Academic literature on the topic 'Biometric Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometric Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Biometric Security"
Sharma, Tushar, and Upinder Kaur. "Biometric Security: A Review to Future." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3758–68. http://dx.doi.org/10.47059/revistageintec.v11i4.2405.
Full textRiaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (January 15, 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Full textYang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (September 14, 2021): 6163. http://dx.doi.org/10.3390/s21186163.
Full textLakhera, Manmohan, and Manmohan Singh Rauthan. "Securing Stored Biometric Template Using Cryptographic Algorithm." International Journal of Rough Sets and Data Analysis 5, no. 4 (October 2018): 48–60. http://dx.doi.org/10.4018/ijrsda.2018100103.
Full textB.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Full textYaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.
Full textSingh, Bhanu, and Nirvisha Singh. "MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics." Information 11, no. 6 (June 8, 2020): 308. http://dx.doi.org/10.3390/info11060308.
Full textKOPCZEWSKI, Marian, and Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (October 2, 2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.
Full textReddy, M. V. Bramhananda, and V. Goutham. "IRIS TECHNOLOGY: A REVIEW ON IRIS BASED BIOMETRIC SYSTEMS FOR UNIQUE HUMAN IDENTIFICATION." International Journal of Research -GRANTHAALAYAH 6, no. 1 (January 31, 2018): 80–90. http://dx.doi.org/10.29121/granthaalayah.v6.i1.2018.1596.
Full text., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.
Full textDissertations / Theses on the topic "Biometric Security"
Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textTitle from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
Fouad, Marwa. "Towards Template Security for Iris-based Biometric Systems." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22736.
Full textJayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.
Full textBlommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.
Full textVerification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.
Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.
In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.
The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.
Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.
Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.
Cooper, Curt S. "Aviation security: biometric technology and risk based security aviation passenger screening program." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27811.
Full textSince 9/11, the Transportation Security Administration (TSA) has struggled to maintain a balance between providing a secure world-class aviation passenger-screening program (APSP) while providing efficiency, convenience and security for the traveling public and the airline industry. For years the TSA has applied resources and procedures uniformly to all passengers during aviation passenger screening. It is mainly a one size fits all screening where all passengers are treated as equal risk, which has exponentially increased resources, procedures and equipment required to do aviation passenger screening, Recently, the Transportation Security Administration has sought to find a better way to conduct aviation passenger screening and is transitioning to Risk Based Security (RBS). The RBS initiatives have greatly improved the aviation passenger screening experience while increasing the efficiency of checkpoint screening by shortening the amount of wait times. Furthermore, it has allowed resources to be applied to high-risk individuals and lessen the burden of passenger screening on low-risk individuals. This has freed up resources reduced procedures while simultaneously increasing the efficiency of the checkpoint. The research here provides options on how to better enable current RBS initiatives by incorporating biometric technology into the aviation passenger-screening program. This research has reviewed other government programs that have incorporated biometrics into their procedures to improve the efficiency and reliability by using biometrically enhanced security measures. Through the application or modification of these biometrically enhanced security programs of other agencies, the TSA could standardize and incorporate biometrics into the RBS APSP allowing for authentication of both identity verification and identification. This research will explore how to incorporate biometrics into the current Risk-Based Security Aviation Passenger Screening Program.
Lease, David R. "Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers." Diss., Capella University, 2005. http://hdl.handle.net/10919/71576.
Full textAl-Assam, Hisham. "Entropy evaluation and security measures for reliable single/multi-factor biometric authentication and biometric keys." Thesis, University of Buckingham, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.601453.
Full textSumner, Kristine. "AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2475.
Full textPh.D.
Department of Criminal Justice and Legal Studies
Health and Public Affairs
Public Affairs PhD
Kuan, Hung-i. "Evaluation of a biometric keystroke typing dynamics computer security system." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/26530.
Full textThis study evaluates an inexpensive personal computer access control system that relies on biometric keystroke typing dynamics technology, BioPassword Model 2100 (BioPassword). Enrollment time, verification time, false rejection error rate, false acceptance error rate, and user acceptance were evaluated for this system. The results show that BioPassword provides multilayer security through the inclusion of privilege control, audit functions, passwords, and verification of a personal behavioral characteristic, the rate and variation of typing a given password string. Enrollment and verification times were considered satisfactorily fast. Overall false rejection error rate was 22.5%, while false acceptance error rate was 3.4%. The false rejection error rate for acceptance as a function of trial number from one trial to five trials were 4. 4%, 1.4%, O.7%, O.4%, andO.3% respectively. These values were achieved under relatively uncontrolled conditions and should be improved on by using recommendations that are included. Users generally reported satisfaction with the system, which should be acceptable as part of an office automation system when used in conjunction with other standard security measures. BioPassword Model 21 00, Biometric technology, Keystroke Typing Dynamics, False Rejection Error Rate, False Acceptance Error Rate, Enrollment Time, Verification Time
Al-Karawi, K. A. "Robust speaker recognition in reverberant condition : toward greater biometric security." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/47139/.
Full textBooks on the topic "Biometric Security"
Jiang, Richard, Somaya Al-maadeed, Ahmed Bouridane, Prof Danny Crookes, and Azeddine Beghdadi, eds. Biometric Security and Privacy. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47301-7.
Full textVielhauer, Claus. Biometric User Authentication for it Security. Boston, MA: Springer US, 2006. http://dx.doi.org/10.1007/0-387-28094-4.
Full textJaswal, Gaurav, Vivek Kanhangad, and Raghavendra Ramachandra, eds. AI and Deep Learning in Biometric Security. First edition. | Boca Raton, FL : CRC Press, 2021. |: CRC Press, 2021. http://dx.doi.org/10.1201/9781003003489.
Full textBiometrics for network security. Upper Saddle River, NJ: Prentice Hall PTR, 2004.
Find full textGavrilova, Marina L. Multimodal biometrics and intelligent image processing for security systems. Hershey, PA: Information Science Reference, 2013.
Find full textOffice, General Accounting. Technology assessment: Using biometrics for border security. Washington, D.C. (P.O. Box 37050, Washington 20013): U.S. General Accounting Office, 2002.
Find full textSecurity, risk and the biometric state: Governing borders and bodies. London: Routledge, 2010.
Find full textHigh level security. Tunbridge Wells: Ticktock, 2010.
Find full textill, Turner Ian, ed. Biometrics: Your body and the science of security. Toronto, ON: Owlkids Books, 2017.
Find full text1958-, Li S. Z., ed. Advances in biometric person authentication: 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004 : proceedings. Berlin: Springer, 2004.
Find full textBook chapters on the topic "Biometric Security"
Salveggio, Eric, Steven Lovaas, David R. Lease, and Robert Guess. "Biometric Authentication." In Computer Security Handbook, 29.1–29.28. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch29.
Full textLi, Li, Shengguang Li, Shiwei Zhao, and Lin Tan. "Research on Security of Public Security Iris Application." In Biometric Recognition, 459–67. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97909-0_49.
Full textCannon, Greg, Philip Statham, and Asahiko Yamada. "Biometric Security, Standardization." In Encyclopedia of Biometrics, 122–29. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_230.
Full textCannon, Greg, Asahiko Yamada, and Philip Statham. "Biometric Security Standards." In Encyclopedia of Biometrics, 217–24. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_230.
Full textWirtz, Brigitte. "Biometric System Security." In Securing Electronic Business Processes, 108–19. Wiesbaden: Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84982-3_12.
Full textCannon, Greg, Asahiko Yamada, and Philip Statham. "Biometric Security Standards." In Encyclopedia of Biometrics, 1–9. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_230-3.
Full textGenovese, Angelo, Vincenzo Piuri, and Fabio Scotti. "Biometric Systems." In Advances in Information Security, 7–32. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10365-5_2.
Full textCavoukian, Ann, and Alex Stoianov. "Biometric Encryption." In Encyclopedia of Cryptography and Security, 90–98. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_880.
Full textVijaya Kumar, B. V. K. "Biometric Matching." In Encyclopedia of Cryptography and Security, 98–101. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_726.
Full textThomas, Achint, and Venu Govindaraju. "Biometric Sensors." In Encyclopedia of Cryptography and Security, 110–13. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_727.
Full textConference papers on the topic "Biometric Security"
More, Swapnaja B., Amol B. Ubale, and K. C. Jondhale. "Biometric Security." In 2008 First International Conference on Emerging Trends in Engineering and Technology. IEEE, 2008. http://dx.doi.org/10.1109/icetet.2008.71.
Full textTrikos, Mladen, Ivan Tot, Jovan Bajcetic, Komlen Lalovic, Borisa Jovanovic, and Dusan Bogicevic. "Biometric Security Standardization." In 2019 Zooming Innovation in Consumer Technologies Conference (ZINC). IEEE, 2019. http://dx.doi.org/10.1109/zinc.2019.8769419.
Full textMoody, Janette. "Public Perceptions of Biometric Devices:The Effect of Misinformation on Acceptance and Use." In InSITE 2004: Informing Science + IT Education Conference. Informing Science Institute, 2004. http://dx.doi.org/10.28945/2743.
Full textArndt, Craig M. "Biometric template revocation." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.538633.
Full textVielhauer, Claus, and Ton Kalker. "Security for biometric data." In Electronic Imaging 2004, edited by Edward J. Delp III and Ping W. Wong. SPIE, 2004. http://dx.doi.org/10.1117/12.528261.
Full textLifeng Lai, Siu-Wai Ho, and H. Vincent Poor. "Privacy-security tradeoffs in biometric security systems." In 2008 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE, 2008. http://dx.doi.org/10.1109/allerton.2008.4797566.
Full textHsu, Charles, Michael Viazanko, Jimmy O'Looney, and Harold Szu. "Modular biometric system." In SPIE Defense, Security, and Sensing, edited by Harold H. Szu and F. Jack Agee. SPIE, 2009. http://dx.doi.org/10.1117/12.820297.
Full text"Biometric Identification in Virtual Worlds using Biometric Fusion Techniques." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004054602630269.
Full textSujithra, M., and G. Padmavathi. "Next generation biometric security system." In the Second International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2393216.2393280.
Full textStoianov, A., T. Kevenaar, and M. van der Veen. "Security issues of Biometric Encryption." In 2009 IEEE Toronto International Conference - Science and Technology for Humanity (TIC-STH 2009). IEEE, 2009. http://dx.doi.org/10.1109/tic-sth.2009.5444478.
Full textReports on the topic "Biometric Security"
Janker, Peter S. United States Homeland Security and National Biometric Identification. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404488.
Full text