Littérature scientifique sur le sujet « Biometric information protection »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Biometric information protection ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Biometric information protection"
Lee, Boo-Ha, et Shin-Uk Park. « Legislative Policy Consideration for Reinforcement of Biometrics Protection ». LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, no 1 (30 juin 2022) : 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Texte intégralTeng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A. et Connie Tee. « Finger Vein Template Protection with Directional Bloom Filter ». HighTech and Innovation Journal 4, no 2 (1 juin 2023) : 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Texte intégralTaha, Mohammed A., et Hanaa M. Ahmed. « A fuzzy vault development based on iris images ». EUREKA : Physics and Engineering, no 5 (13 septembre 2021) : 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Texte intégralKim, Younjin, et Ilhwan Kim. « Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology ». Korean Constitutional Law Association 28, no 4 (30 décembre 2022) : 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Texte intégralShin, Yong-Nyuo, Yong-Jun Lee et Myung-Geun Chun. « Biometric Template Security for Personal Information Protection ». Journal of Korean Institute of Intelligent Systems 18, no 4 (25 août 2008) : 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Texte intégralLee, Yong-Joon, et Won-Shik Na. « E-Passport Advanced Security Technique Using Biometric Information Watermarking ». Journal of Computational and Theoretical Nanoscience 18, no 5 (1 mai 2021) : 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texte intégralLee, Yong-Joon, et Won-Shik Na. « E-Passport Advanced Security Technique Using Biometric Information Watermarking ». Journal of Computational and Theoretical Nanoscience 18, no 5 (1 mai 2021) : 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texte intégralSulavko, Alexey. « Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised ». Information and Control Systems, no 4 (24 août 2020) : 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Texte intégralPunithavathi, P., et S. Geetha. « Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns ». Indonesian Journal of Electrical Engineering and Computer Science 7, no 3 (1 septembre 2017) : 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Texte intégralMa, Ruoxue. « Legislative Conception for the Special Protection of Biometric Information : A Study Based on Extraterritorial Experience ». Lecture Notes in Education Psychology and Public Media 10, no 1 (14 septembre 2023) : 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Texte intégralThèses sur le sujet "Biometric information protection"
Banerjea-Brodeur, Nicolas Paul. « Advance passenger information passenger name record : privacy rights and security awareness ». Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Texte intégralPassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Mtibaa, Aymen. « Towards robust and privacy-preserving speaker verification systems ». Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS002.
Texte intégralSpeaker verification systems are a key technology in many devices and services like smartphones, intelligent digital assistants, healthcare, and banking applications. Additionally, with the COVID pandemic, access control systems based on fingerprint scanners or keypads increase the risk of virus propagation. Therefore, companies are now rethinking their employee access control systems and considering touchless authorization technologies, such as speaker verification systems.However, speaker verification system requires users to transmit their recordings, features, or models derived from their voice samples without any obfuscation over untrusted public networks which stored and processed them on a cloud-based infrastructure. If the system is compromised, an adversary can use this biometric information to impersonate the genuine user and extract personal information. The voice samples may contain information about the user's gender, accent, ethnicity, and health status which raises several privacy issues.In this context, the present PhD Thesis address the privacy and security issues for speaker verification systems based on Gaussian mixture models (GMM), i-vector, and x-vector as speaker modeling. The objective is the development of speaker verification systems that perform biometric verification while preserving the privacy and the security of the user. To that end, we proposed biometric protection schemes for speaker verification systems to achieve the privacy requirements (revocability, unlinkability, irreversibility) described in the standard ISO/IEC IS~24745 on biometric information protection and to improve the robustness of the systems against different attack scenarios
LABATI, R. DONIDA. « CONTACTLESS FINGERPRINT BIOMETRICS : ACQUISITION, PROCESSING, AND PRIVACY PROTECTION ». Doctoral thesis, Università degli Studi di Milano, 2013. http://hdl.handle.net/2434/217562.
Texte intégralZhou, Xuebing Verfasser], Dieter W. [Akademischer Betreuer] [Fellner et Raymond N. J. [Akademischer Betreuer] Veldhuis. « Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer : Dieter W. Fellner ; Raymond N. J. Veldhuis ». Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://d-nb.info/1111908354/34.
Texte intégralZhou, Xuebing [Verfasser], Dieter W. [Akademischer Betreuer] Fellner et Raymond N. J. [Akademischer Betreuer] Veldhuis. « Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer : Dieter W. Fellner ; Raymond N. J. Veldhuis ». Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-28858.
Texte intégralBardou, Sophie. « Les traitements de données biométriques en entreprise ». Thesis, Montpellier 1, 2010. http://www.theses.fr/2010MON10031/document.
Texte intégralBiometry brings together computing techniques that enable the identification of individuals on the basis of their biological, physical appearance and/or behavioral characteristics. Although firstly reserved for the legal system/judiciary domain, biometry tends to be generalized in all spheres of people life. Recently, biometry has also been used in companies who are always receptive to new technologies. Thus, the introduction of identifying devices such as these into a company life has to be the subject of corporate discussions between the managing teams and staff representatives. Indeed, such technologies are often compared to video surveillance, RFID chips, GPS data … and they can lead to the spying of employees if their uses are not well supervised. In the absence of specific laws, the legislator has given the CNIL the abilities to establish the requirements of eligibility of this technology usage within the companies. The "liberty and computing" legislation is then combined with the labor laws in order to apply common principles such as the finality, the proportionality, the loyalty, the transparency of information and employee consents
Diaz, Rodriguez V. « Transborder biometric information flow : legal challenges to personal privacy and the need for public debate ». Thesis, 2014. https://eprints.utas.edu.au/22487/1/Whole-Diaz%20Rodriguez-thesis.pdf.
Texte intégralAdom'megaa, Prudencio Selly. « La protection de la vie privée dans le cadre de la lutte contre le terrorisme au Canada ». Thesis, 2019. http://hdl.handle.net/1866/24442.
Texte intégralThe fight against terrorism implies, amongst others, the execution of preventative and punitive legislation to manage the threats from which Canada is exposed. In this context, the state and its agents have access to many tools, such as “security technology” (facial recognition, video surveillance, fingerprinting, etc.), to achieve their different mandates. The operation of these mechanisms raises questions and concerns in regards to privacy protection. The sharing of personal information between different ministries, the consent pertaining to the collection of personal information, and legislators’ right of access to state secrets, etc., are issues that arise when the executive power undertakes security measures. It’s found that the legislative changes to fight against terrorism create an imbalance with respect to privacy protection. Indeed, unlike the fight against terrorism, the right to privacy is constitutionally protected under the Canadian Charter of rights and freedoms. One of the challenges that must be recognized by the executive, legislative and judiciary authorities is to conduct their actions according to the rule of law in the context of national security.
Livres sur le sujet "Biometric information protection"
Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, 2012.
Trouver le texte intégralMaksurov, Aleksey. Ensuring information security on the Internet. ru : INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Texte intégralStefan, Katzenbeisser, et SpringerLink (Online service), dir. Transactions on Data Hiding and Multimedia Security VIII : Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.
Trouver le texte intégralOffice, United States Government Accountability. Border security : State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C : United States Government Accountability Office, 2004.
Trouver le texte intégralTransparent user authentication : Biometrics, RFID and behavioural profiling. London : Springer, 2011.
Trouver le texte intégralcomparé, Institut suisse de droit. L'individu face aux nouvelles technologies : Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche : Schulthess, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Border security : Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C : United States Government Accountability Office, 2005.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland security : Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C : United States Government Accountability Office, 2004.
Trouver le texte intégralUnited States. Government Accountability Office. Homeland Security : Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C : U.S. Government Accountability Office, 2006.
Trouver le texte intégralDecker, Bart. Communications and Multimedia Security : 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.
Trouver le texte intégralChapitres de livres sur le sujet "Biometric information protection"
Kevenaar, Tom. « Protection of Biometric Information ». Dans Security with Noisy Data, 169–93. London : Springer London, 2007. http://dx.doi.org/10.1007/978-1-84628-984-2_11.
Texte intégralSamandari, Juliet, et Amelia Samandari. « Biometric Protection and Security ». Dans Information Technology Security and Risk Management, 278–83. New York : CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-41.
Texte intégralRathgeb, Christian, Andreas Uhl et Peter Wild. « Experiments on Iris Biometric Template Protection ». Dans Advances in Information Security, 245–65. New York, NY : Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5571-4_14.
Texte intégralSasikaladevi, N., A. Revathi, N. Mahalakshmi et N. Archana. « HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection ». Dans Communications in Computer and Information Science, 312–20. Singapore : Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_31.
Texte intégralPanigrahy, Saroj Kumar, Debasish Jena, Sathya Babu Korra et Sanjay Kumar Jena. « On the Privacy Protection of Biometric Traits : Palmprint, Face, and Signature ». Dans Communications in Computer and Information Science, 182–93. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03547-0_18.
Texte intégralSprokkereef, Annemarie. « Data Protection and the use of Biometric Data in the EU ». Dans The Future of Identity in the Information Society, 277–84. Boston, MA : Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79026-8_19.
Texte intégralRot, Peter, Peter Peer et Vitomir Štruc. « Detecting Soft-Biometric Privacy Enhancement ». Dans Handbook of Digital Face Manipulation and Detection, 391–411. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.
Texte intégralBleumer, Gerrit. « Biometric yet Privacy Protecting Person Authentication ». Dans Information Hiding, 99–110. Berlin, Heidelberg : Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49380-8_8.
Texte intégralFornazin, Marcelo, Danilo B. S. Netto, Marcos Antonio Cavenaghi et Aparecido N. Marana. « Protecting Medical Images with Biometric Information ». Dans Advances in Computer and Information Sciences and Engineering, 284–89. Dordrecht : Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8741-7_52.
Texte intégralLi, ChunLei, Bin Ma, Yunhong Wang et Zhaoxiang Zhang. « Protecting Biometric Templates Using Authentication Watermarking ». Dans Advances in Multimedia Information Processing - PCM 2010, 709–18. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15702-8_65.
Texte intégralActes de conférences sur le sujet "Biometric information protection"
Barannik, Vladimir, Sergii Shulgin, Serhii Holovchenko, Pavlo Hurzhiy, Sergy Sidchenko et Pris Gennady. « Method of Hierarchical Protection of Biometric Information ». Dans 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT). IEEE, 2021. http://dx.doi.org/10.1109/aict52120.2021.9628915.
Texte intégralChung, Yunsu, Kiyoung Moon et Hyung-Woo Lee. « Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism ». Dans 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.151.
Texte intégralGhouzali, Sanaa, et Wadood Abdul. « Private chaotic biometric template protection algorithm ». Dans 2013 IEEE Second International Conference on Image Information Processing (ICIIP). IEEE, 2013. http://dx.doi.org/10.1109/iciip.2013.6707676.
Texte intégralFarafonova, A. E., et E. L. Turnetskaya. « TECHNOLOGIES OF BIOMETRIC PERSON’S IDENTIFICATION ». Dans PROCESSING, TRANSMISSION AND PROTECTION OF INFORMATION IN COMPUTER SYSTEMS. St. Petersburg State University of Aerospace Instrumentation, 2020. http://dx.doi.org/10.31799/978-5-8088-1452-3-2020-1-43-49.
Texte intégralLozhkova, A. « PROTECTION OF BIOMETRIC PERSONAL DATA IN MEDICAL INFORMATION SYSTEMS ». Dans XIV International Scientific Conference "System Analysis in Medicine". Far Eastern Scientific Center of Physiology and Pathology of Respiration, 2020. http://dx.doi.org/10.12737/conferencearticle_5fe01d9bc43a05.55251061.
Texte intégralWang, Zhifang, Qi Han, Xiamu Niu et Christoph Busch. « Template Protection for Multimodal Biometric System ». Dans 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.269.
Texte intégralJin, Andrew Teoh Beng, et Jaihie Kim. « FuzzyHash : A Secure Biometric Template Protection Technique ». Dans 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.31.
Texte intégralIslam, Md Rajibul, Md Shohel Sayeed et Andrews Samraj. « Biometric template protection using watermarking with hidden password encryption ». Dans 2008 International Symposium on Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/itsim.2008.4631572.
Texte intégralZhou, Xuebing, Stephen D. Wolthusen, Christoph Busch et Arjan Kuijper. « Feature Correlation Attack on Biometric Privacy Protection Schemes ». Dans 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.237.
Texte intégralMeints, Martin, Heinz Biermann, Manfred Bromba, Christoph Busch, Gerrit Hornung et Gisela Quiring-Kock. « Biometric Systems and Data Protection Legislation in Germany ». Dans 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2008. http://dx.doi.org/10.1109/iih-msp.2008.314.
Texte intégralRapports d'organisations sur le sujet "Biometric information protection"
Roberts, Tony, Judy Gitahi, Patrick Allam, Lawrence Oboh, Oyewole Oladapo, Gifty Appiah-Adjei, Amira Galal et al. Mapping the Supply of Surveillance Technologies to Africa : Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia. Institute of Development Studies, septembre 2023. http://dx.doi.org/10.19088/ids.2023.027.
Texte intégral