Academic literature on the topic 'Biometric identification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric identification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometric identification"

1

Shopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, and Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions." Journal of Cybersecurity and Privacy 1, no. 3 (August 31, 2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.

Full text
Abstract:
Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article concludes with open questions and provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.
APA, Harvard, Vancouver, ISO, and other styles
2

Mudhafer Taher Al Mossawy, Mais, and Loay E. George. "A digital signature system based on hand geometry - Survey." Wasit Journal of Computer and Mathematics Science 1, no. 1 (April 1, 2022): 1–14. http://dx.doi.org/10.31185/wjcm.vol1.iss1.18.

Full text
Abstract:
In recent years large number of emerging automated applications faces the need to have recognition abilities of persons using their own self biometrics, before they can access the applications services. Nowadays, Biometric recognition is used, it can be used as automatic identification or automatic verification of persons based on their physiological or behavioral characteristics. There are no perfect biometric measurements;each biometry has its advantages and limitations. Each biometry requires specific vital identity to answer the identification or verification question. The suitability of a particular biometry for a particular application depends on many factors. Hand geometry/shape is a very simple biometric technology that uses the measurements of human hand to verify the identity of the individuals. The measurements include the distance between certain mark points, shape and width of fingers and size of palm. The biometric systems that employing hand geometry become widely used since they have high public acceptance. This article aims to survey several articles found in literature about hand based biometric system, and to compare different methods of biometric recognition that based on hand geometry.
APA, Harvard, Vancouver, ISO, and other styles
3

., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.

Full text
Abstract:
Biometrics is the discipline to measure physical human characteristics for the identification and authentication of an individual. Since ancient times, people have used voice, face, and other characteristics for the identification of an individual. With evolution, we take the individual characteristics like fingerprint scans, retina and iris images, etc., as inputs to the computer systems and then store or verify them with existing records. This report discusses biometrics and its recent roles found in the field of healthcare, medicine, genetics, and biotechnology. It includes the concept of biometrics, the system used for biometric recognition and its working, types of biometric systems, the different system algorithms applied, and system modules which are well illustrated with flow charts and block diagrams. Some of the health institutes in developed countries have started using biometric systems for checking patients and/or doctors. Biometry has enabled the proper organization and storage of the health records of individuals in medical institutes. Biometric authentication is also finding a distinct role in foiling medical claims fraud highlighting the advantages it. Even after processing via a very accurate biometric system, there is a chance of a false result due to some disease or injury to the body part subjected to biometry or faulty system leading to some error. There is also a possibility that the biometric system may harm our bodies. Moreover, biometric records need really tight system security to prevent any kind of misuse. Biometrics has a great potential to find a lot more uses in the field of healthcare. Many ideas are being proposed for implementation. In the future, biometrics can be used to detect potential disease and risks by using methods like adiposity measurement and Gas Discharge Visualization (GDV).
APA, Harvard, Vancouver, ISO, and other styles
4

Ayanaba, Rasheed Abubakar. "Image-assisted Biometric Identification." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 24, 2022): 131–38. http://dx.doi.org/10.22624/aims/crp-bk3-p22.

Full text
Abstract:
Biometrics is a rapidly developing technology that has seen widespread use in forensics applications such as criminal identification, secure access, and prison security. A biometric system is a pattern recognition system that recognizes a person by determining the authenticity of a physiological and/or behavioural feature that that person possesses. One of the most widely accepted biometrics utilized by humans in their visual interactions is image- assisted based (facial) biometric. Image-assisted biometric identification is the use of face recognition technology in capturing image of a unique feature of an individual such as an eye or face, and comparing it with a template captured earlier and stored a database. Face recognition is one of the more recent biometrics technologies. The system examines face features and tries to match them to a database of digitized images. This technology is quite new, having only been available commercially since the 1990s. Face recognition has gotten a lot of press after the 9/11 attacks because of its capacity to identify known terrorists and criminals. [1]. Although the technology is mostly utilized for security and law enforcement, there is growing interest in other applications. Keyword: Image-assisted based biometric identification, Face recognition technology, Image
APA, Harvard, Vancouver, ISO, and other styles
5

Diac, Madalina Maria, Simona Irina Damian, Bianca Diana Butincu, Anton Knieling, and Diana Bulgaru Iliescu. "Ethical Aspects of Biometric Identification." BRAIN. Broad Research in Artificial Intelligence and Neuroscience 14, no. 4 (December 19, 2023): 124–39. http://dx.doi.org/10.18662/brain/14.4/496.

Full text
Abstract:
The term biometrics derives from Greek (bio=life and metrics=measure) and implies the measurement of biological signs. Biometrics is the science of recognizing people based on their physical, behavioral, and physiological attributes, such as fingerprint, face scan, iris, retina, and voice. The present paper aims to develop a study on biometric identification. The major objective of the study is to conduct a survey among the Romanian population on the importance and knowledge of biometric identification methods. This objective was achieved by assessing the knowledge held by the general population of Romania regarding biometric indicators and the degree of adaptability and openness of citizens related to the widest possible implementation of biometrics. The study was based on conducting a quantitative analysis using a questionnaire. Due to the high degree of accessibility, the online environment was chosen as a method of application, distribution being made through social networks. A biometric template digitizes the human body, it has been argued that the collection of biometric identifiers not only interferes with the privacy and right to protection of a person's data, but also with the integrity of an individual's body. In conclusion, the creation and storage of a unique biometric template must be seen in relation to the purpose of the operation. The protection of citizens from criminal activities is a primary obligation of the state. However, it must be exercised with due respect for a number of fundamental ethical values and in the light of modern human rights law.
APA, Harvard, Vancouver, ISO, and other styles
6

Aruna, Boda, and Dr M. Kezia Joseph. "Multimodal Biometrics for Human Identification usingArtificial Intelligence." International Journal of Emerging Science and Engineering 12, no. 1 (December 30, 2023): 1–6. http://dx.doi.org/10.35940/ijese.a4278.1212123.

Full text
Abstract:
Multimodal biometric systems combine multiple biometric modalities to enhance the accuracy and security of human identification. Instead of relying on a single biometric trait (such as fingerprint or face), these systems use a combination of different biometric characteristics to provide a more robust and reliable identification process. The key idea behind multimodal biometrics is that the fusion of diverse biometric data can overcome the limitations of individual modalities, resulting in higher accuracy and lower error rates.
APA, Harvard, Vancouver, ISO, and other styles
7

Reddy, M. V. Bramhananda, and V. Goutham. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research -GRANTHAALAYAH 6, no. 1 (January 31, 2018): 80–90. http://dx.doi.org/10.29121/granthaalayah.v6.i1.2018.1596.

Full text
Abstract:
Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using iris or along with other biometrics for security with great precision. Multimodal biometric systems came into existence for better accuracy in human authentication. However, iris is considered to be most discriminatory of facial biometrics. Study of iris based human identification in ideal and non-cooperative environments can provide great insights which can help researchers and organizations that depend on iris-based biometric systems. The technical knowhow of iris strengths and weaknesses can be great advantage. This is more important in the wake of widespread use of smart devices which are vulnerable to attacks. This paper throws light into various iris-based biometric systems, issues with iris in the context of texture comparison, cancellable biometrics, iris in multi-model biometric systems, iris localization issues, challenging scenarios pertaining to accurate iris recognition and so on.
APA, Harvard, Vancouver, ISO, and other styles
8

Chinyemba, Melissa K., and Jackson Phiri. "Gaps in the Management and Use of Biometric Data: A Case of Zambian Public and Private Institutions." Zambia ICT Journal 2, no. 1 (June 29, 2018): 35–43. http://dx.doi.org/10.33260/zictjournal.v2i1.49.

Full text
Abstract:
The current physical and cybersecurity systems rely on traditional three-factor authentication to mitigate the threats posed by insider attacks. Key is the use of biometric information. Biometrics are a unique measurement and analysis of the unique physiological special traits such as voice, eye structure and others that can be used in the discipline of varying person identification. Biometry, which is the analysis of these biometrics is a complex process but guarantees identification and non-repudiation. If used to identify humans then several issues such as where is the biometric data stored? Who has access to it? And how does one ensure that such data satisfies the principle of availability. To achieve availability, secure transportation arises. To achieve transportation, non-repudiation, confidentiality and authentication, integrity arise. A storage and transport system is recommended to these challenges. In this paper, we explore the gaps into how public and private institution store and manage biometrics information. We benchmarked each organization again the ISO 30107 and ISO 24745. Our results show that while most companies are adopting and using biometrics systems, few have adopted the ISO biometrics standards that govern the storage and management of biometric information and hence creating security risk.
APA, Harvard, Vancouver, ISO, and other styles
9

Yaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.

Full text
Abstract:
Biometric is used as a main security fence in a computer system. The unique characteristics of a person can be distinguished from each other. Human’s biometrics can be categorized into three types: morphological, biological and behavioural. Morphological biometrics uses physical features for recognition. Biological biometrics used to identify user based on biological features. Behavioural biometrics such as gender, culture, height and weight can be used as an additional security measure within a system. These biometric behavioural features are also known as soft biometric. This study uses soft biometric elements (gender, culture, region of birth and educational level) in the keystroke dynamic study to distinguish typing patterns in each of these categories. The Support Vector Machine (SVM) classification method is used to perform this classification for soft biometric identification. The results of this study have shown that soft biometrics in keystroke dynamic can be used to distinguish group of individuals typing.
APA, Harvard, Vancouver, ISO, and other styles
10

Yin, Jing Hai, Zheng Dong Mu, and Jian Feng Hu. "Design of Identification System Based on BCI." Applied Mechanics and Materials 496-500 (January 2014): 1975–78. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1975.

Full text
Abstract:
Nowadays EEG-based identification biometric research becomes a new topic. Due to the current biometric technology are still exist some problems, therefore, an urgent needed is to find a new biometric technology. In this paper, we use EEG signals as biometrics, which is home to a new biometric research trends, cutting-edge and exploratory nature, there is a good prospect. We establish a set of EEG-based identification systems and medium-sized EEG signatures, explore effective methods of analysis biometric technology to make up for past deficiencies, to further improve and develop the theory of biometric technologies and applications for EEG-based identification technology promotion foundation.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Biometric identification"

1

Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
Abstract:
Thesis (Ph. D.)--Michigan State University. Dept. of Computer Science and Engineering, 2008.
Title from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Ellmauthaler, Andreas, and Eric Wernsperger. "Biometric Identification of Mice." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1135.

Full text
Abstract:

The identification of laboratory mice has been an important issue in pharmaceutical applications ever since tests have been performed on animals. As biometric identification has become an increasingly important issue over the past decade, attempts are underway to replace traditional identification methods, which are mostly invasive and limited in code space. This thesis discusses a project that aims at identifying mice by biometrically examining the blood vessel patterns in their ears.

In the proposed algorithm, firstly, the blood vessel structure within the obtained images got enhanced before segmenting the image in blood vessel and non-blood vessel portions. In the next step a sufficient amount of unique feature points got extracted from the segmented image. The obtained feature points were afterwards used for the actual identification procedure.

Out of 20 mice, 18 could be identified successfully using the proposed algorithm.

APA, Harvard, Vancouver, ISO, and other styles
3

Larsen, Tormod Emsell. "Biometric Solutions for Personal Identification." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9677.

Full text
Abstract:

With a high level of accuracy and ease of use, the technology of biometrics has the recent years gained popularity and in many cases replaced traditional identification methods based on passwords or tokens. While fingerprint matching is the most mature and most widely used technique of today, several others exist. Among these is ear recognition, which so far has received scant attention, but still has showed good results in performance. The thesis gives a general presentation of the biometric technology, with its advantages and challenges. In addition, the new and novel technology of ear recognition using thermal imagery is elaborated and discussed. An experiment of small scale, aiming to test the ability of thermal ear recognition as a method for identification, was performed. The test also considers the affect on the performance when the ear temperature varies. An EER of 20.7 % with a corresponding detection rate of 78 % was achieved when considering only ears with the same temperature. By including the applied temperature changes, an increase in the EER to 31.5 % with a corresponding detection rate of 72 % was observed. The results indicate that thermal images of the ears are not sufficiently distinguishable for use in establishing identity by itself, but it might be suitable as a supplement to other biometric techniques.

APA, Harvard, Vancouver, ISO, and other styles
4

Igarashi, Kei, Chiyomi Miyajima, Katsunobu Itou, Kazuya Takeda, Fumitada Itakura, and Hüseyin Abut. "Biometric identification using driving behavioral signals." IEEE, 2004. http://hdl.handle.net/2237/6800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hmani, Mohamed Amine. "Use of Biometrics for the Regeneration of Revocable Crypto-biometric Keys." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS013.

Full text
Abstract:
Ce travail de thèse vise à régénérer des clés crypto-biométriques (clés cryptographiques obtenues avec des données biométriques) résistantes aux méthodes de cryptanalyse quantique. Le défi est d'obtenir des clés avec une haute entropie pour avoir un haut niveau de sécurité, sachant que l'entropie contenue dans les références biométriques limite l'entropie de la clé. Notre choix a été d'exploiter la biométrie faciale.Nous avons d'abord créé un système de reconnaissance faciale de pointe basé en utilisant des bases de données publiques. Notre architecture utilise des réseaux de neurones profonds avec une fonction de perte‘Triplet loss'. Nous avons participé à deux Projets européens H2020 pour lesquelles nous avons fournit des adapations de notres systeme de reconnaise de visage. Nous avons également participé au challenge multimédia NIST SRE19 avec la version finale de notre système classique de reconnaissance faciale qui a donnée d'excellents résultats.Pour obtenir des clés crypto-biométriques, il est nécessaire de disposer de références biométriques binaires. Pour obtenir les représentations binaires directement à partir d'images de visage, nous avons proposé une méthode novatrice tirant parti des auto-encodeurs et la biométrie faciale classique précédemment mise en œuvre. Nous avons également exploité les représentations binaires pour créer un système de vérification de visage cancelable.Concernant notre objectif final, générer des clés crypto-biométriques, nous nous sommes concentrés sur les clés symétriques. Le chiffrement symétrique est menacé par l'algorithme Groover parce qu'il réduit la complexité d'une attaque par force brute de 2(N/2).. Pour atténuer le risque introduit par l'informatique quantique, nous devons augmenter la taille des clés. Pour cela, nous avons essayé de faire la représentation binaire plus longue et plus discriminante.Nous avons réussi à régénérer des clés crypto-biométriques de plus de 400 bits grâce à la qualité des plongements binaires. Les clés crypto-biométriques ont une haute entropie et résistent à la cryptanalyse quantique selon le PQCrypto projet car ils satisfont à l'exigence de longueur. Les clés sont régénérées à l'aide d'un schéma de "fuzzy commitment" en utilisant les codes BCH
This thesis aims to regenerate crypto-biometric keys (cryptographic keys obtained with biometric data) that are resistant to quantum cryptanalysis methods. The challenge is to obtain keys with high entropy to have a high level of security, knowing that the entropy contained in biometric references limits the entropy of the key. Our choice was to exploit facial biometrics.We first created a state-of-the-art face recognition system based on public frameworks and publicly available data based on DNN embedding extractor architecture and triplet loss function. We participated in two H2020 projects. For the SpeechXRays project, we provided implementations of classical and cancelable face biometrics. For the H2020 EMPATHIC project, we created a face verification REST API. We also participated in the NIST SRE19 multimedia challenge with the final version of our classical face recognition system.In order to obtain crypto-biometric keys, it is necessary to have binary biometric references. To obtain the binary representations directly from face images, we proposed an original method, leveraging autoencoders and the previously implemented classical face biometrics. We also exploited the binary representations to create a cancelable face verification system.Regarding our final goal, to generate crypto-biometric keys, we focused on symmetric keys. Symmetric encryption is threatened by the Groover algorithm because it reduces the complexity of a brute force attack on a symmetric key from 2N à 2(N/2). To mitigate the risk introduced by quantum computing, we need to increase the size of the keys. To this end, we tried to make the binary representation longer and more discriminative. For the keys to be resistant to quantum computing, they should have double the length.We succeeded in regenerating crypto-biometric keys longer than 400bits (with low false acceptance and false rejection rates) thanks to the quality of the binary embeddings. The crypto-biometric keys have high entropy and are resistant to quantum cryptanalysis, according to the PQCrypto project, as they satisfy the length requirement. The keys are regenerated using a fuzzy commitment scheme leveraging BCH codes
APA, Harvard, Vancouver, ISO, and other styles
6

Benedikt, Lanthao. "Using 3d Facial Motion for Biometric Identification." Thesis, Cardiff University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.523527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

John, George Jacqueline. "Optimising multimodal fusion for biometric identification systems." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Haskett, Kevin Joseph. "Iris Biometric Identification Using Artificial Neural Networks." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1947.

Full text
Abstract:
A biometric method is a more secure way of personal identification than passwords. This thesis examines the iris as a personal identifier with the use of neural networks as the classifier. A comparison of different feature extraction methods that include the Fourier transform, discrete cosine transform, the eigen analysis method, and the wavelet transform, is performed. The robustness of each method, with respect to distortion and noise, is also studied.
APA, Harvard, Vancouver, ISO, and other styles
9

Green, Nathan Alan. "Establishing Public Confidence in the Viability of Fingerprint Biometric Technology." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd919.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Breedt, Morné. "Integrating biometric authentication into multiple applications." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-08282007-135540.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Biometric identification"

1

United States. Office of Motor Carrier and Highway Safety., ed. Biometric identification standards research. [Washington, D.C.]: Federal Highway Administration, Office of Motor Carrier and Highway Safety, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nichols, Ellen R. Biometrics: Theory, applications, and issues. Hauppauge, N.Y: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vacca, John R. Biometric technologies and verification systems. Amsterdam: Butterworth-Heinemann/Elsevier, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Marcus, and Seumas Miller. Biometric Identification, Law and Ethics. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90256-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Elsworth, John T. Design and performance of biometric system. Hauppauge, N.Y: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harvey, Schuster, and Metzger Wilfred, eds. Biometrics: Methods, applications and analyses. Hauppauge, N.Y: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ashbourn, Julian. Practical biometrics: From aspiration to implementation. London: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

W, Mak M., and Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Upper Saddle River, N.J: Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Willemsen, Clemens. Biometrics: How it works. [The Hague]: Progis, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pugliese, Joseph. Biometrics: Bodies, technologies, biopolitics. New York: Routledge, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Biometric identification"

1

Smith, Marcus, and Seumas Miller. "The Future of Biometrics and Liberal Democracy." In Biometric Identification, Law and Ethics, 79–95. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90256-8_5.

Full text
Abstract:
AbstractThe first part of this chapter considers future biometrics, with a focus on second generation biometrics that measure physiological patterns. The second discusses the potential biometric future – how the use of biometrics, data and algorithms more broadly, could be used by governments to regulate social and economic interactions. This discussion will draw on the development of credit systems, from those used in commercial online platforms to rate the performance of providers and users, to the more integrated and all-encompassing social credit system (SCS) implemented in China, as an example of a potential future development in liberal democratic countries. Finally, we discuss the key features of liberal democratic theory and how biometric and related technological developments may change governance in western democracies. While we briefly mention some relevant developments in the private sector, our main focus will be on the relationship between liberal democratic governments and their security agencies, on the one hand, and their citizenry, on the other. We describe in general terms how liberal democracies might respond to these new technologies in a manner that preserves their benefits without unduly compromising established liberal democratic institutions, principles and values. Accordingly, we seek to offer a response to some of the dual use ethical dilemmas posed by biometrics, albeit in general terms.
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Marcus, and Seumas Miller. "Biometric and Non-biometric Integration: Dual Use Dilemmas." In Biometric Identification, Law and Ethics, 57–78. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90256-8_4.

Full text
Abstract:
AbstractBiometric identification is now closely integrated with other forms of data, data systems and communications technologies, such as smartphones, metadata and social media, and as the key security feature on smartphones, and by extension, social media accounts, online profiles and identity. For this reason, we consider the interaction between biometric and other forms of identification data, and data systems, building upon the consideration of the main biometrics in the first three chapters. We begin with a general discussion of data systems and integration. This is followed by a discussion of the interrelationship with biometrics, and broader significance of, metadata, smartphone applications and social media. In combination with biometric identification technologies, these provide detailed insights into individuals’ activities and behaviours. The ethical analysis in this chapter focuses on dual use dilemmas. Roughly speaking, dual use dilemmas in science and technology arise in virtue of the fact that such science and technology can be used to greatly benefit humankind, but also, unfortunately, to cause great harm to humankind. Consider, for instance, nuclear science and technology. It can be used as a cheap and peaceful energy source, or to build nuclear weapons. Similarly, facial recognition technology could be used by police only to track persons guilty of serious crimes; or it could be used to monitor ordinary citizens’ behaviour by an authoritarian government.
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Xiangqian, Kuanquan Wang, and David Zhang. "HMMs Based Palmprint Identification." In Biometric Authentication, 775–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Marcus, and Seumas Miller. "The Rise of Biometric Identification: Fingerprints and Applied Ethics." In Biometric Identification, Law and Ethics, 1–19. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90256-8_1.

Full text
Abstract:
AbstractIn the late nineteenth century, it became understood that the patterns on the skin of the fingers were unique and could be used for identification purposes, leading to the development of biometric identification (Smith M, Mann M, Urbas G. Biometrics, crime and security. Routledge, 2018). The ease with which fingerprints can be accessed and recorded, and the ease with which they transfer to surfaces and objects, made them ideal for law enforcement purposes. Today, in digital form, fingerprints and other biometric identification techniques, notably DNA profiles and facial recognition technology, are a widely used means of identification across a range of applications, from accessing personal devices, to banking, border security and law enforcement. However, these uses have raised a raft of ethical or moral (we use these terms interchangeably) concerns, some of the more important of which we discuss in this work.In the first chapter, we discuss general aspects of biometric identification, before focusing on fingerprint identification, including its reliability as form of evidence. Secondly, we provide an overview of applied ethics; and outline a key theoretical notion, relevant to many of the issues discussed throughout the later chapters: collective responsibility. Finally, we analyse the ethical risks and benefits associated with the technique of fingerprint identification.
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Kun, Yunhong Wang, and Tieniu Tan. "Writer Identification Using Dynamic Features." In Biometric Authentication, 512–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zheng, Gang, Shengzhen Ji, Min Dai, and Ying Sun. "ECG Based Identification by Deep Learning." In Biometric Recognition, 503–10. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69923-3_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Marcus, Monique Mann, and Gregor Urbas. "Foundations of biometric identification." In Biometrics, Crime and Security, 1–21. New York : Routledge, 2018. | Series: Law, science and society: Routledge, 2018. http://dx.doi.org/10.4324/9781315182056-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Xuzhou, Ying Li, Yilong Yin, and Gongping Yang. "Fingerprint Identification Based on Semi-supervised FSS." In Biometric Recognition, 112–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35136-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Xiang, Jinyu Gao, Xiaobin Chang, Yuting Mai, and Wei-Shi Zheng. "Person Re-identification with Data-Driven Features." In Biometric Recognition, 506–13. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12484-1_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Yingchun, Li Chen, and Wenyi Wang. "Emotional Speaker Identification by Humans and Machines." In Biometric Recognition, 167–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25449-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometric identification"

1

Bueker, Ulrich, Ruediger Schmidt, and Tristan Eickhoff. "Biometric Driver Identification." In SAE World Congress & Exhibition. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2008. http://dx.doi.org/10.4271/2008-01-0196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pahuja, Gunjan, and T. N. Nagabhushan. "Biometric authentication & identification through behavioral biometrics: A survey." In 2015 International Conference on Cognitive Computing and Information Processing (CCIP). IEEE, 2015. http://dx.doi.org/10.1109/ccip.2015.7100681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adamek, Milan, Petr Neumann, Dora Lapkova, Martin Pospisilik, and Miroslav Matysek. "Biometric Identification Of Persons." In 31st Conference on Modelling and Simulation. ECMS, 2017. http://dx.doi.org/10.7148/2017-0460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nilsson, K., T. Rognvaldsson, J. Cameron, and C. Jacobson. "Biometric Identification of Mice." In 18th International Conference on Pattern Recognition (ICPR'06). IEEE, 2006. http://dx.doi.org/10.1109/icpr.2006.329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hube, Jens Peter. "Using Biometric Verification to Estimate Identification Performance." In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 2006. http://dx.doi.org/10.1109/bcc.2006.4341620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Biometric Identification in Virtual Worlds using Biometric Fusion Techniques." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004054602630269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

R. S, Bala Kumar, and Sujitha R. "Efficient Privacy-Preserving Biometric Identification in Cloud Computing." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ieko8866/ngcesi23p5.

Full text
Abstract:
Benefited from its reliability and convenience, biometric identification has become one of the most popular authentication technologies. Due to the sensitivity of biometric data, various privacy-preserving biometric identification protocols have been proposed. However, the low computational efficiency or the security vulnerabilities of these protocols limit their wide deployment in practice. To further improve the efficiency and enhance the security, in this project, propose two new privacy-preserving biometric identification outsourcing protocols. One mainly utilizes the efficient Householder transformation and permutation technique to realize the high-efficiency intention under the known candidate attack model. The other initializes a novel random split technique and combines it with the invertible linear transformation to achieve a higher security requirement under the known-plaintext attack model. Also, argue the security of our proposed two protocols with a strict theoretical analysis and, by comparing them with the prior existing works, comprehensively evaluate their efficiency.
APA, Harvard, Vancouver, ISO, and other styles
8

Hashemi, J., and E. Fatemizadeh. "Biometric Identification through Hand Geometry." In EUROCON 2005 - The International Conference on "Computer as a Tool". IEEE, 2005. http://dx.doi.org/10.1109/eurcon.2005.1630119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khuwaja, G. A., and A. N. Abu-Rezq. "Identification using compressed biometric images." In Seventh International Symposium on Signal Processing and Its Applications, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/isspa.2003.1224844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Boz, Hasan Alp, Mert Gurkan, and Berrin Yanikoglu. "Keystroke Dynamics Based Biometric Identification." In 2020 28th Signal Processing and Communications Applications Conference (SIU). IEEE, 2020. http://dx.doi.org/10.1109/siu49456.2020.9302273.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Biometric identification"

1

Janker, Peter S. United States Homeland Security and National Biometric Identification. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

O'Toole, Alice J. Person Identification from Video with Multiple Biometric Cues: Benchmarks for Human and Machine Performance. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada415169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Varastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani, and Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, December 2020. http://dx.doi.org/10.34074/ocds.086.

Full text
Abstract:
Authentication methods based on human traits, including fingerprint, face, iris, and palm print, have developed significantly, and currently they are mature enough to be reliably considered for human identification purposes. Recently, as a new research area, a few methods based on non-facial skin features such as vein patterns have been developed. This literature review paper explores some key biometric systems such as face recognition, iris recognition, fingerprint, and palm print, and discusses their respective advantages and disadvantages; then by providing a comprehensive analysis of these traits, and their applications, vein pattern recognition is reviewed.
APA, Harvard, Vancouver, ISO, and other styles
4

Faith, Becky, and Tony Roberts. Managing the Risk and Benefits of Digital Technologies in Social Assistance Provision. Institute of Development Studies (IDS), February 2022. http://dx.doi.org/10.19088/basic.2022.025.

Full text
Abstract:
Aid agencies, governments, and donors are expanding investment in the digitisation of their beneficiary identification and registration systems, in digitised systems for cash payments, and in the remote and algorithmic control of humanitarian and social protection programmes. This is happening in ways that may facilitate the move from humanitarian assistance to government provision and may enable the delivery of shock-responsive social protection. Yet humanitarian and social protection actors are increasingly concerned about a range of risks and accountability vacuums associated with the adoption of these technologies. While claims for the benefits of digitisation often rest on cost savings, data relating to these costs and benefits are not easily accessible. There is also an urgent need to adopt approaches to value for money in this sector that recognise the digital dignity of beneficiaries. A knowledge gap exists around how the movement towards biometric identification and algorithmic management using humanitarian and social protection data will affect the interests of vulnerable populations – so too does a gap in research that is focused on the standpoints, interests, and priorities of these populations.
APA, Harvard, Vancouver, ISO, and other styles
5

Roberts, Tony, Judy Gitahi, Patrick Allam, Lawrence Oboh, Oyewole Oladapo, Gifty Appiah-Adjei, Amira Galal, et al. Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia. Institute of Development Studies, September 2023. http://dx.doi.org/10.19088/ids.2023.027.

Full text
Abstract:
African governments are spending over 1US$bn per year on digital surveillance technologies which are being used without adequate legal protections in ways that regularly violate citizens’ fundamental human rights. This report documents which companies, from which countries, are supplying which types of surveillance technology to African governments. Without this missing detail, it is impossible to adequately design measures to mitigate and overcome illegal surveillance and violations of human rights. Since the turn of the century, we have witnessed a digitalisation of surveillance that has enabled the algorithmic automation of surveillance at a scale not previously imaginable. Surveillance of citizens was once a labour and time-intensive process. This provided a practical limit to the scope and depth of state surveillance. The digitalisation of telephony has made it possible to automate the search for keywords across all mobile and internet communications. For the first time, state surveillance agencies can do two things: (a) conduct mass surveillance of all citizens’ communications, and (b) micro-target individuals for in-depth surveillance that draws together in real-time data from mobile calls, short message service (SMS), internet messaging, global positioning system (GPS) location, and financial transactions. This report was produced by qualitative analysis of open-source data in the public domain. The information presented is drawn from a diverse range of sources, including open government data sets, export licence portals, procurement notices, civil society databases of surveillance contracts, press releases from surveillance companies, academic articles, reports, and media coverage. The research is organised using a typology of five categories of surveillance technology. We did not set out to detail every technology available, every company, or every supply contract. Instead, we document the main companies and countries selling digital surveillance technologies to African governments. Rather than focus on the technical functionality distinguishing each product offering, we highlight five of the most important types of surveillance technology: internet interception, mobile interception, social media surveillance, ‘safe city’ technologies for the surveillance of public spaces, and biometric identification technologies.
APA, Harvard, Vancouver, ISO, and other styles
6

New Access Control Technologies: Biometric Identification. Purdue University, 2007. http://dx.doi.org/10.5703/1288284315895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography