Showing 1 - 10 of 710
signature biometrics consists of two stages: the first stage is for facial signature image protection while the second is for …
Persistent link: https://www.econbiz.de/10012043234
The objective of this article is to propose rotation invariant fingerprint descriptor, and a faster and better generalized performance classifier. The author proposes a new multi-resolution analysis based fingerprint descriptor, computed from fingerprint orientation pattern called as orientation...
Persistent link: https://www.econbiz.de/10012043842
In this paper an incident response approach is proposed for handling detections of authentication failures in systems that employ dynamic biometric authentication and more specifically keystroke user recognition. The main component of the approach is a multi layer perceptron focusing on the age...
Persistent link: https://www.econbiz.de/10012043934
Nowadays, the development and the application of biometric systems on one hand, and the large number of hardware and software manufacturers on the other, caused two the most common problems of biometric systems: a problem of interoperability between system's components as well as between...
Persistent link: https://www.econbiz.de/10012044115
method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms … that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a …
Persistent link: https://www.econbiz.de/10012044942
professional to explicitly give permission to the system to monitor his or her activities. Furthermore, a non-intrusive biometrics …
Persistent link: https://www.econbiz.de/10012045158
The security and privacy of biometric data in multibiometric systems has become a hot research topic. In this paper, a singular value decomposition (SVD) and fast discrete curvelet transform (FDCuT)-based watermarking scheme for authenticity of fingerprint image using watermark speech signal has...
Persistent link: https://www.econbiz.de/10012045726
Mobile devices have become a ubiquitous technology that are also inherently intertwined with modern society. They have enabled a revolution of how people engage and interact with technology, computing and the Internet. However, as their popularity has increased, so have the threats against them....
Persistent link: https://www.econbiz.de/10012046449
Nature-inspired novel swarm intelligence algorithms have gained more proliferation due to a variety of applications and uses in optimization of complex problems and selection of discriminatory sets of features to classify huge datasets during the past few decades. Feature selection is an...
Persistent link: https://www.econbiz.de/10012047835
health care consumers and providers about biometrics. Design/methodology/approach – Data were analyzed from a survey of 324 … experience with those technologies. Feelings about the potential uses and limitations of biometrics were found to be more …/implications – The findings reported here suggest the need for additional research into the types of biometrics adopted in diverse health …
Persistent link: https://www.econbiz.de/10014795775