371 Hits in 3.3 sec

Implementation of a New Born Child Authentication System Using Image Processing

Mr. Akash Ulhas Nandurka
2018 International Journal for Research in Applied Science and Engineering Technology  
The manual procedure of capturing inked footprints in practice for this purpose is limited for use inside hospitals and is not an effective solution for identification purposes.  ...  The biometric traits considered are the footprint of the new born child and the fingerprint of the mother. An appropriate fusion scheme is implemented to overcome the drawbacks of a single modality.  ...  Also Use Smartphone To Capture A Picture Which Is Having High Definition Camera in our system we have to capture a HD image no matter by which device it can be a smartphone it can be a tablet or it can  ... 
doi:10.22214/ijraset.2018.4569 fatcat:r4a3bslagjeg7g3ocnokn5fihe

Development of a New Instrumental Measurement of Odorous VOCs Based On Precise Fingerprints Obtained by a Multitude of Biosensors

Sofia Lafhal, Cyril Herrier, Thierry Livache, Jean-Michel Guillot
2018 Chemical Engineering Transactions  
precise fingerprint for each odor or odorant mixture obtained by a multitude of Biosensors.  ...  The technology of this device is based on Surface Plasmon Resonance Imaging (SPRi) and is usually used for liquid samples.  ...  Concerning sample delivery and capturing/detection system of the new prototype described in this study, the odorous sample is pumped into the NeOse and induces a reversible physico-chemical change in the  ... 
doi:10.3303/cet1868069 doaj:e9d52df00b1f4e68a0d429ab80e17931 fatcat:bzoz3by5xja3jcjcdxb55ktdi4

Two low-cost digital camera-based platforms for quantitative creatinine analysis in urine

Bruno Debus, Dmitry Kirsanov, Irina Yaroshenko, Alla Sidorova, Alena Piven, Andrey Legin
2015 Analytica Chimica Acta  
The performance of CDS and CSPT was also validated in real human urine samples (n ¼ 26) using capillary electrophoresis data as reference.  ...  Although several techniques have been proposed for a fast and accurate quantification of creatinine in human serum or urine, most of them require expensive or complex apparatus, advanced sample preparation  ...  Optical properties of the 26 urine samples were captured by either a digital camera or a smartphone video stream and converted into absorbance spectra and spectral fingerprints respectively.  ... 
doi:10.1016/j.aca.2015.09.007 pmid:26454461 fatcat:hbijsuzos5ev7jk5xuz3hihgmy

A report on personally identifiable sensor data from smartphone devices [article]

Marios Fanourakis
2020 arXiv   pre-print
of the persons who generated this data.In this paper, we seek to identify what types of sensor data can be collected on a smartphone and which of those types can pose a threat to user privacy by looking  ...  into the hardware capabilities of modern smartphone devices and how smartphone data is used in the literature.  ...  In table 1 we define several sampling types that can be used to collect information from sensors. We can use these sampling types to qualify the threat-sensitivity of a particular sensor's data.  ... 
arXiv:2003.06159v1 fatcat:cjdcpq75ibevjp7deqpxbrbsb4

Person Identification Based on Hand Tremor Characteristics [article]

Oana Miu, Adrian Zamfir, Corneliu Florea
2016 arXiv   pre-print
We have evaluated our method on a database with 10 000 samples from 17 persons reaching an accuracy of 76%.  ...  We present a new method for identifying the user of a handheld device using characteristics of the hand tremor measured with a smartphone built-in inertial sensors (accelerometers and gyroscopes).  ...  blur due to Camera Acquisition Motion" -SteadyCam) research grant.  ... 
arXiv:1606.06840v1 fatcat:tkbxg6pngfbvhmgyvuyi3vvipm

A Survey on Visible Light Positioning from Software Algorithms to Hardware

Pengpeng Chen, Mingzhi Pang, Di Che, Yuqing Yin, Donghai Hu, Shouwan Gao, Ghufran Ahmed
2021 Wireless Communications and Mobile Computing  
Acknowledgments This work was supported by the National Natural Science Foundation of China under Grant Nos. 51904294 and 51774282.  ...  By combining signal amplification, a cluster of sampling and camera optimization mechanisms enables smartphones to capture extremely weak-and highfrequency characteristics.  ...  The main idea of iLAMP is that the front camera of the smartphone can capture some of the inherent features of the LED lights that are invisible to the human eye and extract these potential features by  ... 
doi:10.1155/2021/9739577 fatcat:xq73emfsufdormnphdkeuxglpe

Multi-Factor Authentication: A Survey

Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen, Yevgeni Koucheryavy
2018 Cryptography  
Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity.  ...  Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service.  ...  Another opportunity to attack the MFA system is by capturing the secret data sample [183] .  ... 
doi:10.3390/cryptography2010001 fatcat:j6q4mjji3jhl5m5qxoaujevfoa

Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection [article]

Jascha Kolberg and Marcel Grimmer and Marta Gomez-Barrero and Christoph Busch
2020 arXiv   pre-print
To address this issue, we propose a new PAD technique based on autoencoders (AEs) trained only on bona fide samples (i.e. one-class), which are captured in the short wave infrared domain.  ...  In recent years, the popularity of fingerprint-based biometric authentication systems significantly increased.  ...  ACKNOWLEDGMENTS This research is based upon work supported in part by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA) under contract  ... 
arXiv:2008.07989v2 fatcat:5x5wmd6fvncadbbpuhlo3odgre

Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection

Jascha Kolberg, Marcel Grimmer, Marta Gomez-Barrero, Christoph Busch
2021 IEEE Transactions on Biometrics Behavior and Identity Science  
To address this issue, we propose a new PAD technique based on autoencoders (AEs) trained only on bona fide samples (i.e., oneclass), which are captured in the short wave infrared domain.  ...  In this context, most works are dedicated to solve PAD as a two-class classification problem, which includes training a model on both bona fide and PA samples.  ...  CAPTURE DEVICE The camera-based fingerprint capture device [46] that was used for data collection is depicted in Fig. 1 .  ... 
doi:10.1109/tbiom.2021.3050036 fatcat:pkokcmdagrgfzghau3xsl2tm3i

Smartphone-Operated Wireless Chemical Sensors: A Review

Somasundaram Chandra Kishore, Kanagesan Samikannu, Raji Atchudan, Suguna Perumal, Thomas Nesakumar Jebakumar Immanuel Edison, Muthulakshmi Alagan, Ashok K. Sundramoorthy, Yong Rok Lee
2022 Chemosensors  
This study looks at the most recent wireless and smartphone-supported chemical sensors.  ...  The review is divided into four different topics that emphasize the basic types of wireless smartphone-operated chemical sensors.  ...  When the smartphone is in close proximity to the NFC-enabled device, the camera is automatically activated and a digital image is captured.  ... 
doi:10.3390/chemosensors10020055 fatcat:tcc2bh5ht5enhktqnlqsidij7i

Multimodal Biometric Authentication for Smartphones

Mrunal Pathak
2021 International Journal for Research in Applied Science and Engineering Technology  
However, the unimodal eye biometric system is not able to qualify the level of acceptability, speed, and reliability needed.  ...  This can be accomplished by employing the most reliable and accurate biometric identification system available currently which is, Eye recognition.  ...  Reduction of noise is done by excluding extra information like shadow, eyelash, reflection from captured image. 4 Ahmed Shamil Finger Print, OCT 1. Iris camera used.  ... 
doi:10.22214/ijraset.2021.39569 fatcat:ieyt2pi2ljaubi4hllwggjw744

On the generalisation capabilities of fingerprint presentation attack detection methods in the short wave infrared domain

Jascha Kolberg, Marta Gomez‐Barrero, Christoph Busch
2021 IET Biometrics  
Nowadays, fingerprint-based biometric recognition systems are becoming increasingly popular.  ...  In this context, the authors evaluate the generalisability of multiple PAD algorithms on a dataset of 19,711 bona fide and 4339 PA samples, including 45 different PAI species.  ...  ACKNOWLEDGEMENTS This research is based upon work supported in part by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA)  ... 
doi:10.1049/bme2.12020 fatcat:pi6cewnfpzhybjysskskuzwf6q

IPIN 2018 Ninth International Conference on Indoor Positioning and Indoor Navigation

2018 2018 International Conference on Indoor Positioning and Indoor Navigation (IPIN)  
that captures LED light reflected by the floor.  ...  Experiments are performed on an AR.Drone quadrotor platform and results validated using motion capture camera system.  ...  Fingerprinting requires reference measurements called fingerprints that are recorded during a training phase.  ... 
doi:10.1109/ipin.2018.8533737 fatcat:rv5zjhjytjaijcqgvvvpmbfjfa

Smartphone based user verification leveraging gait recognition for mobile healthcare systems

Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang
2013 2013 IEEE International Conference on Sensing, Communications and Networking (SECON)  
Our framework exploits the readily available accelerometers embedded within smartphones for user verification.  ...  Our experiments using 322 smartphone-based traces over a period of 6 months confirm that our scheme is highly effective for detecting user spoofing attacks.  ...  Acknowledgement: This work is supported in part by National Science Foundation Grants CNS1016303, CNS1217387, CCF1018270, CNS1016296 and CNS1217379.  ... 
doi:10.1109/sahcn.2013.6644973 dblp:conf/secon/RenCC013 fatcat:abzq3qsizvgmfi6jpq2g4khpma

Seeing Your Face Is Not Enough

Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
FaceLive detects the MFF-based attacks by measuring the consistency between device movement data from the inertial sensors and the head pose changes from the facial video captured by built-in camera.  ...  Leveraging built-in cameras on smartphones and tablets, face authentication provides an attractive alternative of legacy passwords due to its memory-less authentication process.  ...  the smartphone and ensure his/her face is always fully captured by the front-facing camera.  ... 
doi:10.1145/2810103.2813612 dblp:conf/ccs/LiLYKD15 fatcat:mxtynjz74rgq3nr75nujxgwtcm
« Previous Showing results 1 — 15 out of 371 results