Academic literature on the topic 'Biometric identification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric identification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Biometric identification"
Shopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, and Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions." Journal of Cybersecurity and Privacy 1, no. 3 (August 31, 2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.
Full textMudhafer Taher Al Mossawy, Mais, and Loay E. George. "A digital signature system based on hand geometry - Survey." Wasit Journal of Computer and Mathematics Science 1, no. 1 (April 1, 2022): 1–14. http://dx.doi.org/10.31185/wjcm.vol1.iss1.18.
Full text., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.
Full textAyanaba, Rasheed Abubakar. "Image-assisted Biometric Identification." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 24, 2022): 131–38. http://dx.doi.org/10.22624/aims/crp-bk3-p22.
Full textDiac, Madalina Maria, Simona Irina Damian, Bianca Diana Butincu, Anton Knieling, and Diana Bulgaru Iliescu. "Ethical Aspects of Biometric Identification." BRAIN. Broad Research in Artificial Intelligence and Neuroscience 14, no. 4 (December 19, 2023): 124–39. http://dx.doi.org/10.18662/brain/14.4/496.
Full textAruna, Boda, and Dr M. Kezia Joseph. "Multimodal Biometrics for Human Identification usingArtificial Intelligence." International Journal of Emerging Science and Engineering 12, no. 1 (December 30, 2023): 1–6. http://dx.doi.org/10.35940/ijese.a4278.1212123.
Full textReddy, M. V. Bramhananda, and V. Goutham. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research -GRANTHAALAYAH 6, no. 1 (January 31, 2018): 80–90. http://dx.doi.org/10.29121/granthaalayah.v6.i1.2018.1596.
Full textChinyemba, Melissa K., and Jackson Phiri. "Gaps in the Management and Use of Biometric Data: A Case of Zambian Public and Private Institutions." Zambia ICT Journal 2, no. 1 (June 29, 2018): 35–43. http://dx.doi.org/10.33260/zictjournal.v2i1.49.
Full textYaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.
Full textYin, Jing Hai, Zheng Dong Mu, and Jian Feng Hu. "Design of Identification System Based on BCI." Applied Mechanics and Materials 496-500 (January 2014): 1975–78. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1975.
Full textDissertations / Theses on the topic "Biometric identification"
Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textTitle from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
Ellmauthaler, Andreas, and Eric Wernsperger. "Biometric Identification of Mice." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1135.
Full textThe identification of laboratory mice has been an important issue in pharmaceutical applications ever since tests have been performed on animals. As biometric identification has become an increasingly important issue over the past decade, attempts are underway to replace traditional identification methods, which are mostly invasive and limited in code space. This thesis discusses a project that aims at identifying mice by biometrically examining the blood vessel patterns in their ears.
In the proposed algorithm, firstly, the blood vessel structure within the obtained images got enhanced before segmenting the image in blood vessel and non-blood vessel portions. In the next step a sufficient amount of unique feature points got extracted from the segmented image. The obtained feature points were afterwards used for the actual identification procedure.
Out of 20 mice, 18 could be identified successfully using the proposed algorithm.
Larsen, Tormod Emsell. "Biometric Solutions for Personal Identification." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9677.
Full textWith a high level of accuracy and ease of use, the technology of biometrics has the recent years gained popularity and in many cases replaced traditional identification methods based on passwords or tokens. While fingerprint matching is the most mature and most widely used technique of today, several others exist. Among these is ear recognition, which so far has received scant attention, but still has showed good results in performance. The thesis gives a general presentation of the biometric technology, with its advantages and challenges. In addition, the new and novel technology of ear recognition using thermal imagery is elaborated and discussed. An experiment of small scale, aiming to test the ability of thermal ear recognition as a method for identification, was performed. The test also considers the affect on the performance when the ear temperature varies. An EER of 20.7 % with a corresponding detection rate of 78 % was achieved when considering only ears with the same temperature. By including the applied temperature changes, an increase in the EER to 31.5 % with a corresponding detection rate of 72 % was observed. The results indicate that thermal images of the ears are not sufficiently distinguishable for use in establishing identity by itself, but it might be suitable as a supplement to other biometric techniques.
Igarashi, Kei, Chiyomi Miyajima, Katsunobu Itou, Kazuya Takeda, Fumitada Itakura, and Hüseyin Abut. "Biometric identification using driving behavioral signals." IEEE, 2004. http://hdl.handle.net/2237/6800.
Full textHmani, Mohamed Amine. "Use of Biometrics for the Regeneration of Revocable Crypto-biometric Keys." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS013.
Full textThis thesis aims to regenerate crypto-biometric keys (cryptographic keys obtained with biometric data) that are resistant to quantum cryptanalysis methods. The challenge is to obtain keys with high entropy to have a high level of security, knowing that the entropy contained in biometric references limits the entropy of the key. Our choice was to exploit facial biometrics.We first created a state-of-the-art face recognition system based on public frameworks and publicly available data based on DNN embedding extractor architecture and triplet loss function. We participated in two H2020 projects. For the SpeechXRays project, we provided implementations of classical and cancelable face biometrics. For the H2020 EMPATHIC project, we created a face verification REST API. We also participated in the NIST SRE19 multimedia challenge with the final version of our classical face recognition system.In order to obtain crypto-biometric keys, it is necessary to have binary biometric references. To obtain the binary representations directly from face images, we proposed an original method, leveraging autoencoders and the previously implemented classical face biometrics. We also exploited the binary representations to create a cancelable face verification system.Regarding our final goal, to generate crypto-biometric keys, we focused on symmetric keys. Symmetric encryption is threatened by the Groover algorithm because it reduces the complexity of a brute force attack on a symmetric key from 2N à 2(N/2). To mitigate the risk introduced by quantum computing, we need to increase the size of the keys. To this end, we tried to make the binary representation longer and more discriminative. For the keys to be resistant to quantum computing, they should have double the length.We succeeded in regenerating crypto-biometric keys longer than 400bits (with low false acceptance and false rejection rates) thanks to the quality of the binary embeddings. The crypto-biometric keys have high entropy and are resistant to quantum cryptanalysis, according to the PQCrypto project, as they satisfy the length requirement. The keys are regenerated using a fuzzy commitment scheme leveraging BCH codes
Benedikt, Lanthao. "Using 3d Facial Motion for Biometric Identification." Thesis, Cardiff University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.523527.
Full textJohn, George Jacqueline. "Optimising multimodal fusion for biometric identification systems." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418551.
Full textHaskett, Kevin Joseph. "Iris Biometric Identification Using Artificial Neural Networks." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1947.
Full textGreen, Nathan Alan. "Establishing Public Confidence in the Viability of Fingerprint Biometric Technology." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd919.pdf.
Full textBreedt, Morné. "Integrating biometric authentication into multiple applications." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-08282007-135540.
Full textBooks on the topic "Biometric identification"
United States. Office of Motor Carrier and Highway Safety., ed. Biometric identification standards research. [Washington, D.C.]: Federal Highway Administration, Office of Motor Carrier and Highway Safety, 1999.
Find full textNichols, Ellen R. Biometrics: Theory, applications, and issues. Hauppauge, N.Y: Nova Science Publishers, 2010.
Find full textVacca, John R. Biometric technologies and verification systems. Amsterdam: Butterworth-Heinemann/Elsevier, 2007.
Find full textSmith, Marcus, and Seumas Miller. Biometric Identification, Law and Ethics. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90256-8.
Full textElsworth, John T. Design and performance of biometric system. Hauppauge, N.Y: Nova Science Publishers, 2010.
Find full textHarvey, Schuster, and Metzger Wilfred, eds. Biometrics: Methods, applications and analyses. Hauppauge, N.Y: Nova Science Publishers, 2009.
Find full textAshbourn, Julian. Practical biometrics: From aspiration to implementation. London: Springer, 2004.
Find full textW, Mak M., and Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Upper Saddle River, N.J: Prentice Hall Professional Technical Reference, 2005.
Find full textWillemsen, Clemens. Biometrics: How it works. [The Hague]: Progis, 2009.
Find full textPugliese, Joseph. Biometrics: Bodies, technologies, biopolitics. New York: Routledge, 2010.
Find full textBook chapters on the topic "Biometric identification"
Smith, Marcus, and Seumas Miller. "The Future of Biometrics and Liberal Democracy." In Biometric Identification, Law and Ethics, 79–95. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90256-8_5.
Full textSmith, Marcus, and Seumas Miller. "Biometric and Non-biometric Integration: Dual Use Dilemmas." In Biometric Identification, Law and Ethics, 57–78. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90256-8_4.
Full textWu, Xiangqian, Kuanquan Wang, and David Zhang. "HMMs Based Palmprint Identification." In Biometric Authentication, 775–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_105.
Full textSmith, Marcus, and Seumas Miller. "The Rise of Biometric Identification: Fingerprints and Applied Ethics." In Biometric Identification, Law and Ethics, 1–19. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90256-8_1.
Full textYu, Kun, Yunhong Wang, and Tieniu Tan. "Writer Identification Using Dynamic Features." In Biometric Authentication, 512–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_70.
Full textZheng, Gang, Shengzhen Ji, Min Dai, and Ying Sun. "ECG Based Identification by Deep Learning." In Biometric Recognition, 503–10. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69923-3_54.
Full textSmith, Marcus, Monique Mann, and Gregor Urbas. "Foundations of biometric identification." In Biometrics, Crime and Security, 1–21. New York : Routledge, 2018. | Series: Law, science and society: Routledge, 2018. http://dx.doi.org/10.4324/9781315182056-1.
Full textLi, Xuzhou, Ying Li, Yilong Yin, and Gongping Yang. "Fingerprint Identification Based on Semi-supervised FSS." In Biometric Recognition, 112–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35136-5_14.
Full textLi, Xiang, Jinyu Gao, Xiaobin Chang, Yuting Mai, and Wei-Shi Zheng. "Person Re-identification with Data-Driven Features." In Biometric Recognition, 506–13. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12484-1_58.
Full textYang, Yingchun, Li Chen, and Wenyi Wang. "Emotional Speaker Identification by Humans and Machines." In Biometric Recognition, 167–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25449-9_21.
Full textConference papers on the topic "Biometric identification"
Bueker, Ulrich, Ruediger Schmidt, and Tristan Eickhoff. "Biometric Driver Identification." In SAE World Congress & Exhibition. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2008. http://dx.doi.org/10.4271/2008-01-0196.
Full textPahuja, Gunjan, and T. N. Nagabhushan. "Biometric authentication & identification through behavioral biometrics: A survey." In 2015 International Conference on Cognitive Computing and Information Processing (CCIP). IEEE, 2015. http://dx.doi.org/10.1109/ccip.2015.7100681.
Full textAdamek, Milan, Petr Neumann, Dora Lapkova, Martin Pospisilik, and Miroslav Matysek. "Biometric Identification Of Persons." In 31st Conference on Modelling and Simulation. ECMS, 2017. http://dx.doi.org/10.7148/2017-0460.
Full textNilsson, K., T. Rognvaldsson, J. Cameron, and C. Jacobson. "Biometric Identification of Mice." In 18th International Conference on Pattern Recognition (ICPR'06). IEEE, 2006. http://dx.doi.org/10.1109/icpr.2006.329.
Full textHube, Jens Peter. "Using Biometric Verification to Estimate Identification Performance." In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 2006. http://dx.doi.org/10.1109/bcc.2006.4341620.
Full text"Biometric Identification in Virtual Worlds using Biometric Fusion Techniques." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004054602630269.
Full textR. S, Bala Kumar, and Sujitha R. "Efficient Privacy-Preserving Biometric Identification in Cloud Computing." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ieko8866/ngcesi23p5.
Full textHashemi, J., and E. Fatemizadeh. "Biometric Identification through Hand Geometry." In EUROCON 2005 - The International Conference on "Computer as a Tool". IEEE, 2005. http://dx.doi.org/10.1109/eurcon.2005.1630119.
Full textKhuwaja, G. A., and A. N. Abu-Rezq. "Identification using compressed biometric images." In Seventh International Symposium on Signal Processing and Its Applications, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/isspa.2003.1224844.
Full textBoz, Hasan Alp, Mert Gurkan, and Berrin Yanikoglu. "Keystroke Dynamics Based Biometric Identification." In 2020 28th Signal Processing and Communications Applications Conference (SIU). IEEE, 2020. http://dx.doi.org/10.1109/siu49456.2020.9302273.
Full textReports on the topic "Biometric identification"
Janker, Peter S. United States Homeland Security and National Biometric Identification. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404488.
Full textO'Toole, Alice J. Person Identification from Video with Multiple Biometric Cues: Benchmarks for Human and Machine Performance. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada415169.
Full textVarastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani, and Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, December 2020. http://dx.doi.org/10.34074/ocds.086.
Full textFaith, Becky, and Tony Roberts. Managing the Risk and Benefits of Digital Technologies in Social Assistance Provision. Institute of Development Studies (IDS), February 2022. http://dx.doi.org/10.19088/basic.2022.025.
Full textRoberts, Tony, Judy Gitahi, Patrick Allam, Lawrence Oboh, Oyewole Oladapo, Gifty Appiah-Adjei, Amira Galal, et al. Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia. Institute of Development Studies, September 2023. http://dx.doi.org/10.19088/ids.2023.027.
Full textNew Access Control Technologies: Biometric Identification. Purdue University, 2007. http://dx.doi.org/10.5703/1288284315895.
Full text