Academic literature on the topic 'User fingerprint'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'User fingerprint.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "User fingerprint"

1

Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (February 13, 2021): 458. http://dx.doi.org/10.3390/electronics10040458.

Full text
Abstract:
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.
APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Bin, Yikun Zhao, Hongmei Yi, Yongxue Huo, Haotian Wu, Jie Ren, Jianrong Ge, Jiuran Zhao, and Fengge Wang. "PIDS: A User-Friendly Plant DNA Fingerprint Database Management System." Genes 11, no. 4 (March 30, 2020): 373. http://dx.doi.org/10.3390/genes11040373.

Full text
Abstract:
The high variability and somatic stability of DNA fingerprints can be used to identify individuals, which is of great value in plant breeding. DNA fingerprint databases are essential and important tools for plant molecular research because they provide powerful technical and information support for crop breeding, variety quality control, variety right protection, and molecular marker-assisted breeding. Building a DNA fingerprint database involves the production of large amounts of heterogeneous data for which storage, analysis, and retrieval are time and resource consuming. To process the large amounts of data generated by laboratories and conduct quality control, a database management system is urgently needed to track samples and analyze data. We developed the plant international DNA-fingerprinting system (PIDS) using an open source web server and free software that has automatic collection, storage, and efficient management functions based on merging and comparison algorithms to handle massive microsatellite DNA fingerprint data. PIDS also can perform genetic analyses. This system can match a corresponding capillary electrophoresis image on each primer locus as fingerprint data to upload to the server. PIDS provides free customization and extension of back-end functions to meet the requirements of different laboratories. This system can be a significant tool for plant breeders and can be applied in forensic science for human fingerprint identification, as well as in virus and microorganism research.
APA, Harvard, Vancouver, ISO, and other styles
3

Gabryel, Marcin, Konrad Grzanek, and Yoichi Hayashi. "Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic." Journal of Artificial Intelligence and Soft Computing Research 10, no. 4 (October 1, 2020): 243–53. http://dx.doi.org/10.2478/jaiscr-2020-0016.

Full text
Abstract:
AbstractWeb-based browser fingerprint (or device fingerprint) is a tool used to identify and track user activity in web traffic. It is also used to identify computers that are abusing online advertising and also to prevent credit card fraud. A device fingerprint is created by extracting multiple parameter values from a browser API (e.g. operating system type or browser version). The acquired parameter values are then used to create a hash using the hash function. The disadvantage of using this method is too high susceptibility to small, normally occurring changes (e.g. when changing the browser version number or screen resolution). Minor changes in the input values generate a completely different fingerprint hash, making it impossible to find similar ones in the database. On the other hand, omitting these unstable values when creating a hash, significantly limits the ability of the fingerprint to distinguish between devices. This weak point is commonly exploited by fraudsters who knowingly evade this form of protection by deliberately changing the value of device parameters. The paper presents methods that significantly limit this type of activity. New algorithms for coding and comparing fingerprints are presented, in which the values of parameters with low stability and low entropy are especially taken into account. The fingerprint generation methods are based on popular Minhash, the LSH, and autoencoder methods. The effectiveness of coding and comparing each of the presented methods was also examined in comparison with the currently used hash generation method. Authentic data of the devices and browsers of users visiting 186 different websites were collected for the research.
APA, Harvard, Vancouver, ISO, and other styles
4

Ju, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou, and Jin Kwak. "A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.

Full text
Abstract:
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
APA, Harvard, Vancouver, ISO, and other styles
5

Agarwal, Rohit, A. S. Jalal, and K. V. Arya. "A review on presentation attack detection system for fake fingerprint." Modern Physics Letters B 34, no. 05 (February 3, 2020): 2030001. http://dx.doi.org/10.1142/s021798492030001x.

Full text
Abstract:
Fingerprint recognition systems are susceptible to artificial spoof fingerprint attacks, like molds manufactured from polymer, gelatin or Play-Doh. Presentation attack is an open issue for fingerprint recognition systems. In a presentation attack, synthetic fingerprint which is reproduced from a real user is submitted for authentication. Different sensors are used to capture the live and fake fingerprint images. A liveness detection system has been designed to defeat different classes of spoof attacks by differentiating the features of live and fake fingerprint images. In the past few years, many hardware- and software-based approaches are suggested by researchers. However, the issues still remain challenging in terms of robustness, effectiveness and efficiency. In this paper, we explore all kinds of software-based solution to differentiate between real and fake fingerprints and present a comprehensive survey of efforts in the past to address this problem.
APA, Harvard, Vancouver, ISO, and other styles
6

Diaz Pineda, Mabel Rocio, Maria Alejandra Dueñas, and Karen Dayanna Acevedo. "Fingerprints detection using neural networks suitable to physical changes of fingerprint." Revista CINTEX 22, no. 2 (December 30, 2017): 35–50. http://dx.doi.org/10.33131/24222208.271.

Full text
Abstract:
This working paper shows the results of finished research, using image processing techniques to improve the fingerprint obtained from a database, where the image is normalized and segmented to get only the section of the image with the fingerprint. Then, the Gabor filter is applied, and it corrects defects in ridges and valleys, allowing continuity. That way, if the fingerprint has a physical defect, the filter can correct it as long as the segment orientation to be correct. Once improved, the fingerprint, it is binarized and thinned for minutiae extraction. The false minutiae are filtered and eliminated in order to ensure the operation of the algorithm. Finally, it is necessary training with the minutiae of all fingerprints in the database, to individually determine which user belongs the fingerprint entered. The system has a reliability of 81% of the process, with the pre-processing part being crucial to guarantee the correct extraction of the characteristics of fingerprints.
APA, Harvard, Vancouver, ISO, and other styles
7

Alakhras, Marwan, Mousa Hussein, and Mourad Oussalah. "Location Fixing and Fingerprint Matching Fingerprint Map Construction for Indoor Localization." Journal of Sensors 2020 (January 17, 2020): 1–14. http://dx.doi.org/10.1155/2020/7801752.

Full text
Abstract:
Building the fingerprint map for indoor localization problems is a labour-intensive and time-consuming process. However, due to its direct influence on the location estimation accuracy, finding a proper mechanism to construct the fingerprint map is essential to enhance the position estimation accuracy. Therefore, in this work, we present a fingerprint map construction technique based on location fix determination and fingerprint matching motivated by the availability of advanced sensing capabilities in smartphones to reduce the time and labour cost required for the site survey. The proposed Location Fixing and Finger Matching (LFFM) method use a landmark graph-based localization approach to automatically estimate the location fixes for the Reference Points and matching the collected fingerprints, without requiring active user participation. Experimental results show that the proposed LFFM is faster than the manual fingerprint map construction method and remarkably improves the positioning accuracy.
APA, Harvard, Vancouver, ISO, and other styles
8

Sanchez-Reillo, R., L. Mengibar-Pozo, and C. Sanchez-Avila. "Microprocessor smart cards with fingerprint user authentication." IEEE Aerospace and Electronic Systems Magazine 18, no. 3 (March 2003): 22–24. http://dx.doi.org/10.1109/maes.2003.1193715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cahyaningtiyas, Rizqia, Efy Yosrita, and Rakhmat Arianto. "THE AUTOMATIC DOORS INTEGRATED ABSENCE AND USER ACCESS USING FINGERPRINT." Jurnal Ilmiah FIFO 8, no. 2 (November 1, 2016): 147. http://dx.doi.org/10.22441/fifo.v8i2.1309.

Full text
Abstract:
This research aims to design Accompanied Door Access System Automation Absence and User Access Rights Using Integrated Fingerprint Database on Basic Computer Lab Informatics STT-PLN. What is meant by "Absent Automation and User Access Rights" among other computerized attendance automatically using fingerprint and right into a room on a predetermined schedule of lectures on computer lab space. System design method used is the method of evolutionary prototype, using MySQL database and coding using Visual C # .NET. These results indicate that the Door Access System Automation Accompanied Absence and User Access Rights Using Integrated Fingerprint Database can help assistants in attendance processing, computer lab room becomes more secure and computerized
APA, Harvard, Vancouver, ISO, and other styles
10

Stanton, Brian, Mary Theofanos, Shahram Orandi, Ross Micheals, and Nien-Fan Zhang. "Effects of Scanner Height on Fingerprint Capture." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 10 (October 2007): 592–96. http://dx.doi.org/10.1177/154193120705101005.

Full text
Abstract:
Although the deployment of biometric technologies such as fingerprints is becoming more widespread, little attention is being paid to the human-computer interaction that such technologies involve. Most biometric systems employ both hardware and software measures to maximize the capture quality of the biometric data. The physical presentation of the biometric data by the participant to the system involves many anthropometric and ergonomic factors that have been largely ignored. This study examined the effect of the height of the sensor on the quality and the time required to collect fingerprints. User performance, both fingerprint quality and timing, was impacted by scanner height.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "User fingerprint"

1

Vondráček, Tomáš. "Získávání informací o uživatelích na webových stránkách." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445554.

Full text
Abstract:
The aim of the diploma thesis is to map the information provided by web browsers, which can be used in practice to identify users on websites. The work focuses on obtaining and subsequent analysis of information about devices, browsers and side effects caused by web extensions that mask the identity of users. The acquisition of information is realized by a designed and implemented library in the TypeScript language, which was deployed on 4 commercial websites. The analysis of the obtained information is carried out after a month of operation of the library and focuses on the degree of information obtained, the speed of obtaining information and the stability of information. The dataset shows that up to 94 % of potentially different users have a unique combination of information. The main contribution of this work lies in the created library, design of new methods of obtaining information, optimization of existing methods and the determination of quality and poor quality information based on their level of information, speed of acquisition and stability over time.
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Harby, Fahad M. "Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Full text
Abstract:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist¿s point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users¿ acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Harby, Fahad Mohammed. "Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Full text
Abstract:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist's point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users' acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO, and other styles
4

Jurek, Jakub. "Biometrické rozpoznání živosti prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242191.

Full text
Abstract:
This project deals with general biometrics issues focusing on fingerprint biometrics, with description of dermal papillae and principles of fingerprint sensors. Next this work deals with fingerprint liveness detection issues, including description of methods of detection. Next this work describes chosen features for own detection, used database of fingerprints and own algorithm for image pre-processing. Furthermore neural network classifier for liveness detection with chosen features is decribed followed by statistic evaluation of the chosen features and detection results as well as description of the created graphical user interface.
APA, Harvard, Vancouver, ISO, and other styles
5

Ismail, Mahado. "Investigation into the significance of monitoring drug use from a fingerprint." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/849734/.

Full text
Abstract:
The use of chemical analysis of fingerprints as an alternative approach for drug testing has become subject of recent publications. However, the significance of the detection of drugs in fingerprints compared to a background population of non-drug users has not yet been explored. In this research, the main area of research was to determine the forensic potential of detecting cocaine and heroin use through the analysis of fingerprints. Fingerprint samples deposited on paper were extracted using an extraction solution (10% dichloromethane in methanol) and analysed using liquid chromatography - mass spectrometry (LC-MS). This research showed that cocaine and benzoylecgonine were detected in 100 and 94% of natural fingerprint samples (n= 65) collected from drug users, and similarly, heroin and 6-acetylmorphine were detected in 98 and 100% of samples (n = 60). Cocaine and benzoylecgonine were also detected in 13 and 5% of natural fingerprints (n = 98) from a background population of non-drug users. In contrast, heroin and 6-acetylmorphine were detected in 0 and 1% of fingerprints from the background population. For cocaine, a threshold level was required to differentiate fingerprints from drug users and environmental exposure in non-drug users (at a ratio analyte (A) to internal standard (IS) 0.015). The analytes of interest could still be detected in fingerprint samples from drug users after a hand cleaning procedure, however this resulted in a lower detection rate compared to natural fingerprints. In contrast, the analytes were not present in fingerprints collected from non-drug users after handwashing (1% false positive rate for cocaine). Furthermore, cocaine, benzoylecgonine, heroin and 6-acetylmorphine can also be detected in fingerprint samples from dermal contact with the parent drug even after the use of hand cleaning procedures. The detection of illicit drugs in fingerprints is therefore not solely indicative of administration of a drug but does indicate that these analytes are not prevalent in a background population of non-drug users. Additionally, the detection of isoniazid and acetylisoniazid in fingerprint samples from tuberculosis medication showed the potential application of fingerprint testing to monitor adherence to drug treatments. The detection window of isoniazid and acetylisoniazid (< 2 days) suggests that a fingerprint may confirm when a patient stops complying to their treatment. This demonstrates that a fingerprint test could confirm non-adherence to treatment, which can be used to help improve treatment plans for patients and improve success rates. Furthermore, the presence of cocaine and benzoylecgonine in urine and saliva collected from drug users was determined using portable mass spectrometry to show the potential for on-site sample analysis for drug testing. Previous work has shown that illicit drugs can be detected in fingerprints, however the suitability of fingerprints for drug testing (namely cocaine and heroin use) has not yet been explored. This research provides information on the influence of the fingerprint sampling strategy, presence of contact residue and transfer of drugs between individuals. These aspects are important to consider in relation to the stages of fingerprint testing and highlight its strengths and weaknesses for further applications (e.g. workplace drug testing, rehabilitation centres and hospitals). To improve fingerprint testing, further work is required on the standardisation of a fingerprint collection procedure, including validation procedures.
APA, Harvard, Vancouver, ISO, and other styles
6

Adelantado, Sánchez Carlos. "Use of aspartic acid racemization in fingerprints as a molecular clock." Master's thesis, Instituto Superior de Ciências da Saúde Egas Moniz, 2014. http://hdl.handle.net/10400.26/6716.

Full text
Abstract:
Dissertação de Erasmus Mundus para obtenção do grau de mestre em Técnicas Laboratoriais Forenses
Aspartic acid is the chemical, amongst amino acids, whose racemization process is considered to be the fastest and the most reliable way to conduct an ageing study in some living-being tissues. Racemization is a natural-occurring event in which L-stereoisomer of aspartic acid is converted into D-stereoisomer in an equilibrium dependent on factors namely pH, environmental conditions and, most critically, on temperature.
The main objective of the current study is to assess the influence of temperature on kinetics of aspartic acid racemization and to implement this methodology in fingermarks. The hypothesis is that different starting points of deposition of a biological specimen will give rise to significant differences in L-/D- racemization after the sample has been heated, allowing to determine time since deposition of a fingerprint. In this way, it would be possible to find the time since build a molecular clock for fingerprints, consisting of time since deposition of fingermarks based on racemization degree of aspartic acid.
Firstly, a calibration curve was built within the concentrations range expected to be quantified in actual samples both with L-aspartic acid (L-Asp) and D-aspartic acid (D-Asp) separately, Gas Chromatography - Flame Ionization Detector (GC-FID) being the chosen technique and detection mode to set up the calibration experiments. Secondly, L-aspartic acid standards were treated at different temperatures during different time periods and were analyzed by GC-FID with a chiral column, aimed for detecting D- isomer, providing with information about racemization rate of aspartic acid.
Eventually a downward trend was observed for L-Asp but not for D-Asp and a pseudo-rate constant could be calculated for the former, demonstrating that temperature degrades this chemical. Fingerprints study was not successful to determine aspartic acid racemization but a simple handling of them and an adequate, sensitive response of the chromatographic system could quantify racemization degree.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Sean. "Use of GPU architecture to optimize Rabin fingerprint data chunking algorithm by concurrent programming." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108186.

Full text
Abstract:

Data deduplication is introduced as a popular technique used to increase storage efficiency used in various data centers and corporate backup environments. There are various caching techniques and metadata checking available to prevent excessive file scanning. Due to the nature of content addressable chunking algorithm being a serial operation, the data deduplication chunking process often times become the performance bottleneck. This project introduces a parallelized Rabin fingerprint algorithm suitable for GPU hardware architecture that aims to optimize the performance of the deduplication process.

APA, Harvard, Vancouver, ISO, and other styles
8

Swift, Benjamin. "The use of radio-isotopes in forensic science : the development of the isotope fingerprint analysis." Thesis, University of Leicester, 2004. http://hdl.handle.net/2381/29475.

Full text
Abstract:
It is generally accepted that remains should be no more than 75 years old to warrant police interest. Therefore any reliable dating method should distinguish bones from within this interval accurately from those lying outside of it. Although archaeologists have reliable tools for dating material, pathologists have been unable to devise a method that caters for their specific needs. Previous work has focused upon the physiochemical properties of bone or its organic constituents, though the results have failed to produce a workable calibration system. The first hypothesis of this thesis has confirmed the existence of a predictable and measurable relationship between specific radioisotope concentrations in human bone and the post-mortem interval (PMI). It is predicted that the relationship is such that, once a calibration system has been created, it is possible to accurately estimate the PMI in a set of remains of unknown antiquity. Though concentrating upon 210Pb activities, the study also evaluated additional commonly occurring nuclides, both natural and man-made, the latter being subsequent to nuclear experimentation. The second confirmed hypothesis is that the geographical region an individual lived within becomes imprinted within their skeletal system, such that recognisable relationships between isotopes exist, creating a radio-isotope fingerprint. Examination of these relationships allows identification of the country in which a decedent lived.
APA, Harvard, Vancouver, ISO, and other styles
9

Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Full text
Abstract:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication methods are being tested with end-users and their current acceptability level is being determined based on interviews which are conducted upon finishing each testing scenario. The interview is using 39 questions which are determining previous usage of the technologies, their likeability, positives, negatives, and feelings about various features biometrics provide such as ease-of-use, stress-free method of payment, security, and many others. Additionally, one more authentication method is tested, namely two factor authentication consisting of one biometric method (fingerprint) and one traditional method (PIN) of authentication. The main goal for testing this method is to find out whether implementing (as currently it is not available) such technology into mobile-payments would be beneficial and how it scored in user-acceptance next to fingerprint and face recognition authentication methods. Once the user-acceptance level is determined the main reasons for it are presented. Last but not least, suggestions for improvements in this domain are presented so that biometrics are even more accepted by end-users who are performing mobile-payments on their smartphones.
APA, Harvard, Vancouver, ISO, and other styles
10

Derakhshani, Reza. "Determination of vitality from a non-invasive biomedical measurement for use in integrated biometric devices." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=1035.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 1999.
Title from document title page. Document formatted into pages; contains x, 126 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. [72]-75).
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "User fingerprint"

1

Fingerprint detection with lasers. 2nd ed. New York: M. Dekker, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zofka, Adam, Maria Chrysochoou, Iliya Yut, Chad Johnston, Montgomery Shaw, Shih-Po Sun, James Mahoney, Stuart Farquharson, and Michael Donahue. Evaluating Applications of Field Spectroscopy Devices to Fingerprint Commonly Used Construction Materials. Washington, D.C.: Transportation Research Board, 2013. http://dx.doi.org/10.17226/22770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Menzel, E. Roland. An introduction to lasers, forensic lights, and fluorescent fingerprint detection techniques. Salem, Or: Lightning Powder Co., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chrysochoou, Maria, Chad Johnston, and Iliya Yut. Evaluating Applications of Field Spectroscopy Devices to Fingerprint Commonly Used Construction Materials (Phase IVâ€"Implementation). Washington, D.C.: Transportation Research Board, 2014. http://dx.doi.org/10.17226/22308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Forensic Symposium on Latent Prints (1987 Quantico, Va.). Proceedings of the International Forensic Symposium on Latent Prints. Washington, D.C: Laboratory Division, Federal Bureau of Investigation, United States Dept. of Justice, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kötzing, TCM-Klinik Bad, and University Hospital at Beijing University of Chinese Medicine, eds. Chromatographic fingerprint analysis of herbal medicines: Thin-layer and high performance liquid chromatography of Chinese drugs. 2nd ed. Wien: Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Science of Fingerprints: Classification and Uses. Diane Books Publishing Company, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Federal Bureau of Investigation., ed. The Science of fingerprints: Classification and uses. Washington, D.C: U.S. Dept. of Justice, Federal Bureau of Investigation, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Center, National Crime Information, ed. The Science of fingerprints: Classification and uses. 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

The Science of Fingerprints: Classification and Uses. US Government Printing Office, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "User fingerprint"

1

Khokher, Rohit, and Ram Chandra Singh. "A Graphical User Interface-Based Fingerprint Recognition." In Mathematical Modelling, Optimization, Analytic and Numerical Solutions, 379–98. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0928-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gil, Younhee, Dosung Ahn, Choonwoo Ryu, Sungbum Pan, and Yongwha Chung. "User Enrollment Using Multiple Snapshots of Fingerprint." In Neural Information Processing, 344–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30499-9_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kwan, Paul W. H., Junbin Gao, and Graham Leedham. "A User-Centered Framework for Adaptive Fingerprint Identification." In Intelligence and Security Informatics, 89–100. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01393-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dhaked, Devender, Surendra Yadav, Manish Mathuria, and Saroj Agrawal. "User Identification Over Digital Social Network Using Fingerprint Authentication." In Advances in Intelligent Systems and Computing, 11–22. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2285-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yoon, Eun-Jun, and Kee-Young Yoo. "Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards." In Lecture Notes in Computer Science, 405–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11600930_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Xiang, Shikui Wei, Ruizhen Zhao, Ruoyu Liu, Yufeng Zhao, and Yao Zhao. "A Visual Perspective for User Identification Based on Camera Fingerprint." In Lecture Notes in Computer Science, 52–63. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34110-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Corsetti, Barbara, Raul Sanchez-Reillo, and Richard M. Guest. "Ergonomics in Mobile Fingerprint Recognition Systems: A User Interaction Evaluation." In Advances in Intelligent Systems and Computing, 382–89. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51369-6_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Firdaus, Noor Azurati Ahmad, and Shamsul Sahibuddin. "Adapted WLAN Fingerprint Indoor Positioning System (IPS) Based on User Orientations." In Recent Trends in Information and Communication Technology, 226–36. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59427-9_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Youngkwon, and Taekyoung Kwon. "An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards." In Computational Science and Its Applications - ICCSA 2006, 915–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751588_95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Riley, Chris, Graham Johnson, Heather McCracken, and Ahmed Al-Saffar. "Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems." In Human-Computer Interaction – INTERACT 2009, 293–305. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03658-3_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "User fingerprint"

1

Wenzl, Matthias, and Daniel Kluka. "Adding Channel Security to a Fingerprint Verification Chain." In ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67356.

Full text
Abstract:
Authenticating persons using fingerprints is a widely accepted method in the field of access control, border control, prosecution and many others. Today, fingerprint modules with customizable firmware can be bought commercially off the shelf by hobbyists and small companies to be used in their applications and are usually locally separated from a controller implementing the feature extraction and comparison algorithms. As a matter of fact, the communication channel between the sensor and the controller module is susceptible to eavesdropping and man in the middle attacks. Nevertheless, adding communication channel security to such a system has a direct negative impact on the system’s response time, thus directly affecting user acceptance. The aim of this paper is to provide a comprehensive investigation on measures to counter run-time degredation when adding communication channel security on behalf of an existing fingerprint verification chain. We show that a combination of the elliptic curve Diffie-Hellman key exchange together with AES-256 and the use of parallelization using OpenMP on a controller node leads to an acceptable run time making key creation and exchange upon every fingerprint read request a suitable undertaking.
APA, Harvard, Vancouver, ISO, and other styles
2

Sugiura, Atsushi, and Yoshiyuki Koseki. "A user interface using fingerprint recognition." In the 11th annual ACM symposium. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/288392.288575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pooja, S., and R. Saritha. "Enhanced fingerprint system with user password." In 2016 International Conference on Circuits, Controls, Communications and Computing (I4C). IEEE, 2016. http://dx.doi.org/10.1109/cimca.2016.8053281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abouollo, Ahmed, and Sultan Almuhammadi. "Detecting malicious user accounts using Canvas Fingerprint." In 2017 8th International Conference on Information and Communication Systems (ICICS). IEEE, 2017. http://dx.doi.org/10.1109/iacs.2017.7921998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blanco-Gonzalo, Ramon, Raul Sanchez-Reillo, Rodrigo Ros-Gomez, and Belen Fernandez-Saavedra. "User acceptance of planar semiconductor fingerprint sensors." In 2015 International Carnahan Conference on Security Technology (ICCST). IEEE, 2015. http://dx.doi.org/10.1109/ccst.2015.7389653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sebgui, Marouane, Sliman Bah, Abdelaziz Berrado, and Belhaj El Graini. "Enhancing primary user detection through radio frequency fingerprint." In 2014 Fifth International Conference on Next Generation Networks and Services (NGNS). IEEE, 2014. http://dx.doi.org/10.1109/ngns.2014.6990246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, P., S. Ravi, A. Raghunathan, and N. K. Jha. "Efficient fingerprint-based user authentication for embedded systems." In 2005 42nd Design Automation Conference. IEEE, 2005. http://dx.doi.org/10.1109/dac.2005.193809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gupta, Pallav, Srivaths Ravi, Anand Raghunathan, and Niraj K. Jha. "Efficient fingerprint-based user authentication for embedded systems." In the 42nd annual conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1065579.1065643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Jing, Wen-Tao Zhu, and Deng-Guo Feng. "Improvement of a Fingerprint-Based Remote User Authentication Scheme." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bae, Geuntae, Hojae Lee, Sunghoon Son, Doha Hwang, and Jongseok Kim. "Secure and robust user authentication using partial fingerprint matching." In 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2018. http://dx.doi.org/10.1109/icce.2018.8326078.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "User fingerprint"

1

Whitus, B. R., J. S. Goddard, W. B. Jatko, W. W. Manges, and D. A. Treece. Low-Speed Fingerprint Image Capture System User`s Guide, June 1, 1993. Office of Scientific and Technical Information (OSTI), June 1993. http://dx.doi.org/10.2172/10179252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stanton, Brian, Mary Theofanos, and Charles Sheppard. A study of users with visual disabilities and a fingerprint process. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.ir.7484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carasso, Alfred S. The Use of ‘Slow Motion’ Levy Stable Fractional Diffusion Smoothing In Alternative Methods of Latent Fingerprint Enhancement. National Institute of Standards and Technology, April 2013. http://dx.doi.org/10.6028/nist.ir.7932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nic Daeid, Niamh, Heather Doran, Lucina Hackman, and Pauline Mack. The Curse of the Burial Dagger Teacher Materials. University of Dundee, September 2021. http://dx.doi.org/10.20933/100001220.

Full text
Abstract:
The Curse of the Burial Dagger is an interactive graphic novel murder mystery, created by the Leverhulme Research Centre for Forensic Science and digital story studio Fast Familiar. Players use maths, logic and critical reasoning skills to assist Susie uncover different types of forensic evidence and weigh up contrasting hypotheses. Can they uncover the events leading up to Lord Hamilton’s death and deduce how he died…before the curse strikes again? These documents are the Teacher/Group lead pack which contain additional resources including: • The Teacher/Group Lead Pack – Teacher walk through – Factsheet – What is Forensic Science? – Factsheet – What is a hypothesis? – Marzipan Calculation – Factsheet and activity – Fingerprint Analysis – Activity – Chromatography investigation • Printable completion certificate • Printable Note paper and fact-sheet
APA, Harvard, Vancouver, ISO, and other styles
5

Singhvi, Punit, Javier García Mainieri, Hasan Ozer, and Brajendra Sharma. Rheology-Chemical Based Procedure to Evaluate Additives/Modifiers Used in Asphalt Binders for Performance Enhancements: Phase 2. Illinois Center for Transportation, June 2021. http://dx.doi.org/10.36501/0197-9191/21-020.

Full text
Abstract:
The increased use of softer binders in Illinois over the past decade is primarily attributed to the increased use of recycled materials in asphalt pavement construction. The shift in demand of using PG 58-28 over PG 64-22 has resulted in potential alternative methods to produce softer binders more economically using proprietary products. However, there are challenges in using these proprietary products for asphalt modification because of uncertainty in their long-term performance and significant variability in binder chemistry. The current SuperPave performance grading specification for asphalt binders is insufficient in differentiating binders produced from these modifiers. Therefore, the objective of this study is to evaluate the performance of various softener-type asphalt binder modifiers using a wide array of rheological and chemistry tests for their integration into the Illinois Department of Transportation’s material specifications. The small-strain rheological tests and their parameters allowed for consistent grouping of modified binders and can be used as surrogates to identify performing and nonperforming asphalt binders. A new parameter, Δ|G*|peak τ, was developed from the linear amplitude sweep test and showed potential to discriminate binders based on their large-strain behavior. Chemistry-based parameters were shown to track aging and formulation changes. The modifier sources were identified using fingerprint testing and were manifested in the modified binder chemical and compositional characteristics. The two sources of base binders blended with the modifiers governed the aging rate of the modified binders. Mixture performance testing using the Illinois Flexibility Index Test and the Hamburg Wheel-Track Test were consistent with the rheological and chemical findings, except for the glycol amine-based modified binder, which showed the worst cracking performance with the lowest flexibility index among the studied modifiers. This was contrary to its superior rheological performance, which may be attributed to lower thermal stability, resulting in high mass loss during mixing. According to the characterization of field-aged binders, laboratory aging of two pressurized aging vessel cycles or more may represent realistic field aging of 10 to 15 years at the pavement surface and is able to distinguish modified binders. Therefore, an extended aging method of two pressurized aging vessel cycles was recommended for modified binders. Two different testing suites were recommended for product approval protocol with preliminary thresholds for acceptable performance validated with field-aged data.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography