A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Biometric iris templates security based on secret image sharing and chaotic maps
2022
International Journal of Power Electronics and Drive Systems (IJPEDS)
The security and privacy in biometrics-based authentication system is augmented by storing the data in the form of shadows at separated places instead of whole data at one. ...
Biometric technique includes of uniquely identifying person based on their physical or behavioural characteristics. It is mainly used for authentication. ...
Biometric recognition system provides a natural and reliable solution to identification problem [2] . ...
doi:10.11591/ijece.v12i1.pp339-348
fatcat:qmy7ekiecrdi3pmek5nocqgjwm
Trends and Challenges of ICT in Indian Banking Sector
2018
International Journal of Trend in Scientific Research and Development
Formation of Revolution Workshops is enabling the banks to discover various roads in the banking area like Biometrics, Artificial Intelligence, Robotics, Data Analytics, Wearable technology etc. ...
As the nation welcomes innovations in ICT, banks need to prepare themselves with the mandatory set As major percentage of education to take urban youth in the nation accepts and adopts virtual banking. ...
Biometrics use of biological data and social characteristics that separates one human being from another. Biometrics is safe and rate operative method of the clients of the bank. ...
doi:10.31142/ijtsrd18692
fatcat:5yi7v7smazbbvamrgf4p6fmqxu
Multi-Modal Authentication using Machine Learning Algorithm
2019
International Journal of Engineering and Advanced Technology
Whereas, there are number of approaches to demonstrate validation and approval, yet the biometric verification beat every other method. ...
In the present era of information technology, there is a need to implement verification and approval strategies for security of resources. ...
all around the world, so biometric is a resolution taken to make all the documents and properties of recognized organization safe. ...
doi:10.35940/ijeat.f1192.0986s319
fatcat:2tpymbihazc2hifrm4a25f6tka
Towards practical biometric key generation with randomized biometric templates
2008
Proceedings of the 15th ACM conference on Computer and communications security - CCS '08
We identify the technical challenges of this approach, and develop novel techniques to overcome these difficulties. ...
In this paper, we exploit a novel source of entropy that can be used with any biometric modality but that has yet to be utilized for key generation, namely associating uncertainty with the way in which ...
This work was funded in part by NSF Grant CNS-0430338 and the Phillips and Camille Bradford Fellowship. ...
doi:10.1145/1455770.1455801
dblp:conf/ccs/BallardKMR08
fatcat:ondpmblvuzgz7hjgpgobjokoza
Multi –Mode Biometric Solution for Examination Malpractices in Nigerian Schools
2010
International Journal of Computer Applications
This paper presents a multi-mode biometrics (fingerprint and face) solution to the problem of examination malpractice in Nigerian schools. ...
The appearance of both fingerprint scanner and web cam on modern laptop and notebook computers motivate the writing of this paper. ...
Biometrics holds the promise of fast, easytouse, accurate, reliable, and less expensive authentication for a variety of applications. ...
doi:10.5120/839-1109
fatcat:xpze7ptkdjetdahi42pr6exyn4
Culture & biometrics: regional differences in the perception of biometric authentication technologies
2009
AI & Society: The Journal of Human-Centred Systems and Machine Intelligence
We conclude that cultural differences have an impact on the way biometric systems will be used and argue that these factors should be taken into account during the design and implementation of biometric ...
Multiple barriers to the acceptance of biometric technology were identified with data security and health and safety fears having the greatest overall impact on respondents' attitudes towards biometrics ...
Acknowledgments We would like to thank Grant Cheyne and Kevin McDonald at Edinburgh Napier University for their invaluable help in the administration and data collection of this project. ...
doi:10.1007/s00146-009-0218-1
fatcat:6moxenxtnfhcbl6qistiqd4aw4
A Detailed Study of Electronic Banking Security Techniques and Safety Measures
2017
International Journal of Innovative Research & Development
Proposed also was the use of biometric security to ensure that the user of electronic banking application is the only one who can access his account, using biometric authentication [xvii] . ...
[xi], proposed the use of biometrics authentication for electronic banking. ...
doi:10.24940/ijird/2017/v6/i11/nov17055
fatcat:kz4tyyxgprdtng7nmnxe4bhs4u
SECURITY CHALLENGES IN MOBILE ASSISTED LANGUAGE LEARNING IN THE MILLENNIUM FOR EDUCATION
2016
Novìtnâ Osvìta
Yielding an economical learning opportunity along with providing authentic contexts for collaborative learning is beneficial for the economy of the country in general and for the meaningful and deep learning ...
Although the usefulness of such technologies in teaching and learning is clear, their testing part is remained to be discussed due to the security issue. ...
Acknowledgments This study has been part of a grant-based project by Payame Noor University, Iran. ...
doi:10.20535/2410-8286.72703
fatcat:ij45mft7f5fqdfayqtshomizoe
A highly secure Multi- Factor authentication system using biometrics to enhance privacy in Internet of Things (IOT)
2019
International Research Journal of Multidisciplinary Technovation
The registration phase enrolls person privacy data with their biometric and the obtained data's are encrypted with the help of Elliptical Curve Cryptography (ECC) and this confidential information is embedded ...
As a result, the proposed scheme has strong security, reliability and enhanced computational efficiency. ...
collect and exchange useful data and meaningful information. ...
doi:10.34256/irjmtcon4
fatcat:2bvib5omwzdsdpv6wvffddqabe
Efficient yet robust biometric iris matching on smart cards for data high security and privacy
2017
Future generations computer systems
However, the simple use of biometrics cannot be considered as final and perfect solution. ...
This biometric is considered one of the most reliable to distinguish a person from another as its unique yet perfectly stable over time. ...
Acknowledgments We are eternally grateful to the reviewers and editor that allowed for a great deal of improvement of the content and contribution of this paper. ...
doi:10.1016/j.future.2017.05.008
fatcat:w25qvca2zffcdcfoubrnav264i
eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices
2010
Mobile Multimedia/Image Processing, Security, and Applications 2010
Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. ...
The use of mobile communication devices with advance sensors is growing rapidly. ...
Fusion of biometric modalities In applications where more than one biometric modality is used (e.g. face and voice), the fusion of the different modalities is one of the key factors of the overall security ...
doi:10.1117/12.850022
fatcat:qb3v6gp2rvcuhpbsckkoxvmiym
The Intention of Passengers Towards Repeat Use of Biometric Security for Sustainable Airport Management
2020
Sustainability
To be aligned with the novel attempt of this research, the results showed that both the perceived benefits and risks have a significant impact on passenger's initial and repeat use intention of biometric ...
This technology allows for passengers to safely clear security based on their unique biometric features. Despite its promise, airports and passengers alike are slow to adopt its use. ...
All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/su12114528
fatcat:ps4udl65v5dmxb4tvepqsbufhq
Page 5119 of Mathematical Reviews Vol. , Issue 85k
[page]
1985
Mathematical Reviews
The problem of accelerated life testing and safe dose estimation is discussed under competing causes of failure. ...
The main result of this paper is that, under the condition that the mean life time of the system is much larger than the mean repair time and the maintenance time, the system reliability function will ...
A Fusion-Based Approach to Enhancing Multi-Modal Biometric Recognition System Failure Prediction and Overall Performance
2008
2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems
Competing notions of biometric recognition system failure prediction have emerged recently, which can roughly be categorized as quality and non-quality based approaches. ...
We present results for the NIST BSSR1 multi-modal data set, and a larger "chimera" set also composed of data from BSSR1. ...
Thresholding a per datum reliability or "quality" measure to predict recognition system success produces 4 different "cases", depending on the success of the recognition system on a sample and the reliability-based ...
doi:10.1109/btas.2008.4699339
fatcat:gnfwdm5rcjhzdm5sn7qvuwvsoe
Sports Science Data Protocol
2019
Diabetes Research - Open Journal
Data Processing and Analyses Data mining is the extraction of data for the purpose of discovering meaningful patterns, normalization, and the choosing of statistical models that can help in making data ...
As such professional sports leagues have started to implement privacy rules and regulations on the protection of athlete biometric data. ...
the intended use of the data, and who will have access to the data. ...
doi:10.17140/semoj-5-174
fatcat:w6dymubg5bghxmr5mzl5sigham
« Previous
Showing results 1 — 15 out of 2,908 results