Dissertations / Theses on the topic 'Biometric identification systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Biometric identification systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textTitle from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
John, George Jacqueline. "Optimising multimodal fusion for biometric identification systems." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418551.
Full textVerett, Marianna J. "Performance and usage of biometrics in a testbed environment for tactical purposes." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FVerett.pdf.
Full textThesis Advisor(s): Alex Bordetsky. "December 2006." Includes bibliographical references (p. 71-74). Also available in print.
Walnoha, Michael Anthony. "Shoeprint analysis a GIS application in forensic evidence /." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4639.
Full textTitle from document title page. Document formatted into pages; contains iv, 64 p. : ill. (some col.), maps (some col.). Includes abstract. Includes bibliographical references (p. 63-64).
Dennis, LeRoy P. Ford Michael K. "The wireless ubiquitous surveillance testbed /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FDennis.pdf.
Full textThesis advisor(s): Alex Bordetsky, Randy J. Hess. Includes bibliographical references (p. 101-105). Also available online.
Johnson, Amos Y. Jr. "A method for human identification using static, activity-specific parameters." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15793.
Full textChan, Siu Man. "Improved speaker verification with discrimination power weighting /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHANS.
Full textIncludes bibliographical references (leaves 86-93). Also available in electronic version. Access restricted to campus users.
Crihalmeanu, Musat C. "Adding liveness detection to the hand geometry scanner." Morgantown, W. Va. : [West Virginia University Libraries], 2003. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3220.
Full textTitle from document title page. Document formatted into pages; contains viii, 96 p. : ill. (some col.) Includes abstract. Includes bibliographical references (p. 72-74).
Feng, Yicheng. "Discriminability and security of binary template in face recognition systems." HKBU Institutional Repository, 2012. https://repository.hkbu.edu.hk/etd_ra/1455.
Full textAkinbola, Akintunde A. "Estimation of image quality factors for face recognition." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4308.
Full textTitle from document title page. Document formatted into pages; contains vi, 56 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 52-56).
Ford, Michael K., and LeRoy P. Dennis. "The wireless ubiquitous surveillance testbed." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1124.
Full textThis thesis research examines the emergence of surveillance and biometrics technologies as a sensible baseline for building a ubiquitous surveillance testbed for the Naval Postgraduate School. This thesis also defines what ubiquitous surveillance is, employs biometric applications and technical strategies to build a working testbed, and addresses developmental issues surrounding the hypothesis for a ubiquitous surveillance testbed. The authors conducted several evaluations of the testbed using different scenarios and recommend emerging biometric and surveillance technologies to promote the maturation of the testbed into a premier ubiquitous habitat.
Lieutenant, United States Navy
Lieutenant, United States Navy
Sanderson, Conrad, and conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information." Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.
Full textMackley, Joshua, and mikewood@deakin edu au. "Extracting fingerprint features using textures." Deakin University. School of Engineering & Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20050815.111403.
Full textKlimešová, Lenka. "Identifikace osob pomocí biometrie sítnice." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-378031.
Full textRautenbach, James. "Towards a framework for identity verification of vulnerable children within the Eastern Cape." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/597.
Full textHilal, Alaa. "Système d'identification à partir de l'image d'iris et détermination de la localisation des informations." Thesis, Troyes, 2013. http://www.theses.fr/2013TROY0021/document.
Full textIris identification system is considered among the best biometric technologies. However problems related to the segmentation of the iris and to the normalization of iris templates are generally reported and induce loss of recognition performance. In this work three main contributions are made to the progress of the iris identification system. A new segmentation method is developed. It approximates the outer iris boundary with a circle and segments accurately the inner boundary of the iris by use of an active contour model. Next, a new normalization method is proposed. It leads to a more robust characterization and a better sampling of iris textures compared to traditional normalization methods. Finally using the proposed iris identification system, the location of discriminant characteristics along iris templates is identified. It appears that the most discriminant iris characteristics are located in inner regions of the iris (close to the pupil boundary) and that the discriminant capabilities of these characteristics decreases as outer regions of the iris are considered. The developed segmentation and normalization methods are tested and compared to a reference iris identification system over a database of 2639 iris images. Improvement in recognition performance validates the effectiveness of the proposed system
Sanderson, Conrad. "Automatic Person Verification Using Speech and Face Information." Thesis, Griffith University, 2003. http://hdl.handle.net/10072/367191.
Full textThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Microelectronic Engineering
Full Text
Maime, Ratakane Baptista. "CHALLENGES AND OPPORTUNITIES OF ADOPTING MANAGEMENT INFORMATION SYSTEMS (MIS) FOR PASSPORT PROCESSING: COMPARATIVE STUDY BETWEEN LESOTHO AND SOUTH AFRICA." Thesis, Central University of Technology, Free State. Business Administration, 2014. http://hdl.handle.net/11462/237.
Full textFast and secure public service delivery is not only a necessity, but a compulsory endeavour. However, it is close to impossible to achieve such objectives without the use of Information Technology (IT). It is correspondingly important to find proper sustainability frameworks of technology. Organisations do not only need technology for efficient public service; the constant upgrading of systems and cautious migration to the newest IT developments is also equally indispensable in today’s dynamic technological world. Conversely, countries in Africa are always lagging behind in technological progresses. Such deficiencies have been identified in the passport processing of Lesotho and South Africa, where to unequal extents, problems related to systems of passport production have contributed to delays and have become fertile grounds for corrupt practices. The study seeks to identify the main impediments in the adoption of Management Information Systems (MIS) for passport processing. Furthermore, the study explores the impact MIS might have in attempting to combat long queues and to avoid long waiting periods – from application to issuance of passports to citizens. The reasonable time frame between passport application and issuance, and specific passport management systems, have been extensively discussed along with various strategies that have been adopted by some of the world’s first movers in modern passport management technologies. In all cases and stages of this research, Lesotho and South Africa are compared. The research approach of the study was descriptive and explorative in nature. As a quantitative design, a structured questionnaire was used to solicit responses in Lesotho and South Africa. It was established that both Lesotho and South Africa have somewhat similar problems – although, to a greater extent, Lesotho needs much more urgent attention. Although the processes of South Africa need to be improved, the Republic releases a passport much faster and more efficiently than Lesotho. Economic issues are also revealed by the study as unavoidable factors that always affect technological developments in Africa. The study reveals that the latest MIS for passport processing has facilitated modern, automated border-control systems and resultant e-passports that incorporate more biometric information of citizens to passports – thanks to modern RFID technologies. One can anticipate that this study will provide simple, affordable and secure IT solutions for passport processing. Key words: Information Technology (IT); Management Information Systems (MIS); E-Government; E-Passport; Biometrics; and RFID.
Gibavičius, Darius. "Genetinių algoritmų taikymas biometrijoje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100617_141716-09318.
Full textIn the graduation thesis to receive the master‘s degree the application of genetic algorithms in biometrics is analysed. The most widely used biometric information have been examined, the most common biometric systems, genetic algorithms and their customization in biometric systems optimization have been described. A new method is proposed for hand recognition. Genetic algorithms have been customized for this method. Structure: introduction, biometry, genetic algorithms, application of genetic algorithms in biometric systems, application of genetic algorithms for hand recognition, the conclusions and bibliography. Thesis consist of: 51 p. text without appendixes, 30 pictures, 4 tables, 32 bibliographical entries.
Martins, Samuel Botter 1990. "A fast and robust negative mining approach for user enrollment in face recognition systems = Uma abordagem eficiente e robusta de mineração de negativos para cadastramento de novos usuários em sistemas de reconhecimento facial." [s.n.], 2015. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275553.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-27T14:41:07Z (GMT). No. of bitstreams: 1 Martins_SamuelBotter_M.pdf: 4782261 bytes, checksum: 63cd58756e3fe70ffe625d42974b1a78 (MD5) Previous issue date: 2015
Resumo: Sistemas automáticos de reconhecimento de faces tem atraído a atenção da indústria e da academia, devido à gama de possíveis aplicações, tais como vigilância, controle de acesso, etc. O recente progresso em tais sistemas motiva o uso de técnicas de aprendizado em profundidade e classificadores específicos para cada usuário em cenários de operação não-controlado, que apresentam variações consideráveis em pose, iluminação, etc. Sistemas automáticos de reconhecimento de faces possibilitam construir bases de imagens anotadas por meio do processo de cadastramento de novos usuários. Porém, à medida que as bases de dados crescem, torna-se crucial reduzir o número de amostras negativas usadas para treinar classificadores específicos para cada usuário, devido às limitações de processamento e tempo de resposta. Tal processo de aprendizado discriminativo durante o cadastramento de novos indivíduos tem implicações no projeto de sistemas de reconhecimento de faces. Apesar deste processo poder aumentar o desempenho do reconhecimento, ele também pode afetar a velocidade do cadastramento, prejudicando, assim, a experiência do usuário. Neste cenário, é importante selecionar as amostras mais informativas buscando maximizar o desempenho do classificador. Este trabalho resolve tal problema propondo um método de aprendizado discriminativo durante o cadastramento de usuários com o objetivo de não afetar a velocidade e a confiabilidade do processo. Nossa solução combina representações de alta dimensão com um algoritmo que rapidamente minera imagens faciais negativas de um conjunto de minerção grande para assim construir um classificador específico para cada usuário, baseado em máquinas de vetores de suporte. O algoritmo mostrou ser robusto em construir pequenos e eficazes conjuntos de treinamento com as amostras negativas mais informativas para cada indivíduo. Avaliamos nosso método em duas bases contendo imagens de faces obtidas no cenário de operação não-controlado, chamadas PubFig83 e Mobio, e mostramos que nossa abordagem é capaz de alcançar um desempenho superior em tempos interativos, quando comparada com outras cinco abordagens consideradas. Os resultados indicam que o nosso método tem potencial para ser explorado pela indústria com mínimo impacto na experiência do usuário. Além disso, o algoritmo é independente de aplicação, podendo ser uma contribuição relevante para sistemas biométricos que visam manter a robustez à medida que o número de usuários aumenta
Abstract: Automatic face recognition has attracted considerable attention from the industry and academy due to its wide range of applications, such as video surveillance, access control, online transactions, suspect identification, etc. The recent progress in face recognition systems motivates the use of deep learning techniques and user-specific face representation and classification models for unconstrained scenarios, which present considerable variations in pose, face appearance, illumination, etc. Automatic face recognition systems make possible to build annotated face datasets through user enrollment. However, as the face datasets grow, it becomes crucial to reduce the number of negative samples used to train user-specific classifiers, due to processing constraints and responsiveness. Such a discriminative learning process during the enrollment of new individuals has implications in the design of face recognition systems. Even though it might increase recognition performance, it may affect the speed of the enrollment, which in turn may affect the user experience. In this scenario, it is important to select the most informative samples in order to maximize the performance of the classifier. This work addresses this problem by proposing a discriminative learning method during user enrollment with the challenges of not negatively affecting the speed and reliability of the process, and so the user experience. Our solution combines high-dimensional representations from deep learning with an algorithm for rapidly mining negative face images from a large mining set to build an effective classification model based on linear support vector machines for each specific user. The negative mining algorithm has shown to be robust in building small and effective training sets with the most informative negative samples for each given individual. We evaluate our approach on two unconstrained datasets, namely PubFig83 and Mobio, and show that it is able to attain superior performance, within interactive response times, as compared to five other baseline approaches that use the same classification scheme. The results indicate that our approach has potential to be exploited by the industry with minimum impact to the user experience. Moreover, the algorithm is application-independent. Hence, it may be a relevant contribution for biometric systems that aim to maintain robustness as the number of users increases
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Hasegawa, Robert Shigehisa. "Using synthetic images to improve iris biometric performance." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/827.
Full textClarke, Dalton H., and W. Tracy Young. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4607.
Full textThe Defense Manpower Data Center (DMDC) manages the Defense Biometric Identification System (DBIDS). DBIDS captures personal and biometric information to manage DoD-wide access, control, and personnel accountability. DBIDS equipment is installed globally, and managed by a central office on the Monterey peninsula. Program managers track data about the numbers and type of equipment installed at each site. Program managers were tracking DBIDS data using a single Microsoft Excel workbook comprised of several, interlinking worksheets (DBIDS Master Plan Spreadsheet). Data updates were error-prone and difficult, requiring close coordination to keep the number of "current" versions of the spreadsheet to a minimum. This thesis initially focused on reviewing the business rules and processes surrounding DBIDS document, and then transitioned into designing, developing, and implementing of a relational database solution to improve problem areas identified during the initial review. After implementation of the database, this thesis explored the effects of making such a change within an organization. This was attempted by identifying and measuring changes in performance and accuracy of the system; by measuring pre- and post-user satisfaction through the qualitative methods of questionnaires and interviews; and finally using this analysis to improve the project through maintenance and growth iterations.
Young, W. Tracy Clarke Dalton H. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FYoung.pdf.
Full textThesis Advisor(s): Pfeiffer, Karl D. "September 2009." Description based on title screen as viewed on 6 November, 2009. Author(s) subject terms: Database, Database Development Life Cycle, Rapid Prototyping, Business Process Management Software, Business Process Improvement, Business Process Redesign. Includes bibliographical references (p. 63-65). Also available in print.
Meuth, Lotte. "Zulässigkeit von Identitätsfeststellungen mittels biometrischer Systeme durch öffentliche Stellen /." Berlin : Duncker & Humblot, 2006. http://www.gbv.de/dms/ilmenau/toc/505963787.PDF.
Full textMai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.
Full textNwatu, Gideon U. "Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/921.
Full textEdmunds, Taiamiti. "Protection of 2D face identification systems against spoofing attacks." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT007/document.
Full textFace identification systems are growing rapidly and invade the consumer market with security products in smartphones, computers and banking. However, these systems are easily fooled by presenting a picture of the person having legitimate access to the system. This thesis is part of the BIOFENCE project which aim to develop a certification of biometric systems in order for industrials to promote their innovations in terms of protection. Our goal is to develop new anti-spoofing countermeasures for 2D face biometric systems and to evaluate the certification methodology on protected systems. First, a general state of the art in face spoofing attack forgery and in anti-spoofing protection measures is presented. Then texture-based countermeasures and motion-based countermeasures are investigated leading to the development of two novel countermeasures. Then, the recapturing process is modelled and a new fake face detection approach is proposed based on this model. Taking advantage of enrolment samples from valid users, a first step toward the synthesis of spoofing attacks for new users is taken. Finally, the certification methodology originally developed for fingerprint technology is evaluated on face biometric systems
Li, Jiawei. "Person re-identification with limited labeled training data." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/541.
Full textFeng, Yicheng. "Template protecting algorithms for face recognition system." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/832.
Full textFoltýn, Petr. "Návrh a realizace jednotek modulárního přístupového systému." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-229208.
Full textLouw, Lloyd A. B. "Automated face detection and recognition for a login system." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/438.
Full textAdumata, Kofi Agyemang. "Analysis of Affective State as Covariate in Human Gait Identification." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4584.
Full textSandström, Marie. "Liveness Detection in Fingerprint Recognition Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2397.
Full textBiometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today.
Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live fingers and artificial clones. The first approach is a literature study, while the second consists of experiments.
A literature study of liveness detection in fingerprint recognition systems has been performed. A description of different liveness detection methods is presented and discussed. Methods requiring extra hardware use temperature, pulse, blood pressure, electric resistance, etc., and methods using already existent information in the system use skin deformation, pores, perspiration, etc.
The experiments focus on making artificial fingerprints in gelatin from a latent fingerprint. Nine different systems were tested at the CeBIT trade fair in Germany and all were deceived. Three other different systems were put up against more extensive tests with three different subjects. All systems werecircumvented with all subjects'artificial fingerprints, but with varying results. The results are analyzed and discussed, partly with help of the A/R value defined in this report.
Öberg, Fredrik. "Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42294.
Full textBartoň, Jaroslav. "Podpora pro autentizaci pomocí otisků prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-235492.
Full textMehdi, Ali. "Developing a Computer System for the Generation of Unique Wrinkle Maps for Human Faces. Generating 2D Wrinkle Maps using Various Image Processing Techniques and the Design of 3D Facial Ageing System using 3D Modelling Tools." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5144.
Full textКондратенко, Н. Р., and О. А. Рудик. "Штучні імунні системи та їх використання для вирішення різних типів задач." Thesis, ВНТУ, 2019. http://ir.lib.vntu.edu.ua//handle/123456789/24236.
Full textThe article describes the principle of the artificial immune system. Also, classes of problems for the solution of which the appropriate systems can be used to justify the feasibility of using an artificial immune system for further development of a means of biometric identification system on the features of keyboard writing.
Яремко, Олег Ігорович, Oleg Yaremko, Василь Геннадійович Ткачук, and Vasyl Tkachuk. "Розробка та дослідження автоматизованої системи для підвищення якості ідентифікації при дактилоскопії." Master's thesis, Тернопіль, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36510.
Full textВ результаті проведеної роботи проаналізовано основні параметри та фактори, що впливають на якість ідентифікації під час дактилоскопії. Метою було створити прототип системи розпізнавання біо-відбитків пальців на основі нечіткої логіки та вивчити якість цього алгоритму порівняно з іншими методами в цій галузі.As a result of this work, the main parameters and factors influencing the quality of identification during fingerprinting are analyzed. The aim was to create a prototype of a fingerprint bio-fingerprint recognition system based on fuzzy logic and to study the quality of this algorithm compared to other methods in this field
ЗМIСТ ВСТУП 6 1. АНАЛIТИЧНА ЧАСТИНА 10 1.1. Біометричні системи 10 1.2 Нечітка логіка 12 2. ТЕХНОЛОГIЧНА ЧАСТИНА 15 2.1 Система розпізнавання відбитків пальців 15 2.2 Вимір якості відбитків пальців 16 2.3 Оцінка якості відбитку 17 2.4 Оцінка сходження двох відбитків 18 3 КОНСТРУКТОРСЬКА ЧАСТИНА 20 3.1. Система підтримки прийняття рішень з використанням нечіткої логіки 20 3.2 Застосування правил 24 3.3 Аналіз і порівняння 26 4 НАУКОВО-ДОСЛIДНИЦЬКА 29 4.1 Детектор кордонів Кенні 29 4.2 Подвійна фільтрація 31 4.3 Метод Віоли-Джонса 33 4.3 Ознаки Хаара 36 5. СПЕЦIАЛЬНА ЧАСТИНА 41 5.1. Алгоритм NFIQ 41 5.2 Помилки FMR, FNMR та EER. 42 5.3 Метод визначення якісних областей відбитків пальців 44 5.4 Зіставлення відбитків пальців за допомогою MCC SDK 49 6 ОХОРОНА ПРАЦI ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦIЯХ 53 6.1 Органiзацiя охорони працi при роботi з системою управлiння 53 6.2 Електробезпека 55 6.3 Розрахунок заземлення 58 ОСНОВНI ВИСНОВКИ ДИПЛОМНОЇ РОБОТИ 62 БIБЛIОГРАФIЯ 63 Додаток 65
Cerda, III Cruz. "Medical Identity Theft and Palm Vein Authentication: The Healthcare Manager's Perspective." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4778.
Full textEl, Khoury Franjieh. "Modélisation de la sécurisation d’accès aux réseaux par la technique de cryptographie asymétrique en utilisant la reconnaissance de l’iris et la technologie des agents." Thesis, Lyon 1, 2009. http://www.theses.fr/2009LYO10308.
Full textThe exponential growth in the use of the Internet as well as the emergence of new types of applications has increased the network’s constraints in terms f security. Fort the last several years, biometric techniques have proven their applicability and reliability in providing secure access to shared resources in different domains. Furthermore, software agents and multi-agent systems (MAS) have evidently been efficient in resolving several problems in network. Therefore, the aim of this research is to propose a model “IrisCryptoAgentSystem” (ICAS) that is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using “Rivest-Shamir-Adleman” (RSA) in an agent-based architecture. This model should provide secure access to information and ensure the protection of confidential information. Therefore, our work focuses on the development of new methods in biometric autheitcation in order to provide greater efficiency in the ICAS model. We introduce pretopological aspects in the development of the indexed hierarchy to classify DHVA templates. Our approach aims to improve the existing methods for the localization of the external and the internal edges of the iris
Хома, Юрій Володимирович. "Теорія і методи комп’ютерного опрацювання біосигналів на основі машинного навчання." Diss., Національний університет "Львівська політехніка", 2020. https://ena.lpnu.ua/handle/ntb/56149.
Full textDu, Preez Johan Frederik. "Liveness assurance in biometric systems." Thesis, 2008. http://hdl.handle.net/10210/362.
Full textProf. S.H. Von Solms
Fang, Jian-Shuen, and 方建舜. "Pyroelectric Infrared Biometric Systems for Real-Time Human Identification." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/13781066981337490131.
Full text國立交通大學
光電工程系所
95
In this study, we proposed novel designs for computational systems that use biometrics and non-conventional imaging approaches to capture thermal motion features of humans to achieve real-time path-dependent and path-independent gait for human identification. Feature representation is key to biometric recognition system. From a thermal perspective, each person represents a distributed infrared source, the distribution function of which is determined by shape and IR emissivity of the skin at every point. When humans walk, the motion of various parts of the body, including the torso, arms, and legs, produces a characteristic signature. Combined with idiosyncrasies of carriage, heat will uniquely impact a surrounding sensor field, even while the subject follows a prescribed path. The pyroelectric infrared (PIR) sensor is a high performance IR radiation detector and its low cost and low power consumption make it attractive for a wide range of applications. When the temperature changes, electric charge will built up on the sensing element by virtue of pyroelectricity. The resulting charge translated into a current that a current-to-voltage transductance amplifier converted to a voltage signal. By measuring the sensor response generated by a person walking within the field of view of a PIR sensor module, we can model this response data to a code vector that uniquely identifies the person. We have developed two PIR feature-generating sensor systems. One system is analog, the other digital, and both are derived from the signals generated by humans crossing the detection areas. We successfully demonstrate that by selecting suitable sensor configurations and feature extraction/training algorithms, the sensor systems are capable of performing human identification.
"BioVault : a protocol to prevent replay in biometric systems." Thesis, 2014. http://hdl.handle.net/10210/12321.
Full textMakinana, Sisanda. "Iris image quality assessment for online biometrics systems." Thesis, 2014. http://hdl.handle.net/10210/12396.
Full textIris recognition systems have attracted much attention for their uniqueness, stability and reliability. This recognition system is composed of four main modules, namely, iris acquisition, iris segmentation, feature extraction and encoding and - nally iris matching. However, performance of this system is a ected by poor image quality. In this research, a novel iris image quality assessment method based on character component is presented. This method is composed of two steps, individual assessment of character quality parameters and fusion of estimated quality parameters using Principal Component Analysis (PCA). The de ned quality parameters considered in this research are entropy, sharpness, occlusion, dilation, area ratio, contrast and blur. The designed technique was tested on three databases: Chinese Academy of Science Institute of Automation (CASIA), University of Beira Interior (UBIRIS) and Internal Collection (IC). Individual assessment of quality parameters has shown that dilation, sharpness and blur have more in uence on the quality score than the other parameters. The images were classi ed into two categories (good and bad) by human visual inspection. The e ect of the individual parameters on each database is illustrated, with CASIA exhibiting higher quality scores than the UBIRIS and IC databases. Support Vector Machine (SVM) and Linear Discriminant Analysis (LDA) were used to evaluate the performance of the proposed quality assessment algorithm. A k-fold cross validation technique was employed to the classi ers to obtain unbiased results. Two performance measures were used to rate the proposed algorithm, namely, Correct Rate (CR) and Area Under the Curve (AUC). Both performance measures showed that SVM classi er outperforms LDA in correctly classifying the quality of the images in all three databases. The experimental results demonstrated that the proposed algorithm is capable of detecting poor quality images as it yields an e ciency of over 84% and 90% in CR and AUC respectively. The use of character component to assess quality has been found to be su cient, though there is a need to develop a better technique for standardization of quality. The results found using a SVM classi er a rms the proposed algorithm is well-suited for quality assessment.
"The statistical evaluation of minutiae-based automatic fingerprint verification systems." Thesis, 2006. http://library.cuhk.edu.hk/record=b6074180.
Full textChen, Jiansheng.
"November 2006."
Adviser: Yiu-Sang Moon.
Source: Dissertation Abstracts International, Volume: 68-08, Section: B, page: 5343.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2006.
Includes bibliographical references (p. 110-122).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
Pahalawatta, K. K. "Plant species biometric using feature hierarchies : a plant identification system using both global and local features of plant leaves : a thesis submitted in partial fulfilment of the requirement for the degree of Master of Science in Computer Science, Department of Computer Science and Software Engineering, University of Canterbury, Christchurch /." 2008. http://library.canterbury.ac.nz/etd/adt-NZCU20080317.143205.
Full textNelufule, Nthatheni Norman. "Combining multiple Iris matchers using advanced fusion techniques to enhance Iris matching performance." Thesis, 2014. http://hdl.handle.net/10210/12111.
Full textThe enormous increase in technology advancement and the need to secure information e ectively has led to the development and implementation of iris image acquisition technologies for automated iris recognition systems. The iris biometric is gaining popularity and is becoming a reliable and a robust modality for future biometric security. Its wide application can be extended to biometric security areas such as national ID cards, banking systems such as ATM, e-commerce, biometric passports but not applicable in forensic investigations. Iris recognition has gained valuable attention in biometric research due to the uniqueness of its textures and its high recognition rates when employed on high biometric security areas. Identity veri cation for individuals becomes a challenging task when it has to be automated with a high accuracy and robustness against spoo ng attacks and repudiation. Current recognition systems are highly a ected by noise as a result of segmentation failure, and this noise factors increase the biometric error rates such as; the FAR and the FRR. This dissertation reports an investigation of score level fusion methods which can be used to enhance iris matching performance. The fusion methods implemented in this project includes, simple sum rule, weighted sum rule fusion, minimum score and an adaptive weighted sum rule. The proposed approach uses an adaptive fusion which maps feature quality scores with the matcher. The fused scores were generated from four various iris matchers namely; the NHD matcher, the WED matcher, the WHD matcher and the POC matcher. To ensure homogeneity of matching scores before fusion, raw scores were normalized using the tanh-estimators method, because it is e cient and robust against outliers. The results were tested against two publicly available databases; namely, CASIA and UBIRIS using two statistical and biometric system measurements namely the AUC and the EER. The results of these two measures gives the AUC = 99:36% for CASIA left images, the AUC = 99:18% for CASIA right images, the AUC = 99:59% for UBIRIS database and the Equal Error Rate (EER) of 0.041 for CASIA left images, the EER = 0:087 for CASIA right images and with the EER = 0:038 for UBIRIS images.
"Mobile personal authentication using fingerprint." 2004. http://library.cuhk.edu.hk/record=b5896205.
Full textThesis submitted in: July 2003.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 64-67).
Abstracts in English and Chinese.
List of Figures --- p.i
List of Tables --- p.iii
Acknowledgments --- p.iv
摘要 --- p.v
Thesis Abstract --- p.vi
Chapter 1. --- Mobile Commerce --- p.1
Chapter 1.1 --- Introduction to Mobile Commerce --- p.1
Chapter 1.2 --- Mobile commence payment systems --- p.2
Chapter 1.3 --- Security in mobile commerce --- p.5
Chapter 2. --- Mobile authentication using Fingerprint --- p.10
Chapter 2.1 --- Authentication basics --- p.10
Chapter 2.2 --- Fingerprint basics --- p.12
Chapter 2.3 --- Fingerprint authentication using mobile device --- p.15
Chapter 3. --- Design of Mobile Fingerprint Authentication Device --- p.19
Chapter 3.1 --- Objectives --- p.19
Chapter 3.2 --- Hardware and software design --- p.21
Chapter 3.2.1 --- Choice of hardware platform --- p.21
Chapter 3.3 --- Experiments --- p.25
Chapter 3.3.1 --- Design methodology I - DSP --- p.25
Chapter 3.3.1.1 --- Hardware platform --- p.25
Chapter 3.3.1.2 --- Software platform --- p.26
Chapter 3.3.1.3 --- Implementation --- p.26
Chapter 3.3.1.4 --- Experiment and result --- p.27
Chapter 3.3.2 --- Design methodology II ´ؤ SoC --- p.28
Chapter 3.3.2.1 --- Hardware components --- p.28
Chapter 3.3.2.2 --- Software components --- p.29
Chapter 3.3.2.3 --- Implementation Department of Computer Science and Engineering --- p.29
Chapter 3.3.2.4 --- Experiment and result --- p.30
Chapter 3.4 --- Observation --- p.30
Chapter 4. --- Implementation of the Device --- p.31
Chapter 4.1 --- Choice of platforms --- p.31
Chapter 4.2 --- Implementation Details --- p.31
Chapter 4.2.1 --- Hardware implementation --- p.31
Chapter 4.2.1.1 --- Atmel FingerChip --- p.32
Chapter 4.2.1.2 --- Gemplus smart card and reader --- p.33
Chapter 4.2.2 --- Software implementation --- p.33
Chapter 4.2.2.1 --- Operating System --- p.33
Chapter 4.2.2.2 --- File System --- p.33
Chapter 4.2.2.3 --- Device Driver --- p.35
Chapter 4.2.2.4 --- Smart card --- p.38
Chapter 4.2.2.5 --- Fingerprint software --- p.41
Chapter 4.2.2.6 --- Graphical user interface --- p.41
Chapter 4.3 --- Results and observations --- p.44
Chapter 5. --- An Application Example 一 A Penalty Ticket Payment System (PTPS) --- p.47
Chapter 5.1 --- Requirement --- p.47
Chapter 5.2 --- Design Principles --- p.48
Chapter 5.3 --- Implementation --- p.52
Chapter 5.4 --- Results and Observation --- p.57
Chapter 6. --- Conclusions and future work --- p.62
Chapter 7. --- References --- p.64
Kjellén, Oliver, and Jillian Pang. "Privatpersoners användning av biometriteknik : Användbarhet, säkerhet och integritet." Thesis, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-25462.
Full textBackground Biometrics is a field including different automated technologies used for thepurpose of identify individuals. Biometric identification methods such asfingerprint scanning and facial recognition used to be a field reserved forspecific application purposes. Nowadays biometrics are used more frequently,and it is available for the public to use in their everyday life. Biometrics canprovide more secure solutions compared to normal passwords, but to achievethis adoption of said methods is key, especially seeing as users store moresensitive and personal data on their smart devices compared to yesterday’s nonsmartphones. Purpose The purpose of this study is to explore how the factors usability, security andprivacy affect people’s use of biometric solutions on their smartphones,tablets, and computers. After thoroughly reviewing previous literature thesethree main factors gained extra focus. The first factor, security, biometrics dooffer greater security advantages when used the right way. Also, previousresearch points towards security as an aspect people should have in mindwhile using biometrics. The second factor, usability, this aspect is based onprevious research showing that people tend to value functions and features thatare usable. A third factor, privacy, was chosen because research showedconflicting results regarding the importance of this factor. Method This study was conducted primarily through a quantitative survey, answers(n=121) from this survey was later used to reflect upon the research question:How much of an impact does the factors usability, security and privacy haveover peoples use of biometrics? A chapter providing an overview of previousresearch is also included, for this chapter literature has been reviewed in aqualitative matter to sort out relevant research articles. Results Results from the survey that was conducted showed that most individuals doindeed use biometrics on their mobile phones, tablets, and computers. Datacollected also indicates that the factor usability had a big impact on peoples useof biometrics. People also responded that they saw some physiological traitsused for biometrics as more, or less accepted to be stored and collected. Otheranswers to the survey showed that individuals generally do not care too muchabout their privacy when using biometrics. Conclusion After concluded discussions regarding previous research and the resultscollected from individuals through the survey a conclusion is reached. Thefactor usability had a big impact on individuals use biometrics. A small part ofindividuals does also consider security to be important. However, the factorprivacy was mostly ignored when it comes to using biometrics on smartphones,tablets and computers.