Auswahl der wissenschaftlichen Literatur zum Thema „Biometric information protection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Biometric information protection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Biometric information protection"
Lee, Boo-Ha, und Shin-Uk Park. „Legislative Policy Consideration for Reinforcement of Biometrics Protection“. LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, Nr. 1 (30.06.2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Der volle Inhalt der QuelleTeng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A. und Connie Tee. „Finger Vein Template Protection with Directional Bloom Filter“. HighTech and Innovation Journal 4, Nr. 2 (01.06.2023): 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Der volle Inhalt der QuelleTaha, Mohammed A., und Hanaa M. Ahmed. „A fuzzy vault development based on iris images“. EUREKA: Physics and Engineering, Nr. 5 (13.09.2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Der volle Inhalt der QuelleKim, Younjin, und Ilhwan Kim. „Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology“. Korean Constitutional Law Association 28, Nr. 4 (30.12.2022): 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Der volle Inhalt der QuelleShin, Yong-Nyuo, Yong-Jun Lee und Myung-Geun Chun. „Biometric Template Security for Personal Information Protection“. Journal of Korean Institute of Intelligent Systems 18, Nr. 4 (25.08.2008): 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Der volle Inhalt der QuelleLee, Yong-Joon, und Won-Shik Na. „E-Passport Advanced Security Technique Using Biometric Information Watermarking“. Journal of Computational and Theoretical Nanoscience 18, Nr. 5 (01.05.2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Der volle Inhalt der QuelleLee, Yong-Joon, und Won-Shik Na. „E-Passport Advanced Security Technique Using Biometric Information Watermarking“. Journal of Computational and Theoretical Nanoscience 18, Nr. 5 (01.05.2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Der volle Inhalt der QuelleSulavko, Alexey. „Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised“. Information and Control Systems, Nr. 4 (24.08.2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Der volle Inhalt der QuellePunithavathi, P., und S. Geetha. „Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns“. Indonesian Journal of Electrical Engineering and Computer Science 7, Nr. 3 (01.09.2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Der volle Inhalt der QuelleMa, Ruoxue. „Legislative Conception for the Special Protection of Biometric Information: A Study Based on Extraterritorial Experience“. Lecture Notes in Education Psychology and Public Media 10, Nr. 1 (14.09.2023): 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Der volle Inhalt der QuelleDissertationen zum Thema "Biometric information protection"
Banerjea-Brodeur, Nicolas Paul. „Advance passenger information passenger name record : privacy rights and security awareness“. Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Der volle Inhalt der QuellePassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Mtibaa, Aymen. „Towards robust and privacy-preserving speaker verification systems“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS002.
Der volle Inhalt der QuelleSpeaker verification systems are a key technology in many devices and services like smartphones, intelligent digital assistants, healthcare, and banking applications. Additionally, with the COVID pandemic, access control systems based on fingerprint scanners or keypads increase the risk of virus propagation. Therefore, companies are now rethinking their employee access control systems and considering touchless authorization technologies, such as speaker verification systems.However, speaker verification system requires users to transmit their recordings, features, or models derived from their voice samples without any obfuscation over untrusted public networks which stored and processed them on a cloud-based infrastructure. If the system is compromised, an adversary can use this biometric information to impersonate the genuine user and extract personal information. The voice samples may contain information about the user's gender, accent, ethnicity, and health status which raises several privacy issues.In this context, the present PhD Thesis address the privacy and security issues for speaker verification systems based on Gaussian mixture models (GMM), i-vector, and x-vector as speaker modeling. The objective is the development of speaker verification systems that perform biometric verification while preserving the privacy and the security of the user. To that end, we proposed biometric protection schemes for speaker verification systems to achieve the privacy requirements (revocability, unlinkability, irreversibility) described in the standard ISO/IEC IS~24745 on biometric information protection and to improve the robustness of the systems against different attack scenarios
LABATI, R. DONIDA. „CONTACTLESS FINGERPRINT BIOMETRICS: ACQUISITION, PROCESSING, AND PRIVACY PROTECTION“. Doctoral thesis, Università degli Studi di Milano, 2013. http://hdl.handle.net/2434/217562.
Der volle Inhalt der QuelleZhou, Xuebing Verfasser], Dieter W. [Akademischer Betreuer] [Fellner und Raymond N. J. [Akademischer Betreuer] Veldhuis. „Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis“. Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://d-nb.info/1111908354/34.
Der volle Inhalt der QuelleZhou, Xuebing [Verfasser], Dieter W. [Akademischer Betreuer] Fellner und Raymond N. J. [Akademischer Betreuer] Veldhuis. „Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis“. Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-28858.
Der volle Inhalt der QuelleBardou, Sophie. „Les traitements de données biométriques en entreprise“. Thesis, Montpellier 1, 2010. http://www.theses.fr/2010MON10031/document.
Der volle Inhalt der QuelleBiometry brings together computing techniques that enable the identification of individuals on the basis of their biological, physical appearance and/or behavioral characteristics. Although firstly reserved for the legal system/judiciary domain, biometry tends to be generalized in all spheres of people life. Recently, biometry has also been used in companies who are always receptive to new technologies. Thus, the introduction of identifying devices such as these into a company life has to be the subject of corporate discussions between the managing teams and staff representatives. Indeed, such technologies are often compared to video surveillance, RFID chips, GPS data … and they can lead to the spying of employees if their uses are not well supervised. In the absence of specific laws, the legislator has given the CNIL the abilities to establish the requirements of eligibility of this technology usage within the companies. The "liberty and computing" legislation is then combined with the labor laws in order to apply common principles such as the finality, the proportionality, the loyalty, the transparency of information and employee consents
Diaz, Rodriguez V. „Transborder biometric information flow : legal challenges to personal privacy and the need for public debate“. Thesis, 2014. https://eprints.utas.edu.au/22487/1/Whole-Diaz%20Rodriguez-thesis.pdf.
Der volle Inhalt der QuelleAdom'megaa, Prudencio Selly. „La protection de la vie privée dans le cadre de la lutte contre le terrorisme au Canada“. Thesis, 2019. http://hdl.handle.net/1866/24442.
Der volle Inhalt der QuelleThe fight against terrorism implies, amongst others, the execution of preventative and punitive legislation to manage the threats from which Canada is exposed. In this context, the state and its agents have access to many tools, such as “security technology” (facial recognition, video surveillance, fingerprinting, etc.), to achieve their different mandates. The operation of these mechanisms raises questions and concerns in regards to privacy protection. The sharing of personal information between different ministries, the consent pertaining to the collection of personal information, and legislators’ right of access to state secrets, etc., are issues that arise when the executive power undertakes security measures. It’s found that the legislative changes to fight against terrorism create an imbalance with respect to privacy protection. Indeed, unlike the fight against terrorism, the right to privacy is constitutionally protected under the Canadian Charter of rights and freedoms. One of the challenges that must be recognized by the executive, legislative and judiciary authorities is to conduct their actions according to the rule of law in the context of national security.
Bücher zum Thema "Biometric information protection"
Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2012.
Den vollen Inhalt der Quelle findenMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Der volle Inhalt der QuelleStefan, Katzenbeisser, und SpringerLink (Online service), Hrsg. Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Den vollen Inhalt der Quelle findenOffice, United States Government Accountability. Border security: State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Den vollen Inhalt der Quelle findenTransparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.
Den vollen Inhalt der Quelle findencomparé, Institut suisse de droit. L'individu face aux nouvelles technologies: Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche: Schulthess, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Border security: Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C: United States Government Accountability Office, 2005.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland security: Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.
Den vollen Inhalt der Quelle findenDecker, Bart. Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Biometric information protection"
Kevenaar, Tom. „Protection of Biometric Information“. In Security with Noisy Data, 169–93. London: Springer London, 2007. http://dx.doi.org/10.1007/978-1-84628-984-2_11.
Der volle Inhalt der QuelleSamandari, Juliet, und Amelia Samandari. „Biometric Protection and Security“. In Information Technology Security and Risk Management, 278–83. New York: CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-41.
Der volle Inhalt der QuelleRathgeb, Christian, Andreas Uhl und Peter Wild. „Experiments on Iris Biometric Template Protection“. In Advances in Information Security, 245–65. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5571-4_14.
Der volle Inhalt der QuelleSasikaladevi, N., A. Revathi, N. Mahalakshmi und N. Archana. „HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection“. In Communications in Computer and Information Science, 312–20. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_31.
Der volle Inhalt der QuellePanigrahy, Saroj Kumar, Debasish Jena, Sathya Babu Korra und Sanjay Kumar Jena. „On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature“. In Communications in Computer and Information Science, 182–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03547-0_18.
Der volle Inhalt der QuelleSprokkereef, Annemarie. „Data Protection and the use of Biometric Data in the EU“. In The Future of Identity in the Information Society, 277–84. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79026-8_19.
Der volle Inhalt der QuelleRot, Peter, Peter Peer und Vitomir Štruc. „Detecting Soft-Biometric Privacy Enhancement“. In Handbook of Digital Face Manipulation and Detection, 391–411. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.
Der volle Inhalt der QuelleBleumer, Gerrit. „Biometric yet Privacy Protecting Person Authentication“. In Information Hiding, 99–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49380-8_8.
Der volle Inhalt der QuelleFornazin, Marcelo, Danilo B. S. Netto, Marcos Antonio Cavenaghi und Aparecido N. Marana. „Protecting Medical Images with Biometric Information“. In Advances in Computer and Information Sciences and Engineering, 284–89. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8741-7_52.
Der volle Inhalt der QuelleLi, ChunLei, Bin Ma, Yunhong Wang und Zhaoxiang Zhang. „Protecting Biometric Templates Using Authentication Watermarking“. In Advances in Multimedia Information Processing - PCM 2010, 709–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15702-8_65.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Biometric information protection"
Barannik, Vladimir, Sergii Shulgin, Serhii Holovchenko, Pavlo Hurzhiy, Sergy Sidchenko und Pris Gennady. „Method of Hierarchical Protection of Biometric Information“. In 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT). IEEE, 2021. http://dx.doi.org/10.1109/aict52120.2021.9628915.
Der volle Inhalt der QuelleChung, Yunsu, Kiyoung Moon und Hyung-Woo Lee. „Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism“. In 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.151.
Der volle Inhalt der QuelleGhouzali, Sanaa, und Wadood Abdul. „Private chaotic biometric template protection algorithm“. In 2013 IEEE Second International Conference on Image Information Processing (ICIIP). IEEE, 2013. http://dx.doi.org/10.1109/iciip.2013.6707676.
Der volle Inhalt der QuelleFarafonova, A. E., und E. L. Turnetskaya. „TECHNOLOGIES OF BIOMETRIC PERSON’S IDENTIFICATION“. In PROCESSING, TRANSMISSION AND PROTECTION OF INFORMATION IN COMPUTER SYSTEMS. St. Petersburg State University of Aerospace Instrumentation, 2020. http://dx.doi.org/10.31799/978-5-8088-1452-3-2020-1-43-49.
Der volle Inhalt der QuelleLozhkova, A. „PROTECTION OF BIOMETRIC PERSONAL DATA IN MEDICAL INFORMATION SYSTEMS“. In XIV International Scientific Conference "System Analysis in Medicine". Far Eastern Scientific Center of Physiology and Pathology of Respiration, 2020. http://dx.doi.org/10.12737/conferencearticle_5fe01d9bc43a05.55251061.
Der volle Inhalt der QuelleWang, Zhifang, Qi Han, Xiamu Niu und Christoph Busch. „Template Protection for Multimodal Biometric System“. In 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.269.
Der volle Inhalt der QuelleJin, Andrew Teoh Beng, und Jaihie Kim. „FuzzyHash: A Secure Biometric Template Protection Technique“. In 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.31.
Der volle Inhalt der QuelleIslam, Md Rajibul, Md Shohel Sayeed und Andrews Samraj. „Biometric template protection using watermarking with hidden password encryption“. In 2008 International Symposium on Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/itsim.2008.4631572.
Der volle Inhalt der QuelleZhou, Xuebing, Stephen D. Wolthusen, Christoph Busch und Arjan Kuijper. „Feature Correlation Attack on Biometric Privacy Protection Schemes“. In 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.237.
Der volle Inhalt der QuelleMeints, Martin, Heinz Biermann, Manfred Bromba, Christoph Busch, Gerrit Hornung und Gisela Quiring-Kock. „Biometric Systems and Data Protection Legislation in Germany“. In 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2008. http://dx.doi.org/10.1109/iih-msp.2008.314.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Biometric information protection"
Roberts, Tony, Judy Gitahi, Patrick Allam, Lawrence Oboh, Oyewole Oladapo, Gifty Appiah-Adjei, Amira Galal et al. Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia. Institute of Development Studies, September 2023. http://dx.doi.org/10.19088/ids.2023.027.
Der volle Inhalt der Quelle