science and Technology  
Methods: In this paper, Rough set with different classifiers are discussed to improve the performance of biometric system based authentication.  ...  This paper presents software systems based on rough sets comparing performance evaluation with different classifier techniques, fusion methods, filtering techniques and it provide sophisticated graphical  ...  Estimation of Performance in Multimodal Biometric based Authentication System using Various Clustering 2 Estimation of Performance in Multimodal Biometric based Authentication System using Various  ... 
doi:10.17485/ijst/2016/v9i13/90545 fatcat:ua7reygjdja5vhwjlpyhhzilgi

Review of Hand Feature of Unimodal and Multimodal Biometric System

Juberahmad Shaikh, Uttam D.
2016 International Journal of Computer Applications  
As only biometrics, the authentication of individuals using biological identities, can offer true proof of identity.  ...  In this age of digital impersonation, biometric techniques are being used increasingly for authentication technique to prevent unauthorized access.  ...  Based on the rough set theory maximization of rough entropy and minimization of roughness of the image lead Image binarization is obtained.  ... 
doi:10.5120/ijca2016907853 fatcat:ygmikotqire7bcfh2r5ldnucrq

A State-of-the-Art on Continuous Authentication

Edlira Martiri
2015 Mediterranean Journal of Social Sciences  
Lastly, we suggest the use of a new algebraic approach, near-set theory, for the classification of both features and users.  ...  From the three types of authenticators (passwords, tokens and biometrics) we are focused on the use of biometrics to ensure the continuous authentication of users.  ...  Pattern recognition and set theory techniques: they include k-means algorithm, the model AR, decision trees and random forests, rough sets, etc.  ... 
doi:10.5901/mjss.2015.v6n2p526 fatcat:twu2i7lzordijbc7jakhkgxfe4

Validating data acquired with experimental multimodal biometric system installed in bank branches

P. Szczuko, A. Czyżewski, P. Hoffmann, P. Bratoszewski, M. Lech
2017 Journal of Intelligent Information Systems  
The decision-related sets were approximated by the Rough Set method offering efficient algorithms and tools for finding hidden patterns in data.  ...  Prediction of evaluated biometric data quality, based on enrollment samples and on user subjective opinions was made employing the developed method.  ...  PBS3/B3/26/2015 entitled "Multimodal biometric system for bank client identity verification" co-funded by the Polish National Center for Research and Development.  ... 
doi:10.1007/s10844-017-0491-2 fatcat:de2s4nrvmjhvlpjmfeez4bsdcy

Review on EEG-Based Authentication Technology

Shuai Zhang, Lei Sun, Xiuqing Mao, Cuiyun Hu, Peiyuan Liu, Luis Javier Herrera
2021 Computational Intelligence and Neuroscience  
In cryptography, the key is the core basis of authentication in the cryptographic system, and cryptographic technology can effectively improve the security of biometric authentication and protect biometrics  ...  This review mainly introduced the method of EEG-based authentication and systematically introduced EEG-based biometric cryptosystems for authentication for the first time.  ...  Bajwa and Dantu [76] first used traditional EEG biometric classification authentication and used the key generated by EEG for authentication in the second phase. e first data set is based on five mental  ... 
doi:10.1155/2021/5229576 pmid:34976039 pmcid:PMC8720016 fatcat:gjmcu3362rhqzbpbpofkrvfpnu


Shaymaa Adnan Abdulrahman
In addition, represents biometrics characteristics in general. The Biometric feature is used to determine human identity including the brain signals.  ...  In this study, we first presented a survey of the Computational intelligence techniques in biometrics. All previous studies used brain EEG signals.  ...  (Zhendong Mu, 2015) stated that Rough set theory has been successfully employed in different information mining fields.  ... 
doi:10.26782/jmcms.2020.08.00049 fatcat:67ciu4v2f5dlvagt56lybjnwcu

Enhancing 3D Face Recognition based PCA by using Rough Set Theory

A. Sh.Ahmed, Sh. K. Guirguis, M. Z. Rashad
2015 International Journal of Computer Applications  
Sophisticated commercial systems have been developed that achieve high recognition rates. The proposed method of 3D facial recognition based on Rough set technique.  ...  In this paper PCA (Principal Component Analysis) approach has been used to reduce Feature vector, for selection of feature have been used the concept of Rough set approach that can be based on the minimal  ...  In this paper the authors attempt to enhance the performance of the PCA, we proposed system based on rough set theory, which take facial features as input data.  ... 
doi:10.5120/20013-1984 fatcat:gf7nyfwaavbl3frgjoy4ftmz7a

The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity [article]

Asem Othman, John Callahan
2017 arXiv   pre-print
To accomplish this, we propose specification and implementation of a decentralized biometric credential storage option via blockchains using DIDs and DID documents within the IEEE 2410-2017 Biometric Open  ...  Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective.  ...  cant manage the massive number of IDs, passwords and data Biometric-based authentication systems [12] operate in two required to interact  ... 
arXiv:1711.07127v1 fatcat:efogl2ls25fhhbvy7gxav6kt44

Rethinking Authentication on Smart Mobile Devices

Ding Wang, Jian Shen, Joseph K. Liu, Kim-Kwang Raymond Choo
2018 Wireless Communications and Mobile Computing  
It is our hope that this special issue will advance the understanding and research of User Authentication on Smart Mobile Devices. We hope you enjoy the papers. Ding Wang Jian Shen Joseph K.  ...  Based on the attribute reduction method from rough set theory, the authors further present a pruning method.  ...  in biometrics.  ... 
doi:10.1155/2018/7079037 fatcat:v52bgxp5enbqddcqy557hilstm

Object Selection as a Biometric

Joyce Tlhoolebe, Bin Dai
2022 Entropy  
In biometric authentication, feature extraction is a very vital stage, although some of the extracted features that are not very useful may lead to the degradation of the biometric system performance.  ...  Biometric authentication involves the use of physical or behavioral characteristics to identify people.  ...  Biometric Authentication As one of the countermeasures to the problems encountered with the use of passwords, the adoption of biometric authentication systems emerged.  ... 
doi:10.3390/e24020148 pmid:35205444 pmcid:PMC8870805 fatcat:acude3jp5jgmzd2c454odmdnay

Protecting Biometric Templates With Sketch: Theory and Practice

Yagiz Sutcu, Qiming Li, Nasir Memon
2007 IEEE Transactions on Information Forensics and Security  
Secure storage of biometric templates has become an increasingly important issue in biometric authentication systems.  ...  We further discuss how to use secure sketch in the design of multi-factor authentication systems that allow easy revocation of user credentials.  ...  CONCLUSIONS In this paper we study the problem of secure storage of biometric templates in biometric-based authentication systems.  ... 
doi:10.1109/tifs.2007.902022 fatcat:mal6nlretnbotfuiiriptmvyfa


Dr. Harpreet Kaur Sethi
2021 IJARCCE  
The discriminating powers of all biometric technologies depend on the amount of entropy they are able to encode and use in matching.  ...  Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex  ...  Biometric authentication is a promising technology that will eliminate the usual authentication schemes using a password.  ... 
doi:10.17148/ijarcce.2021.101013 fatcat:onbmjva2k5bt5nofqtwdm63any

Keystroke dynamics as a biometric for authentication

Fabian Monrose, Aviel D. Rubin
2000 Future generations computer systems  
In this paper we examine an emerging non-static biometric technique that aims to identify users based on analyzing habitual rhythm patterns in the way they type.  ...  This paper presents our results for an authentication system based on the use of keystroke dynamics.  ...  keystroke dynamics allows for the design of more robust authentication systems than traditional password based alternatives alone.  ... 
doi:10.1016/s0167-739x(99)00059-x fatcat:aqqyhb6275e2fcxb4yybqkwn5m

Keystroke dynamics with low constraints SVM based passphrase enrollment

Romain Giot, Mohamad El-Abed, Christophe Rosenberger
2009 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems  
They are very well perceived by users, they may be one of the cheapest biometric system (as no specific material is required) even if they are not commonly spread and used [1] .  ...  Keystroke dynamics biometric systems have been studied for more than twenty years.  ...  Biometrics systems The access of entities to controlled resources is managed by authentication systems which provide answers to two questions (i) who is the user ?  ... 
doi:10.1109/btas.2009.5339028 fatcat:3ll6ezbaqnedtctovf6htb2ofa

A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems [article]

Ye Wang, Shantanu Rane, Stark C. Draper, Prakash Ishwar
2011 arXiv   pre-print
We present a theoretical framework for the analysis of privacy and security tradeoffs in secure biometric authentication systems.  ...  We use this framework to conduct a comparative information-theoretic analysis of two biometric systems that are based on linear error correction codes, namely fuzzy commitment and secure sketches.  ...  Authentication Attacks with Multiple Systems In situations where some subset of systems based on the same biometric have been compromised, an attacker may be able to use the compromised data to enhance  ... 
arXiv:1112.5630v1 fatcat:76tovecrrvgbnkfskknvzo4fae
« Previous Showing results 1 — 15 out of 815 results