Academic literature on the topic 'Biometric Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Biometric Security"

1

Sharma, Tushar, and Upinder Kaur. "Biometric Security: A Review to Future." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3758–68. http://dx.doi.org/10.47059/revistageintec.v11i4.2405.

Full text
Abstract:
This paper presents the different biometric with their limitations and introduces their alternative in form of brain biometric, Breath biometrics, and Tongue biometrics. Brain biometric uses brain wave while breath biometric uses one’s breath and tongue biometric uses a tongue’s shape and variation to distinguish them and present a good alternative for the presently used biometric like fingerprint, iris recognition, face recognition.
APA, Harvard, Vancouver, ISO, and other styles
2

Riaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (January 15, 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.

Full text
Abstract:
Purpose The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area. Design/methodology/approach In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems. Findings Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies. Originality/value This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (September 14, 2021): 6163. http://dx.doi.org/10.3390/s21186163.

Full text
Abstract:
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
4

Lakhera, Manmohan, and Manmohan Singh Rauthan. "Securing Stored Biometric Template Using Cryptographic Algorithm." International Journal of Rough Sets and Data Analysis 5, no. 4 (October 2018): 48–60. http://dx.doi.org/10.4018/ijrsda.2018100103.

Full text
Abstract:
The biometric template protection technique provides the security in many authentication applications. Authentication based on biometrics has more advantages over traditional methods such as password and token-based authentication methods. The advantage of any biometric-based authentication system over a traditional one is that the person must physically be present at that place while recognizing him. So, it is essential to secure these biometrics by combining these with cryptography. In the proposed algorithm, the AES algorithm is used for securing the stored and transmitted biometric templates using helping data. The helping data is a variable type of data which is changed at every attempt for registration. The final symmetric key AES algorithm is a combination of helping data and actual symmetric keys of the AES algorithm. The experimental analysis shows that a brute force attack takes a long time to recover the original biometric template from cipher biometric template. So, the proposed technique provides sufficient security to stored biometric templates.
APA, Harvard, Vancouver, ISO, and other styles
5

B.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.

Full text
Abstract:
Authentication plays a vital role in Information security. The need for identification of legitimate user has increased in the waking concerns for global security. Biometric recognition Systems is a major tool for Authentication mechanism. Biometrics is the ability to identify and authenticate an individual using one or more of their behavioral or physical characteristics. The Study of Different Biometric Modalities gives a better understanding of Biometric Techniques. We focus our Study on Face Biometrics. This paper emphasizes on better understanding of introduction to Biometrics, Biometric Modalities and Face recognition Techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Yaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.

Full text
Abstract:
Biometric is used as a main security fence in a computer system. The unique characteristics of a person can be distinguished from each other. Human’s biometrics can be categorized into three types: morphological, biological and behavioural. Morphological biometrics uses physical features for recognition. Biological biometrics used to identify user based on biological features. Behavioural biometrics such as gender, culture, height and weight can be used as an additional security measure within a system. These biometric behavioural features are also known as soft biometric. This study uses soft biometric elements (gender, culture, region of birth and educational level) in the keystroke dynamic study to distinguish typing patterns in each of these categories. The Support Vector Machine (SVM) classification method is used to perform this classification for soft biometric identification. The results of this study have shown that soft biometrics in keystroke dynamic can be used to distinguish group of individuals typing.
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Bhanu, and Nirvisha Singh. "MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics." Information 11, no. 6 (June 8, 2020): 308. http://dx.doi.org/10.3390/info11060308.

Full text
Abstract:
With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. Organizations encourage their members to use biometrics, but they are hesitant to use them due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. We propose a server-specific add-on biometric security layer model (MoLaBSS) to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show good potential of this framework to enhance users’ confidence level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.
APA, Harvard, Vancouver, ISO, and other styles
8

KOPCZEWSKI, Marian, and Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (October 2, 2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.

Full text
Abstract:
Possibilities for the use of biometric data are growing and hence their practical application is also increasing. Therefore, an important element to be considered in the design, construction and exploitation of systems using biometrics is the question of identifying a specific person and assigning him or her to the relevant data contained in the documents or databases. The ability and, in some cases, the need to use biometric data results from the growing use of information technology in everyday life and the ever increasing attempts to steal the identity of those using these technologies. Modern IT systems often have a high level of security in terms of protection and access to data, and in particular the management of security systems. The article presents an outline of the theory related to the possibility of using and applying biometric data to provide security and have the ability to inspect officers of various departments. The subject of analysis also considered the possibility of using security measures in the form of biometric data identification for the purpose of securing the security services.
APA, Harvard, Vancouver, ISO, and other styles
9

Reddy, M. V. Bramhananda, and V. Goutham. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research -GRANTHAALAYAH 6, no. 1 (January 31, 2018): 80–90. http://dx.doi.org/10.29121/granthaalayah.v6.i1.2018.1596.

Full text
Abstract:
Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms. Since iris is unique for all individuals across the globe, many researchers focused on using iris or along with other biometrics for security with great precision. Multimodal biometric systems came into existence for better accuracy in human authentication. However, iris is considered to be most discriminatory of facial biometrics. Study of iris based human identification in ideal and non-cooperative environments can provide great insights which can help researchers and organizations that depend on iris-based biometric systems. The technical knowhow of iris strengths and weaknesses can be great advantage. This is more important in the wake of widespread use of smart devices which are vulnerable to attacks. This paper throws light into various iris-based biometric systems, issues with iris in the context of texture comparison, cancellable biometrics, iris in multi-model biometric systems, iris localization issues, challenging scenarios pertaining to accurate iris recognition and so on.
APA, Harvard, Vancouver, ISO, and other styles
10

., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.

Full text
Abstract:
Biometrics is the discipline to measure physical human characteristics for the identification and authentication of an individual. Since ancient times, people have used voice, face, and other characteristics for the identification of an individual. With evolution, we take the individual characteristics like fingerprint scans, retina and iris images, etc., as inputs to the computer systems and then store or verify them with existing records. This report discusses biometrics and its recent roles found in the field of healthcare, medicine, genetics, and biotechnology. It includes the concept of biometrics, the system used for biometric recognition and its working, types of biometric systems, the different system algorithms applied, and system modules which are well illustrated with flow charts and block diagrams. Some of the health institutes in developed countries have started using biometric systems for checking patients and/or doctors. Biometry has enabled the proper organization and storage of the health records of individuals in medical institutes. Biometric authentication is also finding a distinct role in foiling medical claims fraud highlighting the advantages it. Even after processing via a very accurate biometric system, there is a chance of a false result due to some disease or injury to the body part subjected to biometry or faulty system leading to some error. There is also a possibility that the biometric system may harm our bodies. Moreover, biometric records need really tight system security to prevent any kind of misuse. Biometrics has a great potential to find a lot more uses in the field of healthcare. Many ideas are being proposed for implementation. In the future, biometrics can be used to detect potential disease and risks by using methods like adiposity measurement and Gas Discharge Visualization (GDV).
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Biometric Security"

1

Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
Abstract:
Thesis (Ph. D.)--Michigan State University. Dept. of Computer Science and Engineering, 2008.
Title from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Fouad, Marwa. "Towards Template Security for Iris-based Biometric Systems." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22736.

Full text
Abstract:
Personal identity refers to a set of attributes (e.g., name, social insurance number, etc.) that are associated with a person. Identity management is the process of creating, maintaining and destroying identities of individuals in a population. Biometric technologies are technologies developed to use statistical analysis of an individual’s biological or behavioral traits to determine his identity. Biometrics based authentication systems offer a reliable solution for identity management, because of their uniqueness, relative stability over time and security (among other reasons). Public acceptance of biometric systems will depend on their ability to ensure robustness, accuracy and security. Although robustness and accuracy of such systems are rapidly improving, there still remain some issues of security and balancing it with privacy. While the uniqueness of biometric traits offers a convenient and reliable means of identification, it also poses the risk of unauthorized cross-referencing among databases using the same biometric trait. There is also a high risk in case of a biometric database being compromised, since it’s not possible to revoke the biometric trait and re-issue a new one as is the case with passwords and smart keys. This unique attribute of biometric based authentication system poses a challenge that might slow down public acceptance and the use of biometrics for authentication purposes in large scale applications. In this research we investigate the vulnerabilities of biometric systems focusing on template security in iris-based biometric recognition systems. The iris has been well studied for authentication purposes and has been proven accurate in large scale applications in several airports and border crossings around the world. The most widely accepted iris recognition systems are based on Daugman’s model that creates a binary iris template. In this research we develop different systems using watermarking, bio-cryptography as well as feature transformation to achieve revocability and security of binary templates in iris based biometric authentication systems, while maintaining the performance that enables widespread application of these systems. All algorithms developed in this research are applicable on already existing biometric authentication systems and do not require redesign of these existing, well established iris-based authentication systems that use binary templates.
APA, Harvard, Vancouver, ISO, and other styles
3

Jayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.

Full text
Abstract:
Security is very important in present day life. In this highly-interconnected world, most of our daily activities are computer based, and the data transactions are protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords related to an individual that can lead to attacks. Indeed, remembering several passwords can become a tedious task. Biometrics is a science that measures an individual’s physical characteristics in a unique way. Thus, biometrics serves as a method to replace the cumbersome use of complex passwords. Our research uses the features of biometrics to efficiently implement a biometric encryption system with a high level of security.
APA, Harvard, Vancouver, ISO, and other styles
4

Blommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.

Full text
Abstract:

Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.

Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.

In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.

The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.

Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.

Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.

APA, Harvard, Vancouver, ISO, and other styles
5

Cooper, Curt S. "Aviation security: biometric technology and risk based security aviation passenger screening program." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27811.

Full text
Abstract:
CHDS State/Local
Since 9/11, the Transportation Security Administration (TSA) has struggled to maintain a balance between providing a secure world-class aviation passenger-screening program (APSP) while providing efficiency, convenience and security for the traveling public and the airline industry. For years the TSA has applied resources and procedures uniformly to all passengers during aviation passenger screening. It is mainly a one size fits all screening where all passengers are treated as equal risk, which has exponentially increased resources, procedures and equipment required to do aviation passenger screening, Recently, the Transportation Security Administration has sought to find a better way to conduct aviation passenger screening and is transitioning to Risk Based Security (RBS). The RBS initiatives have greatly improved the aviation passenger screening experience while increasing the efficiency of checkpoint screening by shortening the amount of wait times. Furthermore, it has allowed resources to be applied to high-risk individuals and lessen the burden of passenger screening on low-risk individuals. This has freed up resources reduced procedures while simultaneously increasing the efficiency of the checkpoint. The research here provides options on how to better enable current RBS initiatives by incorporating biometric technology into the aviation passenger-screening program. This research has reviewed other government programs that have incorporated biometrics into their procedures to improve the efficiency and reliability by using biometrically enhanced security measures. Through the application or modification of these biometrically enhanced security programs of other agencies, the TSA could standardize and incorporate biometrics into the RBS APSP allowing for authentication of both identity verification and identification. This research will explore how to incorporate biometrics into the current Risk-Based Security Aviation Passenger Screening Program.
APA, Harvard, Vancouver, ISO, and other styles
6

Lease, David R. "Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers." Diss., Capella University, 2005. http://hdl.handle.net/10919/71576.

Full text
Abstract:
The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examining managers’ perceptions of the security effectiveness, need, reliability, and cost-effectiveness of biometrics. The research indicates that positive perceptions of security effectiveness, need, reliability, and cost-effectiveness correlate with IT/IA managers’ willingness to recommend biometric security technologies. The implications of this study are that executives and managers can make informed decisions about the recommendation and adoption process relevant to biometric security technologies through an understanding of how perceptions of biometric technology affect the decision to recommend this type of technology. The study’s results may also help biometric product developers, vendors, and marketers understand the important perceptions of biometric security technologies within their customer base of IT/IA managers.
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Assam, Hisham. "Entropy evaluation and security measures for reliable single/multi-factor biometric authentication and biometric keys." Thesis, University of Buckingham, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.601453.

Full text
Abstract:
The growing deployment of biometrics as a proof of identity has generated a great deal of research into biometrics in recent years, and widened the scope of investigations beyond improving accuracy into mechanisms to deal with serious concerns raised about security and privacy due to the potential misuse. of the collected biometric data along with possible attacks on biometric systems. The focus on improving performance of biometric authentication has been more on multi-modal and multi-factor biometric authentication in conjunction with designing recognition techniques to mitigate the adverse effect of variations in recording conditions. Some of these approaches together with the emerging developments of cancellable biometrics and biometric cryptosystems have been used as mechanisms to enhance security and privacy of biometric systems. This thesis is designed to deal with these complimentary and closely related issues through investigations that aim at understanding the impact of varying biometric sample recording conditions on the discriminating information content (entropy) of these samples, and to use the gained knowledge to (1) design adaptive techniques for improved performance of biometric authentication, and (2) propose and test a framework for a proper evaluation of security of all factors/components involved in biometric keys and multi-factor biometric authentication. The first part of this thesis consists of a set of theoretical and empirical investigations designed to evaluate and analyse the effect of emerging developments in biometrics systems, with a focus on those related to biometric entropy and multi-factor authentication. The analysis of different biometric entropy measures, proposed in the literature, reveals that variations in biometric sample quality lead to variations in the correlation between biometric entropy values calculated using any of the known measures and the accuracy of the biometric recognition. Furthermore, analysis of the spatial distribution of entropy values in face images reveals a non-uniform distribution. The widely expected inherent individual differences in biometric features entropy will also be confirmed. Moreover, we uncover a myth reported in the literature about near perfect accuracy of certain quality-based adaptive recognition schemes.
APA, Harvard, Vancouver, ISO, and other styles
8

Sumner, Kristine. "AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2475.

Full text
Abstract:
The terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the aviation system and U.S national security (9/11 Commission, 2004). Each U.S. airport is individually responsible for various aspects of security including the control of physical access to sensitive and secure areas and facilities (9/11 Commission, 2004). Biometric technology has been examined as one method of enhancing airport access control to mitigate the possibility of criminal acts against airports. However, successful implementation of biometric technology depends largely on how individual security directors at each airport perceive, understand, and accept that technology. Backgrounds, attitudes, and personal characteristics influence individual decisions about technology implementation (Rogers, 1995; Tornatzky and Fleischer, 1990). This study examines the problem of airport access control, as well as, the current trends in biometric technology. Utilizing a survey of airport security directors and security managers, this study draws upon innovation diffusion theory and organizational theories to determine what personal, organizational, and technical variables contribute to the propensity of airport security directors and managers to adopt biometric technology for airport access control.
Ph.D.
Department of Criminal Justice and Legal Studies
Health and Public Affairs
Public Affairs PhD
APA, Harvard, Vancouver, ISO, and other styles
9

Kuan, Hung-i. "Evaluation of a biometric keystroke typing dynamics computer security system." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/26530.

Full text
Abstract:
Approved for public release; distribution is unlimited.
This study evaluates an inexpensive personal computer access control system that relies on biometric keystroke typing dynamics technology, BioPassword Model 2100 (BioPassword). Enrollment time, verification time, false rejection error rate, false acceptance error rate, and user acceptance were evaluated for this system. The results show that BioPassword provides multilayer security through the inclusion of privilege control, audit functions, passwords, and verification of a personal behavioral characteristic, the rate and variation of typing a given password string. Enrollment and verification times were considered satisfactorily fast. Overall false rejection error rate was 22.5%, while false acceptance error rate was 3.4%. The false rejection error rate for acceptance as a function of trial number from one trial to five trials were 4. 4%, 1.4%, O.7%, O.4%, andO.3% respectively. These values were achieved under relatively uncontrolled conditions and should be improved on by using recommendations that are included. Users generally reported satisfaction with the system, which should be acceptable as part of an office automation system when used in conjunction with other standard security measures. BioPassword Model 21 00, Biometric technology, Keystroke Typing Dynamics, False Rejection Error Rate, False Acceptance Error Rate, Enrollment Time, Verification Time
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Karawi, K. A. "Robust speaker recognition in reverberant condition : toward greater biometric security." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/47139/.

Full text
Abstract:
Automatic speaker recognition systems have developed into an increasingly relevant technology for security applications in modern times. The primary challenge for automatic speaker recognition is to deal with the variability of the environments and channels from where the speech was obtained. In previous work, good results have been achieved for clean, high-quality speech with the matching of training and test acoustic conditions. However, under mismatched conditions and reverberant environments, often expected in the real world, system performance degrades significantly.“ The main aim of this study is to improve the robustness of speaker recognition systems for real-world applications in reverberant conditions by developing methods that can reduce the detrimental effects of reverberation on the single microphone speech signal”. The collection of suitable speech data sets is of crucial importance for testing the performance in the development of speaker recognition techniques. Therefore, a data set of anechoic speech recordings was generated and used to conduct the study regarding the suggested methods in this thesis. Furthermore, a typical speaker recognition system was implemented and then evaluated based on the current state of the art technique using Gaussian Mixture Models with two standard features. The effect of “reverberation time” and the “distance from the source to a receiver” on the system performance have also been examined, and the result confirms that whilst both parameters could affect the system accuracy. A “maximum likelihood algorithm” is used for blind-estimate reverberation time from speech signals submitted for verification. The estimated values are used to choose a matched acoustic impulse response for inclusion in the retraining or fine-tuning of the pattern recognition model. To endeavour more improvement, the “autocorrelation function” has been used to estimate the early reflections sound value for the submitted signal. The estimated early reflections sound value has convolved with the anechoic signal, and then used for training the pattern recognition model. Furthermore, both of the early to late ratio and RT have identified for the submitted sample and practically used to determine a matched channel for the training on the fly to improve the system performance. The principal findings are that “reverberation time”, “early reflections” and “early to late ratio” can be estimated and then used with “training on the fly methods” to improve the speaker verification performance. The system is an improvement, which is demonstrated by comparing the performance of speaker recognition using “conventional methods” with the performance of the proposed “re-training method”.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Biometric Security"

1

Jiang, Richard, Somaya Al-maadeed, Ahmed Bouridane, Prof Danny Crookes, and Azeddine Beghdadi, eds. Biometric Security and Privacy. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47301-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vielhauer, Claus. Biometric User Authentication for it Security. Boston, MA: Springer US, 2006. http://dx.doi.org/10.1007/0-387-28094-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jaswal, Gaurav, Vivek Kanhangad, and Raghavendra Ramachandra, eds. AI and Deep Learning in Biometric Security. First edition. | Boca Raton, FL : CRC Press, 2021. |: CRC Press, 2021. http://dx.doi.org/10.1201/9781003003489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Biometrics for network security. Upper Saddle River, NJ: Prentice Hall PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gavrilova, Marina L. Multimodal biometrics and intelligent image processing for security systems. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Technology assessment: Using biometrics for border security. Washington, D.C. (P.O. Box 37050, Washington 20013): U.S. General Accounting Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Security, risk and the biometric state: Governing borders and bodies. London: Routledge, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

High level security. Tunbridge Wells: Ticktock, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

ill, Turner Ian, ed. Biometrics: Your body and the science of security. Toronto, ON: Owlkids Books, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1958-, Li S. Z., ed. Advances in biometric person authentication: 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004 : proceedings. Berlin: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Biometric Security"

1

Salveggio, Eric, Steven Lovaas, David R. Lease, and Robert Guess. "Biometric Authentication." In Computer Security Handbook, 29.1–29.28. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Li, Shengguang Li, Shiwei Zhao, and Lin Tan. "Research on Security of Public Security Iris Application." In Biometric Recognition, 459–67. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97909-0_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cannon, Greg, Philip Statham, and Asahiko Yamada. "Biometric Security, Standardization." In Encyclopedia of Biometrics, 122–29. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cannon, Greg, Asahiko Yamada, and Philip Statham. "Biometric Security Standards." In Encyclopedia of Biometrics, 217–24. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wirtz, Brigitte. "Biometric System Security." In Securing Electronic Business Processes, 108–19. Wiesbaden: Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84982-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cannon, Greg, Asahiko Yamada, and Philip Statham. "Biometric Security Standards." In Encyclopedia of Biometrics, 1–9. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_230-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Genovese, Angelo, Vincenzo Piuri, and Fabio Scotti. "Biometric Systems." In Advances in Information Security, 7–32. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10365-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cavoukian, Ann, and Alex Stoianov. "Biometric Encryption." In Encyclopedia of Cryptography and Security, 90–98. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vijaya Kumar, B. V. K. "Biometric Matching." In Encyclopedia of Cryptography and Security, 98–101. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thomas, Achint, and Venu Govindaraju. "Biometric Sensors." In Encyclopedia of Cryptography and Security, 110–13. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_727.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Biometric Security"

1

More, Swapnaja B., Amol B. Ubale, and K. C. Jondhale. "Biometric Security." In 2008 First International Conference on Emerging Trends in Engineering and Technology. IEEE, 2008. http://dx.doi.org/10.1109/icetet.2008.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trikos, Mladen, Ivan Tot, Jovan Bajcetic, Komlen Lalovic, Borisa Jovanovic, and Dusan Bogicevic. "Biometric Security Standardization." In 2019 Zooming Innovation in Consumer Technologies Conference (ZINC). IEEE, 2019. http://dx.doi.org/10.1109/zinc.2019.8769419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moody, Janette. "Public Perceptions of Biometric Devices:The Effect of Misinformation on Acceptance and Use." In InSITE 2004: Informing Science + IT Education Conference. Informing Science Institute, 2004. http://dx.doi.org/10.28945/2743.

Full text
Abstract:
Organizations are introducing biometric devices into various sections of the economy for various reasons. What began as a security feature for a limited number of government organizations has been adapted to such diverse uses as paying for school children’s lunches to tracking employees’ work attendance. From an organizational perspective, justifications for use of biometric devices are plentiful. However, the public’s perception of these devices may be quite different. These perceptions in turn will influence public willingness to accept and use biometric devices. Although employee use of biometric devices can be mandated, a more productive alternative might be to understand their perceptions and address those specifically through education and information. This paper describes common types of biometrics, reviews their current use in organizations, presents findings of a recent survey of public perceptions to determine the areas requiring the most education, and concludes with suggestions for providing this education.
APA, Harvard, Vancouver, ISO, and other styles
4

Arndt, Craig M. "Biometric template revocation." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.538633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vielhauer, Claus, and Ton Kalker. "Security for biometric data." In Electronic Imaging 2004, edited by Edward J. Delp III and Ping W. Wong. SPIE, 2004. http://dx.doi.org/10.1117/12.528261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lifeng Lai, Siu-Wai Ho, and H. Vincent Poor. "Privacy-security tradeoffs in biometric security systems." In 2008 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE, 2008. http://dx.doi.org/10.1109/allerton.2008.4797566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hsu, Charles, Michael Viazanko, Jimmy O'Looney, and Harold Szu. "Modular biometric system." In SPIE Defense, Security, and Sensing, edited by Harold H. Szu and F. Jack Agee. SPIE, 2009. http://dx.doi.org/10.1117/12.820297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Biometric Identification in Virtual Worlds using Biometric Fusion Techniques." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004054602630269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sujithra, M., and G. Padmavathi. "Next generation biometric security system." In the Second International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2393216.2393280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stoianov, A., T. Kevenaar, and M. van der Veen. "Security issues of Biometric Encryption." In 2009 IEEE Toronto International Conference - Science and Technology for Humanity (TIC-STH 2009). IEEE, 2009. http://dx.doi.org/10.1109/tic-sth.2009.5444478.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Biometric Security"

1

Janker, Peter S. United States Homeland Security and National Biometric Identification. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography