Academic literature on the topic 'BIOMETRIC FRAMEWORK'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'BIOMETRIC FRAMEWORK.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "BIOMETRIC FRAMEWORK"

1

Srivastava, Prateek, and Rohit Srivastava. "A Multimodal Based Approach for Face and Unique Mark Based Combination for Confirmation of Human." International Journal of Business Analytics 6, no. 3 (July 2019): 16–28. http://dx.doi.org/10.4018/ijban.2019070102.

Full text
Abstract:
Biometric processes are utilized for recognition and distinguishing a person for different applications. The procedure is made possible by utilizing single biometric highlight or a mix of biometric highlights. In the event that the distinguishing proof is finished by utilizing a solitary biometric highlight (confront, iris, finger, palm, and so forth) then the framework is called unimodal, and if a combnation of biometrics are utilized then it is called multimodal. In a multimodal framework compared to the different downsides of a unimodal framework (noisy data, multiple vectors and so forth) are evacuated. The fundamental objective of the proposed work is to outline a system that will give validation in view of three-level verification for a man. Prior works in this field are clarified in various factual models in view of various verification plans. In the proposed strategy, a system is created in which if one biometric attribute fails then the other biometic characteristics can be utilized for verification.
APA, Harvard, Vancouver, ISO, and other styles
2

Srivastava, Rohit, Ved Prakash Bhardwaj, Mohamed Tahar Ben Othman, Mukesh Pushkarna, Anushree, Arushi Mangla, Mohit Bajaj, Ateeq Ur Rehman, Muhammad Shafiq, and Habib Hamam. "Match-Level Fusion of Finger-Knuckle Print and Iris for Human Identity Validation Using Neuro-Fuzzy Classifier." Sensors 22, no. 10 (May 10, 2022): 3620. http://dx.doi.org/10.3390/s22103620.

Full text
Abstract:
Biometrics is the term for measuring human characteristics. If the term is divided into two parts, bio means life, and metric means measurement. The measurement of humans through different computational methods is performed to authorize a person. This measurement can be performed via a single biometric or by using a combination of different biometric traits. The combination of multiple biometrics is termed biometric fusion. It provides a reliable and secure authentication of a person at a higher accuracy. It has been introduced in the UIDIA framework in India (AADHAR: Association for Development and Health Action in Rural) and in different nations to figure out which biometric characteristics are suitable enough to authenticate the human identity. Fusion in biometric frameworks, especially FKP (finger–knuckle print) and iris, demonstrated to be a solid multimodal as a secure framework. The proposed approach demonstrates a proficient and strong multimodal biometric framework that utilizes FKP and iris as biometric modalities for authentication, utilizing scale-invariant feature transform (SIFT) and speeded up robust features (SURF). Log Gabor wavelet is utilized to extricate the iris feature set. From the extracted region, features are computed using principal component analysis (PCA). Both biometric modalities, FKP and iris, are combined at the match score level. The matching is performed using a neuro-fuzzy neural network classifier. The execution and accuracy of the proposed framework are tested on the open database Poly-U, CASIA, and an accuracy of 99.68% is achieved. The accuracy is higher compared to a single biometric. The neuro-fuzzy approach is also tested in comparison to other classifiers, and the accuracy is 98%. Therefore, the fusion mechanism implemented using a neuro-fuzzy classifier provides the best accuracy compared to other classifiers. The framework is implemented in MATLAB 7.10.
APA, Harvard, Vancouver, ISO, and other styles
3

Sabharwal, Munish. "Multi-Modal Biometric Authentication and Secure Transaction Operation Framework for E-Banking." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 102–16. http://dx.doi.org/10.4018/ijbdcn.2017010109.

Full text
Abstract:
The rationale of the research work is to suggest a multi-modal biometric authentication and secure transaction operation framework for E-Banking. The literature survey identifies the various types of E-Banking Channels available as on-date, the various types of biometric technologies available as on-date as well the significant metrics affecting their performance while deploying them in various different e-banking channels. The performance analysis of various types of biometric technologies based on significant metrics for Biometrics Implementation further identifies the currently implementable biometric technologies for the various different e-banking channels. Subsequently a requirement analysis of potential e-banking channels is followed by System Suitability Analysis to identify which multi-biometrics and support mechanisms are suitable for particular e-banking channels. The final conclusion suggests a viable multi-modal biometric authentication and secure transaction operation framework for various e-banking channels.
APA, Harvard, Vancouver, ISO, and other styles
4

Sable, Harsh, and Divya Bajpai Tripathy. "A Review on Comparative Analysis on Different Sort of Physiological and Behavioral Biometric Framework." International Journal of Advance Research and Innovation 9, no. 2 (2021): 1–9. http://dx.doi.org/10.51976/ijari.922101.

Full text
Abstract:
Biometrics as the investigation of seeing an individual ward on their physical or conduct characteristics, biometric have now been conveyed in diverse business, ordinary resident and national security applications. Customarily the usage of biometrics devices has improved our capacity to give approved entry to material foundations. Biometric is the usage of a person's novel physiological, lead, and morphological trademark to give valuable person distinguishing proof. Biometric structures that are starting at now available today break down fingerprints, engravings, iris and retina models, and face. Mechanisms that are similar to biometrics anyway are not named such are lead systems, for instance, voice, imprint and keystroke mechanisms. These days biometrics is in effect effectively executed in numerous fields like measurable, security, recognizable proof and approval frameworks.
APA, Harvard, Vancouver, ISO, and other styles
5

Omar, Bayan, Hamsa D. Majeed, Siti Zaiton Mohd Hashim, and Muzhir Al-Ani. "New Feature-level Algorithm for a Face-fingerprint Integral Multi-biometrics Identification System." UHD Journal of Science and Technology 6, no. 1 (February 11, 2022): 12–20. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp12-20.

Full text
Abstract:
This article delves into the power of multi-biometric fusion for individual identification. a new feature-level algorithm is proposed that is the Dis-Eigen algorithm. Here, a feature-fusion framework is proposed for attaining better accuracy when identifying individuals for multiple biometrics. The framework, therefore, underpins the new multi-biometric system as it guides multi-biometric fusion applications at the feature phase for identifying individuals. In this regard, the Face-fingerprints of 20 individuals represented by 160 images were used in this framework . Experimental resultants of the proposed approach show 93.70 % identification rate with feature-level fusion multi-biometric individual identification.
APA, Harvard, Vancouver, ISO, and other styles
6

Musambo, Lubasi Kakwete, and Jackson Phiri. "A Framework for Civil Registration in Developing Countries Based on Biometrics and ISO Standards." International Journal of ICT Research in Africa and the Middle East 8, no. 2 (July 2019): 32–74. http://dx.doi.org/10.4018/ijictrame.2019070103.

Full text
Abstract:
Most developing countries in Africa have civil registration processes with inherent challenges that inhibit their efficiency and accuracy. Attempts at modernization and improvement are on-going. In this article, a biometric framework that can be used to mitigate the challenges inherent in biometric data management for the civil registration system in Zambia is presented. The proposed framework presented is based on ISO models and adapted for most developing countries with low Information and Communication Technologies. A baseline study was undertaken to assess the understanding and appreciation of biometrics within the Zambian community and how this data might be stored or managed. A study of the Zambian civil registration business process has been undertaken and the authors propose an automated civil registration business process. Results obtained show that currently, Zambia does NOT have a biometric framework that supervises use of biometric data. The proposed model once adopted would form a secure framework for civil registration based on biometrics and ISO standards.
APA, Harvard, Vancouver, ISO, and other styles
7

Jovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.

Full text
Abstract:
Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digital identity management and MMBio framework for multimodal biometrics. Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data. Developed prototype confirms possible integration of identity management and multimodal biometric systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Jacobsen, Katja Lindskov. "Biometric data flows and unintended consequences of counterterrorism." International Review of the Red Cross 103, no. 916-917 (April 2021): 619–52. http://dx.doi.org/10.1017/s1816383121000928.

Full text
Abstract:
AbstractExamining unintended consequences of the makings and processing of biometric data in counterterrorism and humanitarian contexts, this article introduces a two-fold framework through which it analyzes biometric data-makings and flows in Afghanistan and Somalia. It combines Tilley's notion of “living laboratory” and Larkin's notion of infrastructure into a framework that attends to the conditions under which biometric data is made and to subsequent flows of such data through data-sharing agreements or unplanned access. Exploring such unintended consequences, attention needs to be paid to the variety of actors using biometrics for different purposes yet with data flows across such differences. Accordingly, the article introduces the notion of digital intervention infrastructures, with biometric databases as one dimension.
APA, Harvard, Vancouver, ISO, and other styles
9

Srivastava, Rohit. "Score-Level Multimodal Biometric Authentication of Humans Using Retina, Fingerprint, and Fingervein." International Journal of Applied Evolutionary Computation 11, no. 3 (July 2020): 20–30. http://dx.doi.org/10.4018/ijaec.2020070102.

Full text
Abstract:
This paper characterizes a multi-modular framework for confirmation, dependent on the biometric combination of retina, finger vein, and unique mark acknowledgment. The authors have proposed feature extraction in retina acknowledgment model by utilizing SIFT and MINUTIA. Security is the fundamental idea in ATM (Automated Teller Machines) today. The use of multi-modular biometrics can be ATM. The work includes three biometric attributes of a client to be specific retina, unique mark, and finger veins. These are pre-prepared and joined (fused) together for score level combination approach. Retina is chosen as a biometric attribute as there are no parallel retina feature matches except if they are of the comparative client; likewise, retina has a decent vessel design making it a decent confirming methodology when contrasted with other biometric attributes. Security is found in the framework by multi-modular biometric combination of retina with finger vein and unique finger impression. Feature extraction approach and cryptography are utilized so as to accomplish security. The element extraction is finished with the assistance of MINUTIA and SIFT calculation, which are at that point characterized utilizing deep neural network (DNN). The element key focuses are intertwined at score level utilizing separation normal and later matched. The test result assessed utilizing MATLAB delineates the significant improvement in the presentation of multi-modular biometric frameworks with higher qualities in GAR and FAR rates.
APA, Harvard, Vancouver, ISO, and other styles
10

Yaman, Mehmet, Abdulhamit Subasi, and Frank Rattay. "Comparison of Random Subspace and Voting Ensemble Machine Learning Methods for Face Recognition." Symmetry 10, no. 11 (November 19, 2018): 651. http://dx.doi.org/10.3390/sym10110651.

Full text
Abstract:
Biometry based authentication and recognition have attracted greater attention due to numerous applications for security-conscious societies, since biometrics brings accurate and consistent identification. Face biometry possesses the merits of low intrusiveness and high precision. Despite the presence of several biometric methods, like iris scan, fingerprints, and hand geometry, the most effective and broadly utilized method is face recognition, because it is reasonable, natural, and non-intrusive. Face recognition is a part of the pattern recognition that is applied for identifying or authenticating a person that is extracted from a digital image or a video automatically. Moreover, current innovations in big data analysis, cloud computing, social networks, and machine learning have allowed for a straightforward understanding of how different challenging issues in face recognition might be solved. Effective face recognition in the enormous data concept is a crucial and challenging task. This study develops an intelligent face recognition framework that recognizes faces through efficient ensemble learning techniques, which are Random Subspace and Voting, in order to improve the performance of biometric systems. Furthermore, several methods including skin color detection, histogram feature extraction, and ensemble learner-based face recognition are presented. The proposed framework, which has a symmetric structure, is found to have high potential for biometrics. Hence, the proposed framework utilizing histogram feature extraction with Random Subspace and Voting ensemble learners have presented their superiority over two different databases as compared with state-of-art face recognition. This proposed method has reached an accuracy of 99.25% with random forest, combined with both ensemble learners on the FERET face database.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "BIOMETRIC FRAMEWORK"

1

Van, de Haar Helen Augusta. "A framework for biometrics for social grants in South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021018.

Full text
Abstract:
In the South African Social Security Agency (SASSA) Annual Report of 2011/2012 it is stated that there were more than 15 million social grants paid out to needy beneficiaries of which 10 927 731 were Child Support Grants. A major challenge that is continually being addressed is the management and administration of these grants. In particular, the focus is on service delivery and zero tolerance to fraud and corruption. SASSA has made various attempts to address these issues, such as the rollout of biometric smart cards in 2012. This research endeavour attempts to discover whether a framework can be designed where necessary factors are taken into consideration to provide for an efficient social grant application and delivery process that uses biometrics. The framework aims to suggest improvements in the use of biometrics for the social grants. Seeing that biometrics in this case is used as a technology to improve a system involving humans, this study followed a Design Science approach and made use of a case study to collect the data required for the study. Literature studies reviewed the fields of social grants and biometrics. The challenges and lessons learnt from current implementations of social grants and biometrics within the South African context and further abroad were also relevant for the study. The framework that resulted from the above was evaluated for validity and applicability after which a modified framework is presented. The research concludes with specific implementation guidelines as well as areas for future research.
APA, Harvard, Vancouver, ISO, and other styles
2

Kalaf, William M. "Arizona law enforcement biometrics identification and information sharing technology framework." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FKalaf.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2010.
Thesis Advisor(s): Bergin, Richard ; Josefek, Robert. "March 2010." Description based on title screen as viewed on April 28, 2010. Author(s) subject terms: Arizona Criminal Justice Commission, biometrics technology, biometrics identification, facial recognition, fingerprint identification, law enforcement, information sharing, criminal information sharing, Arizona, Mexico, New Mexico, Texas, California, RISC, AFIS, IAFIS, NGI, governors border conferences, Central America, south west border initiative. Includes bibliographical references (p. 87-92). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Rautenbach, James. "Towards a framework for identity verification of vulnerable children within the Eastern Cape." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/597.

Full text
Abstract:
This dissertation proposes the development of an identification verification model that can be implemented within the context of the Eastern Cape, South Africa in order to ensure that vulnerable children are provided with the requisite care that they deserve from the state. The dissertation provides both a developed and developing world perspective on the identification verification needs of vulnerable children by providing an overview of relevant South African policy with regard to caring for vulnerable children and presenting an international perspective with specific reference to current legislative developments in the United Kingdom and Malaysia. Chapter 1 provides a motivation for a framework to be used for the identification verification of children in developing countries by emphasising that the provision of basic social services to children is an urgent requirement for poverty eradication and is a necessity as documented in the United Nations Convention on the Rights of the Child. A background to the needs of vulnerable children in South Africa is given and the scope, limitations and research methodology used in the dissertation is presented. Chapter 2 provides an overview of child related policy in the South African Context both from a National Government and Eastern Cape perspective. Although extensive progress has been made in the development of policies aimed at protecting vulnerable children, the practical implementation of these policies has been hampered by numerous issues including the lack of coordination between key entities. Chapter 3 provides an introduction to several noteworthy international developments with regard to the identity verification of vulnerable children. Lessons learnt from identity verification systems from the United Kingdom and Malaysia are analyzed for applicability to the South African context. In addition to this, the use of biometric technology in identity verification systems and a number of biometric identification methodologies available are discussed. Chapter 4 proposes the development and implementation of a biometric identity verification model in the Eastern Cape Province of South Africa based on lessons learnt from the assessment of South African policy and international best practice. The system should be piloted in the Eastern Cape and, if successful, be implemented throughout South Africa with a possible view to future implementation on the African continent. The scope of the system, the technological requirements and a high level implementation plan together with the need to further research certain key aspects e.g. the cost implications are discussed. It is clear that the development of such a model and the implementation of such a system will ensure that vulnerable children are provided with the requisite care that they are constitutionally entitled to. Significant follow up research is required during the development of the model to ensure that all aspects of the model are well documented and during the implementation of the system to ensure that the requirements of the users both within the government and the general public are met.
APA, Harvard, Vancouver, ISO, and other styles
4

Ndlangisa, Mboneli. "DRUBIS : a distributed face-identification experimentation framework - design, implementation and performance issues." Thesis, Rhodes University, 2004. http://eprints.ru.ac.za/93/1/MNdlangisa-MSc.pdf.

Full text
Abstract:
We report on the design, implementation and performance issues of the DRUBIS (Distributed Rhodes University Biometric Identification System) experimentation framework. The Principal Component Analysis (PCA) face-recognition approach is used as a case study. DRUBIS is a flexible experimentation framework, distributed over a number of modules that are easily pluggable and swappable, allowing for the easy construction of prototype systems. Web services are the logical means of distributing DRUBIS components and a number of prototype applications have been implemented from this framework. Different popular PCA face-recognition related experiments were used to evaluate our experimentation framework. We extract recognition performance measures from these experiments. In particular, we use the framework for a more indepth study of the suitability of the DFFS (Difference From Face Space) metric as a means for image classification in the area of race and gender determination.
APA, Harvard, Vancouver, ISO, and other styles
5

Baig, Asim. "Biometric fusion frameworks." Thesis, Queen's University Belfast, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.534635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hassanzadeh, Reza. "A secure framework and related protocols for ubiquitous access to electronic health records using Java sim cards." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37589/1/Reza_Hassanzadeh_Thesis.pdf.

Full text
Abstract:
Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the point-ofcare could possibly lead to a fatality. The U.S. Institute of Medicine has reported that between 44,000 and 98,000 people die each year due to medical errors, such as incorrect medication dosages, due to poor legibility in manual records, or delays in consolidating needed information to discern the proper intervention. In this research we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHR). A partial EHR contained within a JSC can be used at the point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Health Records Centre (EHRC) when time and network availability permit. Moreover, this framework and related protocols enable patients to give their explicit consent to a doctor to access their personal medical data, by using their Smart Phone, when the doctor needs to see or update the patient’s medical information during an examination. Also our proposed solution would give the power to patients to modify the Access Control List (ACL) related to their EHRs and view their EHRs through their Smart Phone. Currently, very limited research has been done on using JSCs and similar technologies as a portable repository of EHRs or on the specific security issues that are likely to arise when JSCs are used with ubiquitous access to EHRs. Previous research is concerned with using Medicare cards, a kind of Smart Card, as a repository of medical information at the patient point-of-care. However, this imposes some limitations on the patient’s emergency medical care, including the inability to detect the patient’s location, to call and send information to an emergency room automatically, and to interact with the patient in order to get consent. The aim of our framework and related protocols is to overcome these limitations by taking advantage of the SIM card and the technologies mentioned above. Briefly, our framework and related protocols will offer the full benefits of accessing an up-to-date, precise, and comprehensive medical history of a patient, whilst its mobility will provide ubiquitous access to medical and patient information everywhere it is needed. The objective of our framework and related protocols is to automate interactions between patients, healthcare providers and insurance organisations, increase patient safety, improve quality of care, and reduce the costs.
APA, Harvard, Vancouver, ISO, and other styles
7

Chitiprolu, Jyothi. "Three Factor Authentication Using Java Ring and Biometrics." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/187.

Full text
Abstract:
Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple factors to authenticate. One of the ways to use multiple factors is to use all the three factors of authentication, something you possess, something you are and something you know. This thesis discusses about different ways of authentication and implements a system using three factor authentication. It takes many security aspects of the system into consideration while implementing it, to make it secure.
APA, Harvard, Vancouver, ISO, and other styles
8

Meharia, Pallavi. "Secure Trust Establishment in an Internet of Things Framework." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1479818898487158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Leonard, Dwayne Christopher. "A Framework for the Creation of a Unified Electronic Medical Record Using Biometrics, Data Fusion and Belief Theory." Scholarly Repository, 2007. http://scholarlyrepository.miami.edu/oa_dissertations/246.

Full text
Abstract:
The technology exists for the migration of healthcare data from its archaic paper-based system to an electronic one and once in digital form, to be transported anywhere in the world in a matter of seconds. The advent of universally accessible healthcare data benefits all participants, but one of the outstanding problems that must be addressed is how to uniquely identify and link a patient to his or her specific medical data. To date, a few solutions to this problem have been proposed that are limited in their effectiveness. We propose the use of biometric technology within our FIRD framework in solving the unique association of a patient to his or her medical data distinctively. This would allow a patient to have real time access to all of his or her recorded healthcare information electronically whenever it is necessary, securely with minimal effort, greater effectiveness, and ease.
APA, Harvard, Vancouver, ISO, and other styles
10

Ozdemir, Musa Kazim. "A Framework For Authentication Of Medical Reports Based On Keystroke Dynamics." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612081/index.pdf.

Full text
Abstract:
Privacy of personal health records is of ultimate importance. Unfortunately, it is easy to obtain illegal access to electronic health records under insufficient security precautions. Access control based on token or username/password is not adequate for applications in health domain which require heightened security. Currently, electronic signature mechanisms are being employed as a strong alternative to classic methods. In addition, biometrics provide more precise results in comparison to electronic signature methods. However, applicability of biometrics in this field has been prohibited by factors such as the need for special hardware, increased implementation costs, and invasiveness of the biometry sensors (eg. iris topology, fingerprint). Behavioral biometrics such as speech, and keystroke dynamics are easier to implement, and do not suffer from the disadvantages mentioned for the static biometrics. Especially, using keystroke dynamics for user authentication is more advantageous than other advanced biometrics because the implementation is inexpensive and continuous identity control is plausible. The aim of this study is to show the feasibility of merging a biometry-based advanced identity verification method together with an initial access control procedure such as password check. In this study, we provide an authentication framework based on measuring similarity of the typing characteristics of medical reporters, while they are typing medical reports. We have made a prototype of the system and provided classification of keystroke timings for each operator. We have generated a testbed and measured similarity of typing patterns of 5 medical reporters upon typing 4 different kinds of medical reports. Our system performs with hundred percent accuracy in identifying the authorized operators from the reports they type. In current practice, electronic signatures are indispensable for health information systems, but our study shows that keystroke dynamics can easily be included in this chain for increased security.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "BIOMETRIC FRAMEWORK"

1

Maksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian) and international levels. A technological approach has been applied to the consideration of security issues in the global information space, within the framework of which the organizational, technical and legal principles of ensuring information security in cyberspace, as well as ways and means of ensuring security in the global information space have been studied. It is given not only an assessment of the level of use of funds, their interrelation and mutual complement, but also the legal characteristics of security tools in the global information space, for example cryptographic. The resources allocated for the implementation of the type of legal technology under study that were not previously allocated in the legal literature, for example, scientific and economic. The features of the protection of personal information on the Internet are considered, as well as modern problems of legal security in the global information environment, including cybersecurity in banking, healthcare, and biometric data security. The problems of international cooperation in the field of information security are highlighted. For a wide range of readers interested in information security issues. It can be useful for students, postgraduates and teachers of law schools and faculties.
APA, Harvard, Vancouver, ISO, and other styles
2

Common Biometric Exchange Formats Framework (CBEFF). Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Subramaniam, Banu, ed. A Genealogy of Variation. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038655.003.0003.

Full text
Abstract:
This chapter traces the genealogy of variation, as shaped by Charles Darwin and his legacy of evolution by natural selection. It argues that tracing the history of variation through a naturecultural framework reveals the inherent underlying logic of eugenics. A naturecultural framework allows us to see that evolutionary biologists have long wrestled with some version of what we recognize as the nature/nurture debates. Furthermore, in chronicling this history, the chapter deals with the major figures, including the four patriarchs, or fathers, of the field: Darwin, the father of evolution; Galton, the father of biometry; Malthus, the father of demography; and Mendel, the father of genetics.
APA, Harvard, Vancouver, ISO, and other styles
4

Bindemann, Markus, ed. Forensic Face Matching. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198837749.001.0001.

Full text
Abstract:
Person identification at passport control, at borders, in police investigations, and in criminal trials relies critically on the identity verification of people via image-to-image or person-to-image comparison. While this task is known as ‘facial image comparison’ in forensic settings, it has been studied as ‘unfamiliar face matching’ in cognitive science. This book brings together expertise from practitioners, and academics in psychology and law, to draw together what is currently known about these tasks. It explains the problem of identity impostors and how within-person variability and between-person similarity, due to factors such as image quality, lighting direction, and view, affect identification. A framework to develop a cognitive theory of face matching is offered. The face-matching abilities of untrained lay observers, facial reviewers, facial examiners, and super-recognizers are analysed and contrasted. Individual differences between observers, learning and training for face recognition and face matching, and personnel selection are reviewed. The admissibility criteria of evidence from face matching in legal settings are considered, focusing on aspects such as the requirement of relevance, the prohibition on evidence of opinion, and reliability. Key concepts relevant to automatic face recognition algorithms at airports and in police investigations are explained, such as deep convolutional neural networks, biometrics, and human–computer interaction. Finally, new security threats in the form of hyper-realistic mask disguises are considered, including the impact these have on person identification in applied and laboratory settings.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "BIOMETRIC FRAMEWORK"

1

Zhang, He, Jing Liu, Zhiguo Zeng, Qianli Zhou, Shengguang Li, Xingguang Li, and Hui Zhang. "Hybrid Fusion Framework for Iris Recognition Systems." In Biometric Recognition, 468–75. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97909-0_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Yingchun, and Li Chen. "Toward Emotional Speaker Recognition: Framework and Preliminary Results." In Biometric Recognition, 235–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35136-5_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Haifeng, Shuhai Chen, Shaojie Zhang, and Siqi Wang. "An Automated Brain Tumor Segmentation Framework Using Multimodal MRI." In Biometric Recognition, 609–19. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97909-0_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qu, Hongxu, Haigang Zhang, Jinfeng Yang, Zhitao Wu, and Liming He. "A Generalized Graph Features Fusion Framework for Finger Biometric Recognition." In Biometric Recognition, 267–76. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86608-2_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Zhenan, Tieniu Tan, and Yunhong Wang. "Robust Encoding of Local Ordinal Measures: A General Framework of Iris Recognition." In Biometric Authentication, 270–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chuchvara, Aleksandra, Mihail Georgiev, and Atanas Gotchev. "A Framework for Fast Low-Power Multi-sensor 3D Scene Capture and Reconstruction." In Biometric Authentication, 40–53. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Podio, Fernando L., Fred Herr, and Yooyoung Lee. "Common Biometric Exchange Formats Framework Standardization." In Encyclopedia of Biometrics, 1–10. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_228-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Podio, Fernando L., and Fred Herr. "Common Biometric Exchange Formats Framework Standardization." In Encyclopedia of Biometrics, 183–89. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Podio, Fernando, Fred Herr, and Yooyoung Lee. "Common Biometric Exchange Formats Framework Standardization." In Encyclopedia of Biometrics, 304–13. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karabina, Koray, and Angela Robinson. "Extending a Framework for Biometric Visual Cryptography." In Cryptology and Network Security, 481–94. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00434-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "BIOMETRIC FRAMEWORK"

1

Mishra, Prince, Vishwas Modanwal, Harkeerat Kaur, and Gaurav Varshney. "Pseudo-Biometric Identity Framework: Achieving Self-Sovereignity for Biometrics on Blockchain." In 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2021. http://dx.doi.org/10.1109/smc52423.2021.9659136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Venkatraman, Sitalakshmi. "An Adaptive Framework for Biometric Systems." In 2009 International Conference on Computer Engineering and Technology (ICCET). IEEE, 2009. http://dx.doi.org/10.1109/iccet.2009.98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahamad, Shaik Shakeel, V. N. Sastry, and Madhusoodhnan Nair. "A Biometric based Secure Mobile Payment Framework." In 2013 4th International Conference on Computer and Communication Technology (ICCCT). IEEE, 2013. http://dx.doi.org/10.1109/iccct.2013.6749634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Holland, Corey D., and Oleg V. Komogortsev. "Software framework for an ocular biometric system." In ETRA '14: Eye Tracking Research and Applications. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2578153.2582174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Punithavathi, P., S. Geetha, and Sundaravel Shanmugam. "Cloud-Based Framework for Cancelable Biometric System." In 2017 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM). IEEE, 2017. http://dx.doi.org/10.1109/ccem.2017.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mahfouz, Ahmed, Tarek M. Mahmoud, and Ahmed Sharaf Eldin. "A Behavioral Biometric Authentication Framework on Smartphones." In ASIA CCS '17: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3052973.3055160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Talreja, Veeru, Terry Ferrett, Matthew C. Valenti, and Arun Ross. "Biometrics-as-a-service: A framework to promote innovative biometric recognition in the cloud." In 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2018. http://dx.doi.org/10.1109/icce.2018.8326075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sundararajan, Aditya, Alexander Pons, and Arif I. Sarwat. "A Generic Framework for EEG-Based Biometric Authentication." In 2015 12th International Conference on Information Technology - New Generations (ITNG). IEEE, 2015. http://dx.doi.org/10.1109/itng.2015.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Agrafioti, Foteini, Francis M. Bui, and Dimitrios Hatzinakos. "On supporting anonymity in a BAN biometric framework." In 2009 16th International Conference on Digital Signal Processing (DSP). IEEE, 2009. http://dx.doi.org/10.1109/icdsp.2009.5201080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhatt, Himanshu S., Samarth Bharadwaj, Mayank Vatsa, Richa Singh, Arun Ross, and Afzel Noore. "A framework for quality-based biometric classifier selection." In 2011 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2011. http://dx.doi.org/10.1109/ijcb.2011.6117518.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "BIOMETRIC FRAMEWORK"

1

Podio, Fernando L., Jeffrey S. Dunn, Lawrence Reinert, Catherine J. Tilton, Bruno Struif, Fred Herr, Jim Russell, et al. Common biometric exchange formats framework (CBEFF). Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.6529-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

McGinnis, Christofer J., Dylan J. Yaga, and Fernando L. Podio. Conformance Testing Methodology Framework for ANSI/NIST-ITL 1-2011 Update: 2013, Data Format for the Interchange of Fingerprint, Facial [and] Other Biometric Information. National Institute of Standards and Technology, June 2015. http://dx.doi.org/10.6028/nist.sp.500-304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Тарасова, Олена Юріївна, and Ірина Сергіївна Мінтій. Web application for facial wrinkle recognition. Кривий Ріг, КДПУ, 2022. http://dx.doi.org/10.31812/123456789/7012.

Full text
Abstract:
Facial recognition technology is named one of the main trends of recent years. It’s wide range of applications, such as access control, biometrics, video surveillance and many other interactive humanmachine systems. Facial landmarks can be described as key characteristics of the human face. Commonly found landmarks are, for example, eyes, nose or mouth corners. Analyzing these key points is useful for a variety of computer vision use cases, including biometrics, face tracking, or emotion detection. Different methods produce different facial landmarks. Some methods use only basic facial landmarks, while others bring out more detail. We use 68 facial markup, which is a common format for many datasets. Cloud computing creates all the necessary conditions for the successful implementation of even the most complex tasks. We created a web application using the Django framework, Python language, OpenCv and Dlib libraries to recognize faces in the image. The purpose of our work is to create a software system for face recognition in the photo and identify wrinkles on the face. The algorithm for determining the presence and location of various types of wrinkles and determining their geometric determination on the face is programmed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography