2,908 Hits in 4.7 sec

Biometric iris templates security based on secret image sharing and chaotic maps

Marwa Fadhel Jassim, Wafaa mohammed Saeed Hamzah, Abeer Fadhil Shimal
2022 International Journal of Power Electronics and Drive Systems (IJPEDS)  
The security and privacy in biometrics-based authentication system is augmented by storing the data in the form of shadows at separated places instead of whole data at one.  ...  Biometric technique includes of uniquely identifying person based on their physical or behavioural characteristics. It is mainly used for authentication.  ...  Biometric recognition system provides a natural and reliable solution to identification problem [2] .  ... 
doi:10.11591/ijece.v12i1.pp339-348 fatcat:qmy7ekiecrdi3pmek5nocqgjwm

Trends and Challenges of ICT in Indian Banking Sector

Dr. Munde Sanjeevani Dashrathrao
2018 International Journal of Trend in Scientific Research and Development  
Formation of Revolution Workshops is enabling the banks to discover various roads in the banking area like Biometrics, Artificial Intelligence, Robotics, Data Analytics, Wearable technology etc.  ...  As the nation welcomes innovations in ICT, banks need to prepare themselves with the mandatory set As major percentage of education to take urban youth in the nation accepts and adopts virtual banking.  ...  Biometrics use of biological data and social characteristics that separates one human being from another. Biometrics is safe and rate operative method of the clients of the bank.  ... 
doi:10.31142/ijtsrd18692 fatcat:5yi7v7smazbbvamrgf4p6fmqxu

Multi-Modal Authentication using Machine Learning Algorithm

2019 International Journal of Engineering and Advanced Technology  
Whereas, there are number of approaches to demonstrate validation and approval, yet the biometric verification beat every other method.  ...  In the present era of information technology, there is a need to implement verification and approval strategies for security of resources.  ...  all around the world, so biometric is a resolution taken to make all the documents and properties of recognized organization safe.  ... 
doi:10.35940/ijeat.f1192.0986s319 fatcat:2tpymbihazc2hifrm4a25f6tka

Towards practical biometric key generation with randomized biometric templates

Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter
2008 Proceedings of the 15th ACM conference on Computer and communications security - CCS '08  
We identify the technical challenges of this approach, and develop novel techniques to overcome these difficulties.  ...  In this paper, we exploit a novel source of entropy that can be used with any biometric modality but that has yet to be utilized for key generation, namely associating uncertainty with the way in which  ...  This work was funded in part by NSF Grant CNS-0430338 and the Phillips and Camille Bradford Fellowship.  ... 
doi:10.1145/1455770.1455801 dblp:conf/ccs/BallardKMR08 fatcat:ondpmblvuzgz7hjgpgobjokoza

Multi –Mode Biometric Solution for Examination Malpractices in Nigerian Schools

Olufemi Sunday Adeoye
2010 International Journal of Computer Applications  
This paper presents a multi-mode biometrics (fingerprint and face) solution to the problem of examination malpractice in Nigerian schools.  ...  The appearance of both fingerprint scanner and web cam on modern laptop and notebook computers motivate the writing of this paper.  ...  Biometrics holds the promise of fast, easytouse, accurate, reliable, and less expensive authentication for a variety of applications.  ... 
doi:10.5120/839-1109 fatcat:xpze7ptkdjetdahi42pr6exyn4

Culture & biometrics: regional differences in the perception of biometric authentication technologies

Chris Riley, Kathy Buckner, Graham Johnson, David Benyon
2009 AI & Society: The Journal of Human-Centred Systems and Machine Intelligence  
We conclude that cultural differences have an impact on the way biometric systems will be used and argue that these factors should be taken into account during the design and implementation of biometric  ...  Multiple barriers to the acceptance of biometric technology were identified with data security and health and safety fears having the greatest overall impact on respondents' attitudes towards biometrics  ...  Acknowledgments We would like to thank Grant Cheyne and Kevin McDonald at Edinburgh Napier University for their invaluable help in the administration and data collection of this project.  ... 
doi:10.1007/s00146-009-0218-1 fatcat:6moxenxtnfhcbl6qistiqd4aw4

A Detailed Study of Electronic Banking Security Techniques and Safety Measures

Eneji Samuel Eneji, Onu Fergus Uchenna, Ibe Walter Eyong
2017 International Journal of Innovative Research & Development  
Proposed also was the use of biometric security to ensure that the user of electronic banking application is the only one who can access his account, using biometric authentication [xvii] .  ...  [xi], proposed the use of biometrics authentication for electronic banking.  ... 
doi:10.24940/ijird/2017/v6/i11/nov17055 fatcat:kz4tyyxgprdtng7nmnxe4bhs4u


Hassan Soleimani, Ali Asghar Rostami Abu Saeedi, Mahboubeh Rahmanian
2016 Novìtnâ Osvìta  
Yielding an economical learning opportunity along with providing authentic contexts for collaborative learning is beneficial for the economy of the country in general and for the meaningful and deep learning  ...  Although the usefulness of such technologies in teaching and learning is clear, their testing part is remained to be discussed due to the security issue.  ...  Acknowledgments This study has been part of a grant-based project by Payame Noor University, Iran.  ... 
doi:10.20535/2410-8286.72703 fatcat:ij45mft7f5fqdfayqtshomizoe

A highly secure Multi- Factor authentication system using biometrics to enhance privacy in Internet of Things (IOT)

Vijay M, Indumathi G
2019 International Research Journal of Multidisciplinary Technovation  
The registration phase enrolls person privacy data with their biometric and the obtained data's are encrypted with the help of Elliptical Curve Cryptography (ECC) and this confidential information is embedded  ...  As a result, the proposed scheme has strong security, reliability and enhanced computational efficiency.  ...  collect and exchange useful data and meaningful information.  ... 
doi:10.34256/irjmtcon4 fatcat:2bvib5omwzdsdpv6wvffddqabe

Efficient yet robust biometric iris matching on smart cards for data high security and privacy

N. Nedjah, R.S. Wyant, L.M. Mourelle, B.B. Gupta
2017 Future generations computer systems  
However, the simple use of biometrics cannot be considered as final and perfect solution.  ...  This biometric is considered one of the most reliable to distinguish a person from another as its unique yet perfectly stable over time.  ...  Acknowledgments We are eternally grateful to the reviewers and editor that allowed for a great deal of improvement of the content and contribution of this paper.  ... 
doi:10.1016/j.future.2017.05.008 fatcat:w25qvca2zffcdcfoubrnav264i

eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

Torben Kuseler, Ihsan Lami, Sabah Jassim, Harin Sellahewa, Sos S. Agaian, Sabah A. Jassim
2010 Mobile Multimedia/Image Processing, Security, and Applications 2010  
Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions.  ...  The use of mobile communication devices with advance sensors is growing rapidly.  ...  Fusion of biometric modalities In applications where more than one biometric modality is used (e.g. face and voice), the fusion of the different modalities is one of the key factors of the overall security  ... 
doi:10.1117/12.850022 fatcat:qb3v6gp2rvcuhpbsckkoxvmiym

The Intention of Passengers Towards Repeat Use of Biometric Security for Sustainable Airport Management

Cheong Kim, Kun Chang Lee, Francis Joseph Costello
2020 Sustainability  
To be aligned with the novel attempt of this research, the results showed that both the perceived benefits and risks have a significant impact on passenger's initial and repeat use intention of biometric  ...  This technology allows for passengers to safely clear security based on their unique biometric features. Despite its promise, airports and passengers alike are slow to adopt its use.  ...  All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su12114528 fatcat:ps4udl65v5dmxb4tvepqsbufhq

Page 5119 of Mathematical Reviews Vol. , Issue 85k [page]

1985 Mathematical Reviews  
The problem of accelerated life testing and safe dose estimation is discussed under competing causes of failure.  ...  The main result of this paper is that, under the condition that the mean life time of the system is much larger than the mean repair time and the maintenance time, the system reliability function will  ... 

A Fusion-Based Approach to Enhancing Multi-Modal Biometric Recognition System Failure Prediction and Overall Performance

W. J. Scheirer, T. E. Boult
2008 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems  
Competing notions of biometric recognition system failure prediction have emerged recently, which can roughly be categorized as quality and non-quality based approaches.  ...  We present results for the NIST BSSR1 multi-modal data set, and a larger "chimera" set also composed of data from BSSR1.  ...  Thresholding a per datum reliability or "quality" measure to predict recognition system success produces 4 different "cases", depending on the success of the recognition system on a sample and the reliability-based  ... 
doi:10.1109/btas.2008.4699339 fatcat:gnfwdm5rcjhzdm5sn7qvuwvsoe

Sports Science Data Protocol

Lorena Martin, Former Lakers Director of Sports Performance Analytics, Los Angeles, CA 90089, USA
2019 Diabetes Research - Open Journal  
Data Processing and Analyses Data mining is the extraction of data for the purpose of discovering meaningful patterns, normalization, and the choosing of statistical models that can help in making data  ...  As such professional sports leagues have started to implement privacy rules and regulations on the protection of athlete biometric data.  ...  the intended use of the data, and who will have access to the data.  ... 
doi:10.17140/semoj-5-174 fatcat:w6dymubg5bghxmr5mzl5sigham
« Previous Showing results 1 — 15 out of 2,908 results