Littérature scientifique sur le sujet « Biometrical method »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Biometrical method ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Biometrical method"

1

Chmielińska, Jolanta, et Jacek Jakubowski. « Biometrical driver face verification ». AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, no 6 (7 septembre 2018) : 68–72. http://dx.doi.org/10.24136/atest.2018.039.

Texte intégral
Résumé :
The paper discusses the problem of face verification in a driver monitoring system for the purpose of traffic safety. Two different methods of face verification were proposed. Both of them are based on a convolutional neural network and were developed with the use of a transfer learning technique. In the paper, the results produced by both proposed method have been presented and compared. Moreover, their advantages and disadvantages have been discussed.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Salman, Duha D., Raghad A. Azeez et Adul mohssen J. Hossen. « Key Generation from Multibiometric System Using Meerkat Algorithm ». Engineering and Technology Journal 38, no 3B (25 décembre 2020) : 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.

Texte intégral
Résumé :
Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity. By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-less, the encryption keys are produced with the use of an approach of swarm intelligence. Emergent collective intelligence in groups of simple autonomous agents is collectively termed as a swarm intelligence. The Meerkat Clan Key Generation Algorithm (MCKGA) is a method for the generation of a key stream for the encryption of the plaintext. This method will reduce and distribute the number of keys. Testing of system, it was found that the keys produced by the characteristics of the eye are better than the keys produced by the characteristics of the ear. The advantages of our approach comprise generation of strong and unique keys from users’ biometric data using MCKGA and it is faster and accurate in terms of key generation.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Salman, Duha D., Raghad A. Azeez et Adul mohssen J. Hossen. « Key Generation from Multibiometric System Using Meerkat Algorithm ». Engineering and Technology Journal 38, no 3B (25 décembre 2020) : 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.

Texte intégral
Résumé :
Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity. By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-less, the encryption keys are produced with the use of an approach of swarm intelligence. Emergent collective intelligence in groups of simple autonomous agents is collectively termed as a swarm intelligence. The Meerkat Clan Key Generation Algorithm (MCKGA) is a method for the generation of a key stream for the encryption of the plaintext. This method will reduce and distribute the number of keys. Testing of system, it was found that the keys produced by the characteristics of the eye are better than the keys produced by the characteristics of the ear. The advantages of our approach comprise generation of strong and unique keys from users’ biometric data using MCKGA and it is faster and accurate in terms of key generation.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Philippe, P. « Twinning causative origin investigated by Sartwell's biometrical method ». American Journal of Human Biology 2, no 2 (1990) : 107–15. http://dx.doi.org/10.1002/ajhb.1310020203.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Bogdanov, M. A., V. M. Kartak, A. А. Dumchikov et A. I. Fabarisova. « STATISTICAL ASSESSMENT OF BIOMETRICAL SIGNS BY ELECTROCARDIOGRAPHY ». Russian Journal of Cardiology, no 7 (14 août 2018) : 84–91. http://dx.doi.org/10.15829/1560-4071-2018-7-84-91.

Texte intégral
Résumé :
Statistical analysis performed, of the informativity of biometric signs of electrocardiogram. It was found that amplitude and time parameters of PQST areas of electrocardiograms show enough dispersion and are not easily distinguished. For reliable biometric personality identification quite a range of such signs is needed. Based on the known signs, novel signs were formulated via the bootstrap method. The novel signs presented much lower dispersion. It was found, that reliable identification of personality is possible with combined usage of the amplitudes in Sand T-areas of cardiocycle.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Santos, Filipe Martins, David Risco, Nayara Yoshie Sano, Gabriel Carvalho de Macedo, Wanessa Teixeira Gomes Barreto, Pilar Gonçalves, Pedro Fernández-Llario et Heitor Miraglia Herrera. « An alternative method for determining the body condition index of the free-living South American coati ». Neotropical Biology and Conservation 15, no 4 (23 décembre 2020) : 561–69. http://dx.doi.org/10.3897/neotropical.15.e56578.

Texte intégral
Résumé :
Assessing and monitoring the welfare of free-living mammals is not a usual process due to the logistical complications associated with their capture and sedation, collection and storage of biological samples and their release. In this context, non-invasive methods for monitoring wildlife constitute a good alternative approach for in situ conservation. Body condition index, as a measurement of health status, has been used in free-living mammals; its low value may be associated with negative effects on reproduction and survival. The present study aimed to generate an alternative and reliable non-invasive method and then determine the body condition index, based on previously-collected biometric measurements, without the need to capture and immobilise the animals. A total of 178 free-living Nasua nasua Linnaeus, 1766 were trapped, weighed and measured. Statistical methods were used, based on Boosted Regression Trees (BRT) using body mass, biometric measurements (body length, height and chest girth) and gender as explanatory variables. To assess the agreement between the real Body Condition Indices (BCIs) and the predicted values of BCIs, we explored the correlation between each model using the Bland-Altman method. This method showed a strong agreement between the predictive BRT models proposed (standardised residuals from a linear regression between body length and chest girth) and standardised residuals (linear regression between body mass and body length). The results obtained herein showed that BRT modelling, based on biometrical features, is an alternative way to verify the body conditions of coatis without the need to capture and immobilise the animals.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zintzaras, E., P. Bouka et A. Kowald. « Biometrical evaluation of bioequivalence trials using a bootstrap individual direct curve comparison method ». European Journal of Drug Metabolism and Pharmacokinetics 27, no 1 (mars 2002) : 11–16. http://dx.doi.org/10.1007/bf03190400.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Stander, Mark, et Julian Stander. « A simple method for correcting for the Will Rogers phenomenon with biometrical applications ». Biometrical Journal 62, no 4 (20 janvier 2020) : 1080–89. http://dx.doi.org/10.1002/bimj.201900199.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Desrosiers, G., B. Vincent, C. Retière et L. Boucher. « Comparaison de critères utilisables pour l'étude de la structure des populations du polychète Nereis virens (Sars) ». Canadian Journal of Zoology 66, no 6 (1 juin 1988) : 1454–59. http://dx.doi.org/10.1139/z88-212.

Texte intégral
Résumé :
The various biometrical criteria used in the study of the population structure of the annelid polychaete Nereis virens (Sars) are reviewed. This type of study, which requires the examination of large numbers of specimens representing all size classes, is sometimes complicated by the occurrence of autotomy, a phenomenon quite frequent in this species, and by mechanical breaks during sampling and sieving. Measurements such as total length, width of an anterior segment, and total weight are not good criteria. We have used a new biometrical criterium developed at the Laboratoire maritime de Dinard (France). This criterium is based on a partial weight of animals that have been put in formaldehyde and wiped; the weight is determined from an histogram in which breaking points are "ranked". This ponderal measurement has been compared with the linear measurement of the jaw length. The new method allows the manipulation of a larger number of individuals and it is easier and faster to use than the method based on jaw measurements.[Journal translation]
Styles APA, Harvard, Vancouver, ISO, etc.
10

Wu, Shu-Fei. « Bayesian Interval Estimation for the Two-Parameter Exponential Distribution Based on the Right Type II Censored Sample ». Symmetry 14, no 2 (10 février 2022) : 352. http://dx.doi.org/10.3390/sym14020352.

Texte intégral
Résumé :
The Bayesian interval estimation of the scale parameter for two-parameter exponential distribution is proposed based on the right type II censored sample. Under this type of censoring, two methods of Bayesian joint confidence region of the two parameters are also proposed. The simulation results show that the Bayesian method has a higher coverage probability than the existing method, so the Bayesian method is recommended for use. This research is related to the topic of asymmetrical probability distributions and applications across disciplines. The predictive interval of the future observation based on the right type II censored sample is also provided. One biometrical example is given to illustrate the proposed methods for the Bayesian interval estimations and prediction interval.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Biometrical method"

1

Holeksa, David. « Návrh audio-vizuální databáze pro extrakci sekundárních biometrických a ne-biometrických znaků ». Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220544.

Texte intégral
Résumé :
The aim of this semester project is to design a suitable database structure for the audio-visual data, parts extracted from the data corresponding to secondary biometric and non-biometric characteristics and description of these characters. The resulting database will be used for research into the identification of audio-visual content of multimedia data.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Fransson, Linda, et Therese Jeansson. « Biometric methods and mobile access control ». Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Texte intégral
Résumé :
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began to search for biometric methods that are available today to find them that would be best suited together with a mobile phone. After we had read information about them we did choose three methods for further investigation. These methods were Fingerprint Recognition, Iris Scan and Speaker Verification. Iris Scan is the method that is best suited to solve the authentication problem. The reasons for this are many. One of them is the uniqueness and stability of the iris, not even identical twins or the pair of the same individual has the same iris minutiae. The iris is also very protected behind eyelids, cornea and the aqueous humor and therefore difficult to damage. When it comes to the method itself, is it one of the most secure methods available today. One of the reasons for this is that the equal error rate is better than one in a million. However, this rate can be even better. It all depends on the Hamming Distance, which is a value that show how different the saved and temporarily template are, and what it is set to. To solve our session authentication, which was to make sure that no one else could take over a connected mobile phone, a sensor plate is the answer. This sensor will be able to sense for touch, heat and pulse. These three sensor measurements will together secure a validated session since the mobile phone will disconnect if the sensor looses its sensor data. There are, however, technological and other challenges to be solved before our proposed solutions will become viable. We address some of these issues in our thesis.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Betschart, Willie. « Applying intelligent statistical methods on biometric systems ». Thesis, Blekinge Tekniska Högskola, Avdelningen för signalbehandling, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1694.

Texte intégral
Résumé :
This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The layer is influenced by the general procedure of biometrics in a multimodal behavioural way. It is working in an unsupervised way and performs in an unsupervised manner. While biometric systems are increasingly adopted the technologies have some inherent problems such as false match and false non-match. In practice, a rejected user can not be interpreted as an impostor since the user simply might have problems using his/her biometric feature. The proposed methods in this project are dealing with these problems when analysing biometric usage in runtime. Another fact which may give rise to false rejections is template aging; a phenomenon where the enrolled user’s template is too old compared towards the user’s current biometric feature. A theoretical approach of template aging was known; however since the analysis of template aging detection was correlated with potential system flaws such as device defects or human generated risks such as impostor attacks this task would become difficult to solve in an unsupervised system but when ignoring the definition of template aging, the detection of similar effects was possible. One of the objectives of this project was to detect template aging in a predictive sense; this task failed to be carried out because the absence of basis performing this kind of tasks. The developed program performs abnormality detection at each incoming event from a biometric system. Each verification attempt is assumed to be from a genuine user unless any deviation according to the user's history is found, an abnormality. The possibility of an impostor attack depends on the degree of the abnormality. The application makes relative decisions between fraud possibilities or if genuine user was the source of what caused the deviations. This is presented as an alarm with the degree of impostor possibility. This intelligent layer has increased Optimum preCon´s capacity as a surveillance tool for biometrics. This product is an efficient complement to biometric systems in a steady up-going worldwide market.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Anderson, Niall Hay. « Methods for the investigation of spatial clustering, with epidemiological applications ». Thesis, University of Glasgow, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.364260.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Fakhir, Mahammad Majed. « Biometric fusion methods for adaptive face recognition in computer vision ». Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/4001.

Texte intégral
Résumé :
Face recognition is a biometric method that uses different techniques to identify the individuals based on the facial information received from digital image data. The system of face recognition is widely used for security purposes, which has challenging problems. The solutions to some of the most important challenges are proposed in this study. The aim of this thesis is to investigate face recognition across pose problem based on the image parameters of camera calibration. In this thesis, three novel methods have been derived to address the challenges of face recognition and offer solutions to infer the camera parameters from images using a geomtric approach based on perspective projection. The following techniques were used: camera calibration CMT and Face Quadtree Decomposition (FQD), in order to develop the face camera measurement technique (FCMT) for human facial recognition. Facial information from a feature extraction and identity-matching algorithm has been created. The success and efficacy of the proposed algorithm are analysed in terms of robustness to noise, the accuracy of distance measurement, and face recognition. To overcome the intrinsic and extrinsic parameters of camera calibration parameters, a novel technique has been developed based on perspective projection, which uses different geometrical shapes to calibrate the camera. The parameters used in novel measurement technique CMT that enables the system to infer the real distance for regular and irregular objects from the 2-D images. The proposed system of CMT feeds into FQD to measure the distance between the facial points. Quadtree decomposition enhances the representation of edges and other singularities along curves of the face, and thus improves directional features from face detection across face pose. The proposed FCMT system is the new combination of CMT and FQD to recognise the faces in the various pose. The theoretical foundation of the proposed solutions has been thoroughly developed and discussed in detail. The results show that the proposed algorithms outperform existing algorithms in face recognition, with a 2.5% improvement in main error recognition rate compared with recent studies.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Iqbal, K. « Image detection and retrieval for biometric security from an image enhancement perspective ». Thesis, Coventry University, 2011. http://curve.coventry.ac.uk/open/items/ed5b98d3-84e6-4070-89cb-7ede2f0e9c0b/1.

Texte intégral
Résumé :
Security methods based on biometrics have been gaining importance increasingly in the last few years due to recent advances in biometrics technology and its reliability and efficiency in real world applications. Also, several major security disasters that occurred in the last decade have given a new momentum to this research area. The successful development of biometric security applications cannot only minimise such threats but may also help in preventing them from happening on a global scale. Biometric security methods take into account humans’ unique physical or behavioural traits that help to identify them based on their intrinsic characteristics. However, there are a number of issues related to biometric security, in particular with regard to surveillance images. The first issue is related to the poor visibility of the images produced by surveillance cameras and the second issue is concerned with the effective image retrieval based on user query. This research addresses both issues. This research addresses the first issue of low quality of surveillance images by proposing an integrated image enhancement approach for face detection. The proposed approach is based on contrast enhancement and colour balancing methods. The contrast enhancement method is used to improve the contrast, while the colour balancing method helps to achieve a balanced colour. Importantly, in the colour balancing method, a new process for colour cast adjustment is introduced which relies on statistical calculation. It can adjust the colour cast and maintain the luminance of the whole image at the same level. The research addresses the second issue relating to image retrieval by proposing a content-based image retrieval approach. The approach is based on the three welliii known algorithms: colour histogram, texture and moment invariants. Colour histogram is used to extract the colour features of an image. Gabor filter is used to extract the texture features and the moment invariant is used to extract the shape features of an image. The use of these three algorithms ensures that the proposed image retrieval approach produces results which are highly relevant to the content of an image query, by taking into account the three distinct features of the image and the similarity metrics based on Euclidean measure. In order to retrieve the most relevant images the proposed approach also employs a set of fuzzy heuristics to improve the quality of the results further. The integrated image enhancement approach is applied to the enhancement of low quality images produced by surveillance cameras. The performance of the proposed approach is evaluated by applying three face detection methods (skin colour based face detection, feature based face detection and image based face detection methods) to surveillance images before and after enhancement using the proposed approach. The results show a significant improvement in face detection when the proposed approach was applied. The performance of the content-based image retrieval approach is carried out using the standard Precision and Recall measures, and the results are compared with wellknown existing approaches. The results show the proposed approach perform s better than the well-known existing approaches.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Mráček, Štěpán. « Biometric Recognition of 3D Faces ». Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237237.

Texte intégral
Résumé :
Diplomová práce byla vypracována na studijním pobytu na "Gjovik University College" v Norsku, a je zpracována v angličtině. Tato práce se zabývá rozpoznáváním 3D obličejů. Je zde popsán obecný biometrický systém a také konkrétní postupy používané při rozpoznávání 2D i 3D obličejů. Následně je navžena metoda pro rozpoznávání 3D obličejů. Algoritmus je vyvíjen a testován pomocí databáze Face Recognition Grand Challenge (FRGC). Během předzpracování jsou nalezeny význačné body v obličeji a následně je trojrozměrný model zarovnán do referenční polohy. Dále jsou vstupní data porovnávána s biometrickými šablonami uloženými v databázi, a to je zajištěno využitím tří základních technik pro rozpoznávání obličejů -- metoda eigenface (PCA), rozpoznávání založené na histogramu obličeje a rozpoznávání založené na anatomických rysech. Nakonec jsou jednotlivé metody spojeny do jednoho systému, jehož celková výsledná výkonnost převyšuje výkonnost jednotlivých použitých technik.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Subramanian, Ravichandran. « Orientation Invariance Methods for Inertial Gait ». Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7369.

Texte intégral
Résumé :
Intelligent devices such as smart phones, smart watches, virtual reality (VR) headsets and personal exercise devices have become integral elements of accessories used by many people. The ability of these devices to verify or identify the user could be applied for enhanced security and user experience customization among other things. Almost all these devices have built-in inertial sensors such as accelerometer and gyroscope. These inertial sensors respond to the movements made by the user while performing day to day activities like walking, getting up and sitting down. The response depends on the activity being performed and thus can be used for activity recognition. The response also captures the user's unique way of doing the activity and can be used as a behavioral biometric for verification or identification. The acceleration (accelerometer) and rate of rotation (gyroscope) are recorded in the device coordinate frame. But to determine the user's motion, these need to be converted to a coordinate frame relative to the user. In most situations the orientation of the device relative to the user can neither be controlled nor determined reliably. The solution to this problem requires methods to remove the dependence on device orientation while comparing the signals collected at different times. In a vast of majority of research to date, the performance of authentication algorithms using inertial sensors have been evaluated on small datasets with few tens of subjects, collected under controlled placement of the sensors. Very often stand alone inertial sensors have been used to collect the data. Stand alone sensors afford better calibration, while the sensors built into smart devices offer little or no means of calibration. Due to these limitations of the datasets used, it is difficult to extend the results from these research to realistic performance with a large number subjects and natural placement of off-the-shelf smart devices. This dissertation describes the Kabsch algorithm which is used to achieve orientation invariance of the recorded inertial data, enabling better authentication independent of device orientation. It also presents the Vector Cross Product (VCP) method developed to achieve orientation invariance. Details of a realistic inertial dataset (USF-PDA dataset) collected with commercial smart phones placed in natural positions and orientations using 101 subjects are given. The data includes sessions from different days on a subset of 56 subjects. This would enable realistic evaluation of authentication algorithms. This dataset has been made publicly available. The performance of five methods that address the orientation dependence of signals are compared to a baseline that performs no compensation for orientation of the device. The methods as a part of a overall gait authentication algorithm are evaluated on the USF-PDA dataset mentioned above and another large dataset with more than 400 subjects. The results show that the orientation compensation methods are able to improve the authentication performance on data with uncontrolled orientation to be close to performance on data collected with controlled orientation. The Kabsch method shows the highest improvement.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Robertson, Joshua. « The application of the human-biometric sensor interaction method to automated border control systems ». Thesis, University of Kent, 2017. https://kar.kent.ac.uk/66822/.

Texte intégral
Résumé :
Biometrics components are used in many different systems and technologies to verify that the user is whom they say they are. In Automated Border Control systems, biometrics components used in conjunction with a traveller's documents to make sure the user is whom they say they are so that they can cross into a countries borders. The systems are expected to verify the identity with a higher degree than officers who manually check travellers. Each year the number of travellers crossing through a country borders increases and so systems are expected to handle bigger demands; through improving the user experience to ensuring accuracy and performance standards increase. While the system does bring its benefits through increased speed and higher security, there are drawbacks. One of the main issues with the systems is a lack of standardisation across implementations. Passing through an automated process at Heathrow may be different to Hong Kong. The infrastructure, information, environment and guidance given during the transaction will all greatly differ for the user. Furthermore, the individual components and subsequent processing will be evaluated using a different methodology too. This thesis reports on the contrasts between implementations, looking at solutions which utilise different biometric modalities and travel documents. Several models are devised to establish a process map which can be applied to all systems. Investigating further, a framework is described for a novel assessment method to evaluate the performance of a system. An RGB-D sensor is implemented, to track and locate the user within an interactive environment. By doing so, the user's interaction is assessed in real-time. Studies then report on the effectiveness of the solution within a replicated border control scenario. Several relationships are studied to improve the technologies used within the scenario. Successful implementation of the automated assessment method may improve the user's experience with systems, improving information and guidance, increasing the likelihood of successful interaction while maintaining a high level of security and quicker processing times.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Bin, Safie Sairul Izwan. « Pulse domain novel feature extraction methods with application to ecg biometric authentication ». Thesis, University of Strathclyde, 2012. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=17829.

Texte intégral
Résumé :
This thesis presents the concept of representing finite signals in terms of sequential output pulses called pulse domain to extract Electrocardiogram (ECG) features for biometric authentication systems. Two novel methods based on the pulse domain philosophy namely Pulse Active (PA) and Adaptive Pulse Active (APA) techniques are presented in this thesis. A total of 11 algorithms are derived from these two methods and used to generate novel ECG feature vectors. Six algorithms of the PA technique are named as Pulse Active Bit (PAB), Pulse Active Width (PAW), Pulse Active Area (PAA), Pulse Active Mean (PAM), Pulse Active Ratio (PAR) and Pulse Active Harmonic (PAH). Five APA algorithms are named as Adaptive Pulse Active Bit (APAB), Adaptive Pulse Active Width (APAW), Adaptive Pulse Active Area (APAA), Adaptive Pulse Active Mean (APAM) and Adaptive Pulse Active Harmonic (APAH). The proposed techniques are validated using ECG experimental data from 112 subjects. Simulation results indicate that APAW generates the best biometric performance of all 11 algorithms. Selected ranges of PA and APA parameters are determined in this thesis that generates approximate similar biometric performance. Using this suggested range, these parameters are than used as a personal identification number (PIN) which are a part of the proposed PA-APA ECG based multilevel security biometric authentication system.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Biometrical method"

1

Derbel, Nabil, et Olfa Kanoun, dir. Advanced Methods for Human Biometrics. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81982-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Harvey, Schuster, et Metzger Wilfred, dir. Biometrics : Methods, applications and analyses. Hauppauge, N.Y : Nova Science Publishers, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Biometrics : Methods, applications and analyses. New York : Nova Science Publishers, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Biometrics : Theory, methods, and applications. Piscataway, N.J : IEEE Press, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Ranta, Esa. Biometria : Tilastotiedettä ekologeille. 4e éd. Helsinki : Yliopistopaino, 1992.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Schuckers, Michael E. Computational Methods in Biometric Authentication. London : Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-202-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Schuckers, Michael E. Computational methods in biometric authentication : Statistical methods for performance evaluation. London : Springer, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Bilan, Stepan, Mohamed Elhoseny et D. Jude Hemanth, dir. Biometric Identification Technologies Based on Modern Data Mining Methods. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-48378-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Pejaś, Jerzy, et Andrzej Piegat, dir. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems. Boston, MA : Springer US, 2005. http://dx.doi.org/10.1007/b101135.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

1928-, Searle S. R., dir. Proceedings of the conference in honor of Shayle R. Searle : August 9-10, 1996, Biometrics Unit, Cornell University. Ithaca, NY : Biometrics Unit, Cornell University, 1998.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Biometrical method"

1

Kumlander, Deniss. « Soft Biometrical Students Identification Method for e-Learning ». Dans Advances in Computer and Information Sciences and Engineering, 114–18. Dordrecht : Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8741-7_21.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Ding, Sophia, Emilia Nunes, Pascal Bettendorff et Weyde Lin. « Biometrics ». Dans Trends in Data Protection and Encryption Technologies, 121–28. Cham : Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_22.

Texte intégral
Résumé :
AbstractIn biometrics, physiological characteristics (e.g., fingerprints, facial features, voices) are measured to identify individuals. Since biometry does not share the same characteristics as other authentication techniques, such as passwords or PIN codes, it is widely used as a second-factor authentication. A fully integrated solution offers significant advantages as it aligns biometric hardware, key generation, validation, and storage with the cryptographic provider, providing a coherent control environment. As a result, designing and implementing secure biometric authentication methods requires highly specialized technical expertise and experience. In addition, as biometrics become prevalent and their integration with artificial intelligence systems increases, ethical and regulatory questions become more pressing.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Wen, Mengna, Ziyun Ye et Jinfeng Yang. « Finger Trimodal Features Coding Fusion Method ». Dans Biometric Recognition, 466–74. Cham : Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20233-9_47.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Zeng, Junying, Yao Chen, Chuanbo Qin, Fan Wang, Junying Gan, Yikui Zhai et Boyuan Zhu. « A Novel Method for Finger Vein Recognition ». Dans Biometric Recognition, 46–54. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31456-9_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Zhang, Yongliang, Xiaozhu Chen, Xiao Chen, Dixin Zhou et Erzhe Cao. « An Eye Localization Method for Iris Recognition ». Dans Biometric Recognition, 420–27. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69923-3_45.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Luo, Qi, Hongxia Wang et Jianyun Chen. « Phase Retrieval by the Inverse Power Method ». Dans Biometric Recognition, 223–30. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97909-0_24.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Tapiador, Marino, et Juan A. Sigüenza. « Writer Identification Method Based on Forensic Knowledge ». Dans Biometric Authentication, 555–61. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_76.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

He, Xiaofu, Yue Lu et Pengfei Shi. « A New Fake Iris Detection Method ». Dans Advances in Biometrics, 1132–39. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_114.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ren, Chunxiao, Yilong Yin et Yanbin Ning. « A Performance Improvement Method for Existing Fingerprint Systems ». Dans Biometric Recognition, 120–27. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35136-5_15.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Hu, Changhui, Xiaobo Lu et Yijun Du. « A Novel Face Recognition Method Using Vector Projection ». Dans Biometric Recognition, 61–69. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12484-1_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Biometrical method"

1

Kirci, Murvet, et Faezeh Sadat Babmir. « A digest-based method for efficiency improvement of security in biometrical cryptography authentication ». Dans 2017 International Symposium on Computer Science and Software Engineering Conference (CSSE). IEEE, 2017. http://dx.doi.org/10.1109/csicsse.2017.8320113.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

de Araújo, Lúcio B., Manuela M. Oliveira, Carlos Tadeu dos S. Dias, Amílcar Oliveira et Teresa A. Oliveira. « Tucker3 method in biometrical research : Analysis of experiments with three factors, using R ». Dans NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2012 : International Conference of Numerical Analysis and Applied Mathematics. AIP, 2012. http://dx.doi.org/10.1063/1.4756506.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Denisova, Anna. « An improved simple feature set for face presentation attack detection ». Dans WSCG'2022 - 30. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2022. Západočeská univerzita, 2022. http://dx.doi.org/10.24132/csrn.3201.3.

Texte intégral
Résumé :
Presentation attacks are weak points of facial biometrical authentication systems. Although several presentation attack detection methods were developed, the best of them require a sufficient amount of training data and rely on computationally intensive deep learning based features. Thus, most of them have difficulties with adaptation to new types of presentation attacks or new cameras. In this paper, we introduce a method for face presentation attack detection with low requirements for training data and high efficiency for a wide range of spoofing attacks. The method includes feature extraction and binary classification stages. We use a combination of simple statistical and texture features and describe the experimental results of feature adjustment and selection. We validate the proposed method using WMCA dataset. The experiments showed that the proposed features decrease the average classification error in comparison with the RDWT-Haralick-SVM method and demonstrate the best performance among non-CNN-based methods.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sarangaraja, A. P., D. Rajagopalan, A. Vignesh et P. Mohamed Fathimal. « Secret Sharing Scheme with Fingerprint Authentication ». Dans International Research Conference on IOT, Cloud and Data Science. Switzerland : Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-u6em0l.

Texte intégral
Résumé :
Medical imaging is very important in medical diagnosis. X-rays, ultrasound images, CT scans, brain pictures, and patient mri images are examples of images that contain sensitive information. However, poor communication channels and loopholes in hospital and medical centre storage systems risk accessing these images by unauthorised individuals who utilise them for nefarious purposes other than diagnostics. Image encryption is a common strategy for enhancing the integrity of communication and storage channels for protecting medical images from unauthorized access. This task proposes a biometrics-based method of secret sharing. Instead of sharing secrets between participants as in encryption, the biometric properties of participants create a single biometric configuration. If the biometric vaults are verified for the required number of actual during the authentication process, participants must provide a valid encryption key from the configuration is disclosed.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Jangua, Daniel, et Aparecido Marana. « A New Method for Gait Recognition Using 2D Poses ». Dans Workshop de Visão Computacional. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/wvc.2020.13483.

Texte intégral
Résumé :
Over the last decades, biometrics has become an important way for human identification in many areas, since it can avoid frauds and increase the security of individuals in society. Nowadays, most popular biometric systems are based on fingerprint and face features. Despite the great development observed in Biometrics, an important challenge lasts, which is the automatic people identification in low-resolution videos captured in unconstrained scenarios, at a distance, in a covert and noninvasive way, with little or none subject cooperation. In these cases, gait biometrics can be the only choice. The goal of this work is to propose a new method for gait recognition using information extracted from 2D poses estimated over video sequences. For 2D pose estimation, our method uses OpenPose, an open-source robust pose estimator, capable of real-time multi-person detection and pose estimation with high accuracy and a good computational performance. In order to assess the new proposed method, we used two public gait datasets, CASIA Gait Dataset-A and CASIA Gait Dataset-B. Both datasets have videos of a number of people walking in different directions and conditions. In our new method, the classification is carried out by a 1-NN classifier. The best results were obtained by using the chi-square distance function, which obtained 95.00% of rank-1 recognition rate on CASIA Gait Dataset-A and 94.22% of rank-1 recognition rate on CASIA Gait Dataset-B, which are comparable to state-of-the-art results.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Gaipov, J. B. « DIGITAL PAYMENT TECHNOLOGIES WITH BIOMETRICS ». Dans НОВЫЕ БИЗНЕС-МОДЕЛИ ЦИФРОВОЙ ЭКОНОМИКИ В СУБЪЕКТАХ РФ. ХГУЭП, 2022. http://dx.doi.org/10.38161/978-5-7823-0753-0-2022-131-134.

Texte intégral
Résumé :
This article focuses on identifying and studying the technology of payment systems with biometrics for further improvement and anticipation of development, in the banking sector of the Republic of Uzbekistan, examines the key problems hindering the development of the innovative payment systems market and analyses the activities of commercial banks in the digital services market of the Republic of Uzbekistan in the context of information technology development and digitalization of the economy in the banking sector. Methodological techniques and methods of evaluation of efficiency of using biometric data of payment systems are investigated. Details of basic payment systems, their development and distribution in different countries are determined. Modern trends in the development of electronic payment systems and services using modern IT-technologies are presented.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Rahmes, Mark, Josef DeVaughn Allen, Abdelmoula Elharti et Gnana Bhaskar Tenali. « Fingerprint Reconstruction Method Using Partial Differential Equation and Exemplar-Based Inpainting Methods ». Dans 2007 Biometrics Symposium. IEEE, 2007. http://dx.doi.org/10.1109/bcc.2007.4430539.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Veiga, Rafael, Cristiano B. Both, Iago Medeiros, Denis Rosário et Eduardo Cerqueira. « A Federated Learning Approach for Authentication and User Identification based on Behavioral Biometrics ». Dans Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc.2023.536.

Texte intégral
Résumé :
A smartphone can collect behavioral data without requiring additional actions on the user’s part and without the need for additional hardware. In an active or continuous user authentication process, information from integrated sensors, such as touch, and gyroscope, is used to monitor the user continuously. These sensors can capture behavioral (touch patterns, accelerometer) or physiological (fingerprint, face) data of the user naturally interacting with the device. However, transferring data from multiple users’ mobile devices to a server is not recommended due to user data privacy concerns. This paper introduces an Federated Learning (FL) approach to define a user’s biometric behavior pattern for continuous user identification and authentication. We also evaluate whether FL can be helpful in behavioral biometrics. Evaluation results compare CNNs in different epochs using FL and a centralized method with low chances of wrong predictions in user identification by the gyroscope.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Karabat, Cagatay, et Hakan Erdogan. « Trustworthy biometric hashing method ». Dans 2009 IEEE 17th Signal Processing and Communications Applications Conference (SIU). IEEE, 2009. http://dx.doi.org/10.1109/siu.2009.5136333.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

« Entropy based Biometric Template Clustering ». Dans International Conference on Pattern Recognition Applications and Methods. SciTePress - Science and and Technology Publications, 2013. http://dx.doi.org/10.5220/0004266205600563.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Biometrical method"

1

Soller, Moshe (Morris), Hans Cheng et Lyman Crittenden. Mapping the Chicken Genome, Including Loci Affecting Traits of Economic Importance. United States Department of Agriculture, septembre 1994. http://dx.doi.org/10.32747/1994.7568779.bard.

Texte intégral
Résumé :
A total of 195 microsatellites were added to the chicken genome map. Mapping of fifty known genes revealed a high degree of conserved linkage order between human and chicken genomes. A new, statistically powerful mapping design, the full-sib intercross line (produced by mating two parents, and intercrossing their progeny over a number of generations), was developed for use in species with high reproductive capacity. The Jerusalem Resource Population (JRP), now at the F12 generation, was established to implement this design i chickens. The biometrical picutre in the JRP is similar to that generally found in chicken populations; inbreeding effects were not observed. The F2 and F3 generations of the JRP were genotyped with respect to twelve production traits, using a battery of 23 microsatellites markers. The number of significant effects was twice that expected on chance alone, validating the high statistical power of the JRP with respect to QTL differentiating the parental lines. Selective DNA pooling, based on estimation of marker allele frequencies in pooled DNA samples, has been proposed to reduce high genotyping costs of QTL mapping. A method to correct for overlapping shadow bands of dinucleotide microsatellite markers in pooled DNA samples was developed and validated. In a retrospective study using this procedure, previously mapped loci affecting Marek's disease were successfully identified.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Frenzen, Christopher L. Convolution Methods for Mathematical Problems in Biometrics. Fort Belvoir, VA : Defense Technical Information Center, janvier 1999. http://dx.doi.org/10.21236/ada359925.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Varastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani et Abdolhossein Sarrafzadeh. Human Biometric Traits : A Systematic Review Focusing on Vascular Patterns. Unitec ePress, décembre 2020. http://dx.doi.org/10.34074/ocds.086.

Texte intégral
Résumé :
Authentication methods based on human traits, including fingerprint, face, iris, and palm print, have developed significantly, and currently they are mature enough to be reliably considered for human identification purposes. Recently, as a new research area, a few methods based on non-facial skin features such as vein patterns have been developed. This literature review paper explores some key biometric systems such as face recognition, iris recognition, fingerprint, and palm print, and discusses their respective advantages and disadvantages; then by providing a comprehensive analysis of these traits, and their applications, vein pattern recognition is reviewed.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Cheng, Su Lan, Ross J. Micheals et Z. Q. John Lu. Comparison of confidence intervals for large operational biometric data by parametric and non-parametric methods. Gaithersburg, MD : National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7740.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Тарасова, Олена Юріївна, et Ірина Сергіївна Мінтій. Web application for facial wrinkle recognition. Кривий Ріг, КДПУ, 2022. http://dx.doi.org/10.31812/123456789/7012.

Texte intégral
Résumé :
Facial recognition technology is named one of the main trends of recent years. It’s wide range of applications, such as access control, biometrics, video surveillance and many other interactive humanmachine systems. Facial landmarks can be described as key characteristics of the human face. Commonly found landmarks are, for example, eyes, nose or mouth corners. Analyzing these key points is useful for a variety of computer vision use cases, including biometrics, face tracking, or emotion detection. Different methods produce different facial landmarks. Some methods use only basic facial landmarks, while others bring out more detail. We use 68 facial markup, which is a common format for many datasets. Cloud computing creates all the necessary conditions for the successful implementation of even the most complex tasks. We created a web application using the Django framework, Python language, OpenCv and Dlib libraries to recognize faces in the image. The purpose of our work is to create a software system for face recognition in the photo and identify wrinkles on the face. The algorithm for determining the presence and location of various types of wrinkles and determining their geometric determination on the face is programmed.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie