3,001 Hits in 7.9 sec

A Survey on User Identity Verification for Secure Login Session

Swati Borude, Pratiksha Chokhar, Neha Bhosale, Ashwini Palve, M. N. Kale
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Biometric and user information's are stored in smart phones and web services.  ...  But in Unimodel biometric approaches only use a single verification is considered and the identity of the user is permanent during the entire session.  ...  INTRODUCTION In this technology era security of web-based applications is a serious concern, due to the recent increase in the frequency and complexity of cyber-attacks, biometric techniques offer emerging  ... 
doi:10.23956/ijarcsse/v7i3/0186 fatcat:qrrqo2rrqnc3dpkvv5citlq344

Biometric quality: a review of fingerprint, iris, and face

Samarth Bharadwaj, Mayank Vatsa, Richa Singh
2014 EURASIP Journal on Image and Video Processing  
The analysis of the characteristic function of quality and match scores shows that a careful selection of complimentary set of quality metrics can provide more benefit to various applications of biometric  ...  Evaluation schemes are presented to test the performance of quality metrics for various applications.  ...  Acknowledgements This research is supported through a grant of Department of Electronics and Information Technology, Government of India.  ... 
doi:10.1186/1687-5281-2014-34 fatcat:vhat5jla5bb3vksbywco4heisy

Modeling Fingerprint Presentation Attack Detection Through Transient Liveness Factor-A Person Specific Approach

Akhilesh Verma, Vijay Kumar Gupta, Savita Goel, Akbar, Arun Kumar Yadav, Divakar Yadav
2021 Traitement du signal  
It requires initial high-quality live fingerprint sample of the concerned person.  ...  It uses six different image quality metrics as a transient attribute from each live sample and record it as 'Transient Liveness Factor' (TLF).  ...  This addresses a concern towards the requirement for the uniform system is need of today for future application. The approach proposed will act as a technology of future.  ... 
doi:10.18280/ts.380206 fatcat:jtbyuf3ue5ejtpjrhhwuvmtehu

Fingerprint Employee Clocking System

Debrah Joshua Osei
2020 Trends in Technical & Scientific Research  
This paper sought to introduce a biometric employee clocking system to help overcome the high level of truancy in workplaces.  ...  A system that is used for time-clocking, creating an all-inclusive electronic record of the process involved in how employees logs in and out of work on working days are referred to as a clocking system  ...  The move towards the digital era is being accelerated every hour globally to meet the evolving digitization and smart system development.  ... 
doi:10.19080/ttsr.2020.04.555645 fatcat:7in3c4i6pneulnux4dsw3xfkrm

Multimodal Biometrics For Identity Documents And Smart Cards: European Challenge

A. Drygajlo
2007 Zenodo  
Publication in the conference proceedings of EUSIPCO, Poznan, Poland, 2007  ...  The quality of biometric data, eventual fusion of modalities and performance of the recognition systems for each modality are of pivotal importance for this large-scale application.  ...  For those aspects of quality that cannot be designed into the system, an ability to analyse the quality of live biometric data is needed.  ... 
doi:10.5281/zenodo.40238 fatcat:fbx2gf47ozak5cqxoe3yr6wblu

Internet Passport Authentication System Using Multiple Biometric Identification Technology

V.K. Narendira Kumar, B. Srinivasan
2013 International Journal of Information Technology and Computer Science  
The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual.  ...  Technological securities issues are to be found in several d imension, but below paper focus on hardware, software, and infrastructure as some of the most critical iss ues.  ...  A mu ltip le bio metric system uses multip le applications to capture different types of biometrics.  ... 
doi:10.5815/ijitcs.2013.03.10 fatcat:z2c4btnj4jaclgixzgsxt3mywi

A Novel User Layer Cloud Security Model based on Chaotic Arnold Transformation using Fingerprint Biometric Traits

Samuel Manoharan J
2021 Journal of Innovative Image Processing  
Almost all the services related to data processing and storage from firms work on a cloud platform providing the requested services to the consumers at any point of time and location.  ...  Cloud computing models have emerged to be a key player in the field of information processing in the recent decade.  ...  of the users which leads to improvement of its quality of service (QoS).  ... 
doi:10.36548/jiip.2021.1.004 fatcat:2ndeuhldj5b5bdfrtxnii2vpre

Strategies for Exploiting Independent Cloud Implementations of Biometric Experts in Multibiometric Scenarios

P. Peer, Ž. Emeršič, J. Bule, J. Žganec-Gros, V. Štruc
2014 Mathematical Problems in Engineering  
The analysis is conducted based on two biometric cloud services, which are also presented in the paper.  ...  and other researchers working in the areas of biometrics and cloud computing.  ...  Acknowledgments The work presented in this paper was supported in part by The National Research Program P2-0250(C) Metrology and Biometric Systems, by the National Research Program P2-0214 Computer Vision  ... 
doi:10.1155/2014/585139 fatcat:4uj4jqjn7jeqpoyvrdypym3vgm

Multiple classifiers in biometrics. Part 2: Trends and challenges

Julian Fierrez, Aythami Morales, Ruben Vera-Rodriguez, David Camacho
2018 Information Fusion  
Part 1 then overviewed the application of MCS to the particular field of multimodal biometric person authentication in the last 25 years, as a prototypical area in which MCS has resulted in important achievements  ...  These new MCS architectures exploit input quality measures and pattern-specific particularities that move apart from general population statistics, resulting in robust multimodal biometric systems.  ...  Quality-based multimodal biometrics The 21st century began with a growing interest in studying the effects of signal quality on the performance of biometric systems [33, 34, 35] .  ... 
doi:10.1016/j.inffus.2017.12.005 fatcat:ktljc7kscnfwvdobfw6h3uhfja


Debrah Joshua Osei, Alfred Elolo Konglo, Mohammed Issah Adinkrah, Lord Anertei Tetteh, Kojo Boakye, Abigail Mba, Victoria Quansah
2020 International Journal of Engineering Technologies and Management Research  
This paper sought to introduce a biometric employee clocking system to help overcome the high level of truancy in workplaces.  ...  The challenge of the current employee attendance system is the difficulty in tracing old records, safekeeping, lack of confidentiality and the chances of other employees logging in for their truant colleagues  ...  ACKNOWLEDGMENT The authors are grateful to the authorities their final project supervisor whose efforts, proofreading and critique helped to improve the quality of this paper.  ... 
doi:10.29121/ijetmr.v7.i11.2020.819 fatcat:k2nt7gfbvvhkfi3itwa6zqgg5e

Biometric Quality: Review and Application to Face Recognition with FaceQnet [article]

Javier Hernandez-Ortega, Javier Galbally, Julian Fierrez, Laurent Beslay
2021 arXiv   pre-print
After a gentle introduction to the general topic of biometric quality and a review of past efforts in face quality metrics, in the present work, we address the need for better face quality metrics by developing  ...  This rather trivial statement is the basis behind one of the driving concepts in biometric recognition: biometric quality.  ...  In the field of biometrics, these invaluable tools are the so-called: biometric quality metrics.  ... 
arXiv:2006.03298v3 fatcat:nyh43d4hwrdmdoeuyo4rlghojq

A Study of Routing Protocol and Security Scheme for Cloud-Connected Smart Home Internet of Things Devices

Divya V
2018 International Journal for Research in Applied Science and Engineering Technology  
With IoT many applications and services have been emerging in the areas such as, smartcities, surveillance, healthcare, security, etc.  ...  The services offered can be ubiquitously accessed through smart device applications by the users.  ...  A node in the network can participate and join one or more graphs, and mark the traffic according to the graph characteristic to support Quality of Service awareness and constraint based routing.  ... 
doi:10.22214/ijraset.2018.5406 fatcat:4y5gnqzqqngabbo6bwnslmcszy

A Review on Biometrics Authentication System Using Fingerprint

P. Sureshbabu, M. Sakthivadivu
2019 Asian Journal of Computer Science and Technology  
There are many Biometric authentication systems are available for verification process. This paper discusses the role of Fingerprint authentication.  ...  Discussion on Fingerprint matching techniques, recognition methods and their performance analysis are made in the paper.  ...  Fingerprint biometric is used in numerous applications that comprise of various applications like military, law enforcement, medicine, education, civil service, forensics, driver license registration,  ... 
doi:10.51983/ajcst-2019.8.s1.2016 fatcat:xp5vploji5dudnp3sy7dvh2gwy

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems [article]

Aditya Sundararajan, Arif I. Sarwat, Alexander Pons
2019 arXiv   pre-print
Biometric research is directed increasingly towards Wearable Biometric Systems (WBS) for user authentication and identification.  ...  To bridge the gap, this paper accordingly reviews and compares the key characteristics of modalities, contrasts the metrics used to evaluate system performance, and highlights the divergence in critical  ...  universities, WBS currently find their use more in healthcare and personal fitness than in security [129] It is clear that the future of biometric systems research is geared towards WBS, especially  ... 
arXiv:1903.02548v1 fatcat:mkl32giawnb5lgornzq4w3ec74


Shaymaa Adnan Abdulrahman
The focus towards the intelligent access control has been increased in the last years due to its various, applications in different domains.  ...  Through this study, brain signals are the best among the techniques. In this study, we first presented a survey of the Computational intelligence techniques in biometrics.  ...  The focus towards the intelligent access control has been increased in the last years due to its various, applications in different domains.  ... 
doi:10.26782/jmcms.2020.08.00049 fatcat:67ciu4v2f5dlvagt56lybjnwcu
« Previous Showing results 1 — 15 out of 3,001 results