Contents
Academic literature on the topic 'Systèmes biométriques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Systèmes biométriques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Systèmes biométriques"
Ohmaid, Hicham, S. Eddarouich, A. Bourouhou, and M. Timouya. "Comparison between SVM and KNN classifiers for iris recognition using a new unsupervised neural approach in segmentation." IAES International Journal of Artificial Intelligence (IJ-AI) 9, no. 3 (September 1, 2020): 429. http://dx.doi.org/10.11591/ijai.v9.i3.pp429-438.
Full textYamboué, A. T., M. Zongo, B. Traoré, O. Diallo, and C. Hanzen. "Estimation du poids du fœtus zébu peulh à partir de mesures échographiques des paramètres fœtaux." Canadian Journal of Animal Science 100, no. 4 (December 1, 2020): 739–44. http://dx.doi.org/10.1139/cjas-2020-0004.
Full textDissertations / Theses on the topic "Systèmes biométriques"
El, Abed Mohamad. "Évaluation de systèmes biométriques." Caen, 2011. http://www.theses.fr/2011CAEN2072.
Full textBiometric systems are increasingly used to verify or identify the identity of an individual. Given the challenges related to their use, mainly for e-commerce applications or physical access control (border control), it is important to have an evaluation methodology of such systems. The problematic addressed in this thesis is the design of a modality-independent evaluation methodology of biometric systems. The challenges are many such as the comparison of biometric systems for a particular application, the evaluation of an algorithm during its development or in setting its optimal parameters. We propose in this thesis a quality assessment method of biometric raw data. The proposed method has the advantage of being independent from the biometric modality, and the used verification system. Five public databases are used to validate the proposed method. We have also developed two evaluation methods related to the usability and the security aspects of a biometric system. The first consists of measuring users' acceptance and satisfaction when using biometric systems. The second consists of measuring the system (architecture and algorithms) robustness against attacks. The two presented methods have the advantage of being modality-independent. Three biometric authentication systems are used to show the benefits of both methods
Vibert, Benoît. "Contributions à l'évaluation de systèmes biométriques embarqués." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMC208/document.
Full textBiometrics is sparking the interest of manufacturers and industrial compagniesbecause we are in need of new methods of authenticating individuals: for physicalaccess control, border control or for payments. Non-revocable and sensitive data isvery often stored on embedded systems of the secure element type (SE), such as asmart card. SEs include a comparison module called On-Card-Comparison (OCC),which determines whether the template presented corresponds to the template storedwithin it. In this thesis, we are particularly interested in fingerprints because it is abiometric modality that is very well perceived by the population.We propose in this thesis different contributions to evaluate embedded biometricsystems. The first is a biometric evaluation platform called EVABIO. The secondcontribution evaluates the impact on performance when reducing biometric templatesthat are to be stored on an SE. We propose methods to reduce the size of biometrictemplates while maintaining a high recognition rate thus, guaranteeing a good level ofperformance of the global biometric system. The last contribution studies attacks ona biometric system that is embedded on a SE. We look at what a priori are importantfor an impostor: we have shown that the type of fingerprint is an important a prioriand the reason why we have also proposed a countermeasure for embedded systems
Galdi, Chiara. "Conception et développement de systèmes biométriques multimodaux." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0015/document.
Full textBiometric recognition for a long time has been used in confined spaces, usually indoor, where security-critical operations required high accuracy recognition systems, e.g. in police stations, banks, companies, airports. Field activities, on the contrary, required more portability and flexibility leading to the development of devices for less constrained biometric traits acquisition and consequently of robust algorithms for biometric recognition in less constrained conditions. However, the application of "portable" biometric recognition, was still limited in specific fields e.g. for immigration control, and still required dedicated devices. A further step would be to spread the use of biometric recognition on personal devices, as personal computers, tablets and smartphones. Some attempts in this direction were made embedding fingerprint scanners in laptops or smartphones. So far biometric recognition on personal devices has been employed just for a limited set of tasks, as to unlock the screen using fingerprints instead of passwords. The research activities described in this thesis were focused on studying and developing solutions for iris recognition on mobile devices. This topic has been analyzed in all its main phases: - Acquisition: collection of the MICHE database, containing pictures of irises acquired by mobile devices; - Segmentation: development of an innovative iris segmentation algorithm; - Feature extraction and matching: iris recognition has been combined with the face and with sensor (smartphone) recognition. Finally, the use of gaze analysis for human recognition has been investigated in order to verify its possible fusion with iris
Galdi, Chiara. "Conception et développement de systèmes biométriques multimodaux." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0015.
Full textBiometric recognition for a long time has been used in confined spaces, usually indoor, where security-critical operations required high accuracy recognition systems, e.g. in police stations, banks, companies, airports. Field activities, on the contrary, required more portability and flexibility leading to the development of devices for less constrained biometric traits acquisition and consequently of robust algorithms for biometric recognition in less constrained conditions. However, the application of "portable" biometric recognition, was still limited in specific fields e.g. for immigration control, and still required dedicated devices. A further step would be to spread the use of biometric recognition on personal devices, as personal computers, tablets and smartphones. Some attempts in this direction were made embedding fingerprint scanners in laptops or smartphones. So far biometric recognition on personal devices has been employed just for a limited set of tasks, as to unlock the screen using fingerprints instead of passwords. The research activities described in this thesis were focused on studying and developing solutions for iris recognition on mobile devices. This topic has been analyzed in all its main phases: - Acquisition: collection of the MICHE database, containing pictures of irises acquired by mobile devices; - Segmentation: development of an innovative iris segmentation algorithm; - Feature extraction and matching: iris recognition has been combined with the face and with sensor (smartphone) recognition. Finally, the use of gaze analysis for human recognition has been investigated in order to verify its possible fusion with iris
Cabana, Antoine. "Contribution à l'évaluation opérationnelle des systèmes biométriques multimodaux." Thesis, Normandie, 2018. http://www.theses.fr/2018NORMC249/document.
Full textDevelopment and spread of connected devices, in particular smartphones, requires the implementation of authentication methods. In an ergonomic concern, manufacturers integrates biometric systems in order to deal with logical control access issues. These biometric systems grant access to critical data and application (payment, e-banking, privcy concerns : emails...). Thus, evaluation processes allows to estimate the systems' suitabilty with these uses. In order to improve recognition performances, manufacturer are susceptible to perform multimodal fusion.In this thesis, the evaluation of operationnal biometric systems has been studied, and an implementation is presented. A second contribution studies the quality estimation of speech samples, in order to predict recognition performances
Louati, Thamer. "Etude et réalisation d’un contrôle isoarchique de flux de personnes via des capteurs biométriques et infotroniques." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM4308.
Full textThe proposed work deals with the intelligent control, isoarchic and multicriteria of people flow in a restricted area. Our proposal is a control system based on a multimodal biometrics and RFID which are considered as two secured complementary techniques for robust and flexible people flow control. Multimodal biometrics is used for more reliable individual recognitions and the RFID for securing and storing supervised individuals identity information. This system is completely decentralized and the decision related to a control access request is made autonomously at each gate of each controlled area. The internal entities which participate to the decision making process respond to the holonic paradigm concepts and principles. The automatic gate opening is conditioned with several criteria conjunction (biometrics identifications, RFID identification, access permissions, authorized paths, status of the zone at time t, etc.). A multicriteria decision aid method is thus deployed in each access gate to merge biometrics identifications responses and to automatically treat the real-time access authorization requests. First, a state of art related to the biometric recognition, the contribution of multimodal biometric, the RFID technology and the physical access control based on biometric, was done. Then, an intelligent, isoarchic and multicriteria control of people flow system was proposed, including the use of multimodal biometric and RFID. At the end, a system simulation test bed was implemented to control prisoners flow in a jail. It supports the integration of various biometrics and RFID technologies
Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques." Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.
Full textDealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the design and implementation of practical privacy-preserving biometric systems, from the feature extraction to the matching with enrolled users. This work is consecrated to the design of secure biometric solutions for multiple scenarios, putting special care to balance accuracy and performance with the security guarantees, while improving upon existing works in the domain. We go beyond privacy preservation against semi-honest adversaries by also ensuring correctness facing malicious adversaries. Lastly, we address the leakage of biometric data when revealing the output, a privacy concern often overlooked in the literature. The main contributions of this thesis are: • A new face identification solution built on FE-based private inner product matching mitigating input leakage. • A novel efficient two-party computation protocol, Funshade, to preserve the privacy of biometric thresholded distance metric operations. • An innovative method to perform privacy-preserving biometric identification based on the notion of group testing named Grote. • A new distributed decryption protocol with collaborative masking addressing input leakage, dubbed Colmade. • An honest majority three-party computation protocol, Banners, to perform maliciously secure inference of Binarized Neural Networks. • A HE Python library named Pyfhel, offering a high-level abstraction and low-level functionalities, with applications in teaching
El, Abed Mohamad. "Évaluation de système biométrique." Phd thesis, Université de Caen, 2011. http://tel.archives-ouvertes.fr/tel-01007679.
Full textBonazza, Pierre. "Système de sécurité biométrique multimodal par imagerie, dédié au contrôle d’accès." Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK017/document.
Full textResearch of this thesis consists in setting up efficient and light solutions to answer the problems of securing sensitive products. Motivated by a collaboration with various stakeholders within the Nuc-Track project, the development of a biometric security system, possibly multimodal, will lead to a study on various biometric features such as the face, fingerprints and the vascular network. This thesis will focus on an algorithm and architecture matching, with the aim of minimizing the storage size of the learning models while guaranteeing optimal performances. This will allow it to be stored on a personal support, thus respecting privacy standards
Ly, Van Bao. "Réalisation d'un système de vérification de signature manuscrite en-ligne indépendant de la plateforme d'acquisition." Evry, Institut national des télécommunications, 2005. http://www.theses.fr/2005TELE0008.
Full textThis thesis contributes to the automatic identity verification using the online handwritten signature, which is often sampled by a digitizing tablet or a touch screen. The handwritten signature is a highly accepted biometric modality. The proposed algorithm is original, generic and independent of the experimental signature database. It can be installed with different acquisition devices without any adaptation. The signature is modelled by a Hidden Markov Model. Firstly, we perform a personalized normalization of the signature features, which improves the quality of the Hidden Markov Model. In this stage, we experiment only the Likelihood information of the Hidden Markov Model, and show that the normalization of the signature features is crucial to the system performance. Then, we exploit second information given by the Hidden Markov Model in order to verify the identity. It's the Segmentation of the signature, never used previously for this task. After, this information is fused with the Likelihood information to reinforce the verification system. The experiments show that the system performances are greatly improved compared to the exclusive use of the Likelihood information. These experiments are performed on 4 signature databases, whose characteristics are very different, and then on the integrated database, which is simply a mixture of the 4 previous databases. The good system performances show the independence of the proposed algorithm with respect to the considered signature database, or to the signature acquisition device
Books on the topic "Systèmes biométriques"
Acharya, Lalita. La biométrie et son usage par l'état. Ottawa, Ont: Service d'information et de recherche parlementaires, 2006.
Find full text