Rozprawy doktorskie na temat „Biometric identification systems”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Biometric identification systems.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Biometric identification systems”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Nandakumar, Karthik. "Multibiometric systems fusion strategies and template security /". Diss., Connect to online resource - MSU authorized users, 2008.

Znajdź pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Michigan State University. Dept. of Computer Science and Engineering, 2008.
Title from PDF t.p. (viewed on Mar. 30, 2009) Includes bibliographical references (p. 210-228). Also issued in print.
Style APA, Harvard, Vancouver, ISO itp.
2

John, George Jacqueline. "Optimising multimodal fusion for biometric identification systems". Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418551.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Verett, Marianna J. "Performance and usage of biometrics in a testbed environment for tactical purposes". Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FVerett.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, December 2006.
Thesis Advisor(s): Alex Bordetsky. "December 2006." Includes bibliographical references (p. 71-74). Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
4

Walnoha, Michael Anthony. "Shoeprint analysis a GIS application in forensic evidence /". Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4639.

Pełny tekst źródła
Streszczenie:
Thesis (M.A.)--West Virginia University, 2006.
Title from document title page. Document formatted into pages; contains iv, 64 p. : ill. (some col.), maps (some col.). Includes abstract. Includes bibliographical references (p. 63-64).
Style APA, Harvard, Vancouver, ISO itp.
5

Dennis, LeRoy P. Ford Michael K. "The wireless ubiquitous surveillance testbed /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FDennis.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Alex Bordetsky, Randy J. Hess. Includes bibliographical references (p. 101-105). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
6

Johnson, Amos Y. Jr. "A method for human identification using static, activity-specific parameters". Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15793.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chan, Siu Man. "Improved speaker verification with discrimination power weighting /". View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHANS.

Pełny tekst źródła
Streszczenie:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.
Includes bibliographical references (leaves 86-93). Also available in electronic version. Access restricted to campus users.
Style APA, Harvard, Vancouver, ISO itp.
8

Crihalmeanu, Musat C. "Adding liveness detection to the hand geometry scanner". Morgantown, W. Va. : [West Virginia University Libraries], 2003. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3220.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--West Virginia University, 2003
Title from document title page. Document formatted into pages; contains viii, 96 p. : ill. (some col.) Includes abstract. Includes bibliographical references (p. 72-74).
Style APA, Harvard, Vancouver, ISO itp.
9

Feng, Yicheng. "Discriminability and security of binary template in face recognition systems". HKBU Institutional Repository, 2012. https://repository.hkbu.edu.hk/etd_ra/1455.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Akinbola, Akintunde A. "Estimation of image quality factors for face recognition". Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4308.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--West Virginia University, 2005.
Title from document title page. Document formatted into pages; contains vi, 56 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 52-56).
Style APA, Harvard, Vancouver, ISO itp.
11

Ford, Michael K., i LeRoy P. Dennis. "The wireless ubiquitous surveillance testbed". Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1124.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution is unlimited
This thesis research examines the emergence of surveillance and biometrics technologies as a sensible baseline for building a ubiquitous surveillance testbed for the Naval Postgraduate School. This thesis also defines what ubiquitous surveillance is, employs biometric applications and technical strategies to build a working testbed, and addresses developmental issues surrounding the hypothesis for a ubiquitous surveillance testbed. The authors conducted several evaluations of the testbed using different scenarios and recommend emerging biometric and surveillance technologies to promote the maturation of the testbed into a premier ubiquitous habitat.
Lieutenant, United States Navy
Lieutenant, United States Navy
Style APA, Harvard, Vancouver, ISO itp.
12

Sanderson, Conrad, i conradsand@ieee org. "Automatic Person Verification Using Speech and Face Information". Griffith University. School of Microelectronic Engineering, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030422.105519.

Pełny tekst źródła
Streszczenie:
Identity verification systems are an important part of our every day life. A typical example is the Automatic Teller Machine (ATM) which employs a simple identity verification scheme: the user is asked to enter their secret password after inserting their ATM card; if the password matches the one prescribed to the card, the user is allowed access to their bank account. This scheme suffers from a major drawback: only the validity of the combination of a certain possession (the ATM card) and certain knowledge (the password) is verified. The ATM card can be lost or stolen, and the password can be compromised. Thus new verification methods have emerged, where the password has either been replaced by, or used in addition to, biometrics such as the person’s speech, face image or fingerprints. Apart from the ATM example described above, biometrics can be applied to other areas, such as telephone & internet based banking, airline reservations & check-in, as well as forensic work and law enforcement applications. Biometric systems based on face images and/or speech signals have been shown to be quite effective. However, their performance easily degrades in the presence of a mismatch between training and testing conditions. For speech based systems this is usually in the form of channel distortion and/or ambient noise; for face based systems it can be in the form of a change in the illumination direction. A system which uses more than one biometric at the same time is known as a multi-modal verification system; it is often comprised of several modality experts and a decision stage. Since a multi-modal system uses complimentary discriminative information, lower error rates can be achieved; moreover, such a system can also be more robust, since the contribution of the modality affected by environmental conditions can be decreased. This thesis makes several contributions aimed at increasing the robustness of single- and multi-modal verification systems. Some of the major contributions are listed below. The robustness of a speech based system to ambient noise is increased by using Maximum Auto-Correlation Value (MACV) features, which utilize information from the source part of the speech signal. A new facial feature extraction technique is proposed (termed DCT-mod2), which utilizes polynomial coefficients derived from 2D Discrete Cosine Transform (DCT) coefficients of spatially neighbouring blocks. The DCT-mod2 features are shown to be robust to an illumination direction change as well as being over 80 times quicker to compute than 2D Gabor wavelet derived features. The fragility of Principal Component Analysis (PCA) derived features to an illumination direction change is solved by introducing a pre-processing step utilizing the DCT-mod2 feature extraction. We show that the enhanced PCA technique retains all the positive aspects of traditional PCA (that is, robustness to compression artefacts and white Gaussian noise) while also being robust to the illumination direction change. Several new methods, for use in fusion of speech and face information under noisy conditions, are proposed; these include a weight adjustment procedure, which explicitly measures the quality of the speech signal, and a decision stage comprised of a structurally noise resistant piece-wise linear classifier, which attempts to minimize the effects of noisy conditions via structural constraints on the decision boundary.
Style APA, Harvard, Vancouver, ISO itp.
13

Mackley, Joshua, i mikewood@deakin edu au. "Extracting fingerprint features using textures". Deakin University. School of Engineering & Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20050815.111403.

Pełny tekst źródła
Streszczenie:
Personal identification of individuals is becoming increasingly adopted in society today. Due to the large number of electronic systems that require human identification, faster and more secure identification systems are pursued. Biometrics is based upon the physical characteristics of individuals; of these the fingerprint is the most common as used within law enforcement. Fingerprint-based systems have been introduced into the society but have not been well received due to relatively high rejection rates and false acceptance rates. This limited acceptance of fingerprint identification systems requires new techniques to be investigated to improve this identification method and the acceptance of the technology within society. Electronic fingerprint identification provides a method of identifying an individual within seconds quickly and easily. The fingerprint must be captured instantly to allow the system to identify the individual without any technical user interaction to simplify system operation. The performance of the entire system relies heavily on the quality of the original fingerprint image that is captured digitally. A single fingerprint scan for verification makes it easier for users accessing the system as it replaces the need to remember passwords or authorisation codes. The identification system comprises of several components to perform this function, which includes a fingerprint sensor, processor, feature extraction and verification algorithms. A compact texture feature extraction method will be implemented within an embedded microprocessor-based system for security, performance and cost effective production over currently available commercial fingerprint identification systems. To perform these functions various software packages are available for developing programs for windows-based operating systems but must not constrain to a graphical user interface alone. MATLAB was the software package chosen for this thesis due to its strong mathematical library, data analysis and image analysis libraries and capability. MATLAB enables the complete fingerprint identification system to be developed and implemented within a PC environment and also to be exported at a later date directly to an embedded processing environment. The nucleus of the fingerprint identification system is the feature extraction approach presented in this thesis that uses global texture information unlike traditional local information in minutiae-based identification methods. Commercial solid-state sensors such as the type selected for use in this thesis have a limited contact area with the fingertip and therefore only sample a limited portion of the fingerprint. This limits the number of minutiae that can be extracted from the fingerprint and as such limits the number of common singular points between two impressions of the same fingerprint. The application of texture feature extraction will be tested using variety of fingerprint images to determine the most appropriate format for use within the embedded system. This thesis has focused on designing a fingerprint-based identification system that is highly expandable using the MATLAB environment. The main components that are defined within this thesis are the hardware design, image capture, image processing and feature extraction methods. Selection of the final system components for this electronic fingerprint identification system was determined by using specific criteria to yield the highest performance from an embedded processing environment. These platforms are very cost effective and will allow fingerprint-based identification technology to be implemented in more commercial products that can benefit from the security and simplicity of a fingerprint identification system.
Style APA, Harvard, Vancouver, ISO itp.
14

Klimešová, Lenka. "Identifikace osob pomocí biometrie sítnice". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-378031.

Pełny tekst źródła
Streszczenie:
This paper deals with identification of persons using retinal biometry. The retinal vasculature is invariant and unique to everyone, which determines it for biometric purposes. The first part of the work includes information about biometrics, biometric systems and reliability measures. The next part describes the principle of using experimental video ophthalmoscope, which was used for retinal vascular imaging and includes the literature research of use of retinal images for biometrics, feature extraction methods and similarity measures. Finally, two algorithms to use the input data are proposed and realized in programming environment MATLAB®. The methods are tested and evaluated on a data set from experimental video ophthalmoscope and on publicly available STRaDe and DRIVE databases.
Style APA, Harvard, Vancouver, ISO itp.
15

Rautenbach, James. "Towards a framework for identity verification of vulnerable children within the Eastern Cape". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/597.

Pełny tekst źródła
Streszczenie:
This dissertation proposes the development of an identification verification model that can be implemented within the context of the Eastern Cape, South Africa in order to ensure that vulnerable children are provided with the requisite care that they deserve from the state. The dissertation provides both a developed and developing world perspective on the identification verification needs of vulnerable children by providing an overview of relevant South African policy with regard to caring for vulnerable children and presenting an international perspective with specific reference to current legislative developments in the United Kingdom and Malaysia. Chapter 1 provides a motivation for a framework to be used for the identification verification of children in developing countries by emphasising that the provision of basic social services to children is an urgent requirement for poverty eradication and is a necessity as documented in the United Nations Convention on the Rights of the Child. A background to the needs of vulnerable children in South Africa is given and the scope, limitations and research methodology used in the dissertation is presented. Chapter 2 provides an overview of child related policy in the South African Context both from a National Government and Eastern Cape perspective. Although extensive progress has been made in the development of policies aimed at protecting vulnerable children, the practical implementation of these policies has been hampered by numerous issues including the lack of coordination between key entities. Chapter 3 provides an introduction to several noteworthy international developments with regard to the identity verification of vulnerable children. Lessons learnt from identity verification systems from the United Kingdom and Malaysia are analyzed for applicability to the South African context. In addition to this, the use of biometric technology in identity verification systems and a number of biometric identification methodologies available are discussed. Chapter 4 proposes the development and implementation of a biometric identity verification model in the Eastern Cape Province of South Africa based on lessons learnt from the assessment of South African policy and international best practice. The system should be piloted in the Eastern Cape and, if successful, be implemented throughout South Africa with a possible view to future implementation on the African continent. The scope of the system, the technological requirements and a high level implementation plan together with the need to further research certain key aspects e.g. the cost implications are discussed. It is clear that the development of such a model and the implementation of such a system will ensure that vulnerable children are provided with the requisite care that they are constitutionally entitled to. Significant follow up research is required during the development of the model to ensure that all aspects of the model are well documented and during the implementation of the system to ensure that the requirements of the users both within the government and the general public are met.
Style APA, Harvard, Vancouver, ISO itp.
16

Hilal, Alaa. "Système d'identification à partir de l'image d'iris et détermination de la localisation des informations". Thesis, Troyes, 2013. http://www.theses.fr/2013TROY0021/document.

Pełny tekst źródła
Streszczenie:
Le système d’identification d’iris est considéré comme l’une des meilleures technologies biométriques. Toutefois, des problèmes liés à la segmentation de l’iris et à la normalisation de la texture de l’iris sont généralement signalés comme principales origines des reconnaissances incorrectes. Dans notre travail, trois contributions principales sont proposées pour améliorer le système d’identification d’iris. Une nouvelle méthode de segmentation est développée. Elle détecte la frontière externe de l’iris par un contour circulaire et la pupille, d’une manière précise, à l’aide d’un modèle de contour actif. Ensuite, une nouvelle méthode de normalisation est proposée. Elle assure une représentation plus robuste et un meilleur échantillonnage de la texture de l’iris comparée aux méthodes traditionnelles. Enfin en utilisant le système d’identification d’iris proposé, la localisation des caractéristiques discriminantes dans une région d’iris est identifiée. Nous vérifions que l’information la plus importante de la région de l’iris se trouve à proximité de la pupille et que la capacité discriminante de la texture diminue avec la distance à la pupille. Les méthodes de segmentation et de normalisation développées sont testées et comparées à un système de référence sur une base de données contenant 2639 images d’iris. Une amélioration des performances de reconnaissance valide l’efficacité du système proposé
Iris identification system is considered among the best biometric technologies. However problems related to the segmentation of the iris and to the normalization of iris templates are generally reported and induce loss of recognition performance. In this work three main contributions are made to the progress of the iris identification system. A new segmentation method is developed. It approximates the outer iris boundary with a circle and segments accurately the inner boundary of the iris by use of an active contour model. Next, a new normalization method is proposed. It leads to a more robust characterization and a better sampling of iris textures compared to traditional normalization methods. Finally using the proposed iris identification system, the location of discriminant characteristics along iris templates is identified. It appears that the most discriminant iris characteristics are located in inner regions of the iris (close to the pupil boundary) and that the discriminant capabilities of these characteristics decreases as outer regions of the iris are considered. The developed segmentation and normalization methods are tested and compared to a reference iris identification system over a database of 2639 iris images. Improvement in recognition performance validates the effectiveness of the proposed system
Style APA, Harvard, Vancouver, ISO itp.
17

Sanderson, Conrad. "Automatic Person Verification Using Speech and Face Information". Thesis, Griffith University, 2003. http://hdl.handle.net/10072/367191.

Pełny tekst źródła
Streszczenie:
Identity verification systems are an important part of our every day life. A typical example is the Automatic Teller Machine (ATM) which employs a simple identity verification scheme: the user is asked to enter their secret password after inserting their ATM card; if the password matches the one prescribed to the card, the user is allowed access to their bank account. This scheme suffers from a major drawback: only the validity of the combination of a certain possession (the ATM card) and certain knowledge (the password) is verified. The ATM card can be lost or stolen, and the password can be compromised. Thus new verification methods have emerged, where the password has either been replaced by, or used in addition to, biometrics such as the person’s speech, face image or fingerprints. Apart from the ATM example described above, biometrics can be applied to other areas, such as telephone & internet based banking, airline reservations & check-in, as well as forensic work and law enforcement applications. Biometric systems based on face images and/or speech signals have been shown to be quite effective. However, their performance easily degrades in the presence of a mismatch between training and testing conditions. For speech based systems this is usually in the form of channel distortion and/or ambient noise; for face based systems it can be in the form of a change in the illumination direction. A system which uses more than one biometric at the same time is known as a multi-modal verification system; it is often comprised of several modality experts and a decision stage. Since a multi-modal system uses complimentary discriminative information, lower error rates can be achieved; moreover, such a system can also be more robust, since the contribution of the modality affected by environmental conditions can be decreased. This thesis makes several contributions aimed at increasing the robustness of single- and multi-modal verification systems. Some of the major contributions are listed below. The robustness of a speech based system to ambient noise is increased by using Maximum Auto-Correlation Value (MACV) features, which utilize information from the source part of the speech signal. A new facial feature extraction technique is proposed (termed DCT-mod2), which utilizes polynomial coefficients derived from 2D Discrete Cosine Transform (DCT) coefficients of spatially neighbouring blocks. The DCT-mod2 features are shown to be robust to an illumination direction change as well as being over 80 times quicker to compute than 2D Gabor wavelet derived features. The fragility of Principal Component Analysis (PCA) derived features to an illumination direction change is solved by introducing a pre-processing step utilizing the DCT-mod2 feature extraction. We show that the enhanced PCA technique retains all the positive aspects of traditional PCA (that is, robustness to compression artefacts and white Gaussian noise) while also being robust to the illumination direction change. Several new methods, for use in fusion of speech and face information under noisy conditions, are proposed; these include a weight adjustment procedure, which explicitly measures the quality of the speech signal, and a decision stage comprised of a structurally noise resistant piece-wise linear classifier, which attempts to minimize the effects of noisy conditions via structural constraints on the decision boundary.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Microelectronic Engineering
Full Text
Style APA, Harvard, Vancouver, ISO itp.
18

Maime, Ratakane Baptista. "CHALLENGES AND OPPORTUNITIES OF ADOPTING MANAGEMENT INFORMATION SYSTEMS (MIS) FOR PASSPORT PROCESSING: COMPARATIVE STUDY BETWEEN LESOTHO AND SOUTH AFRICA". Thesis, Central University of Technology, Free State. Business Administration, 2014. http://hdl.handle.net/11462/237.

Pełny tekst źródła
Streszczenie:
Thesis ( M. Tech. (Business Administration )) - Central University of Technology, Free State, 2014
Fast and secure public service delivery is not only a necessity, but a compulsory endeavour. However, it is close to impossible to achieve such objectives without the use of Information Technology (IT). It is correspondingly important to find proper sustainability frameworks of technology. Organisations do not only need technology for efficient public service; the constant upgrading of systems and cautious migration to the newest IT developments is also equally indispensable in today’s dynamic technological world. Conversely, countries in Africa are always lagging behind in technological progresses. Such deficiencies have been identified in the passport processing of Lesotho and South Africa, where to unequal extents, problems related to systems of passport production have contributed to delays and have become fertile grounds for corrupt practices. The study seeks to identify the main impediments in the adoption of Management Information Systems (MIS) for passport processing. Furthermore, the study explores the impact MIS might have in attempting to combat long queues and to avoid long waiting periods – from application to issuance of passports to citizens. The reasonable time frame between passport application and issuance, and specific passport management systems, have been extensively discussed along with various strategies that have been adopted by some of the world’s first movers in modern passport management technologies. In all cases and stages of this research, Lesotho and South Africa are compared. The research approach of the study was descriptive and explorative in nature. As a quantitative design, a structured questionnaire was used to solicit responses in Lesotho and South Africa. It was established that both Lesotho and South Africa have somewhat similar problems – although, to a greater extent, Lesotho needs much more urgent attention. Although the processes of South Africa need to be improved, the Republic releases a passport much faster and more efficiently than Lesotho. Economic issues are also revealed by the study as unavoidable factors that always affect technological developments in Africa. The study reveals that the latest MIS for passport processing has facilitated modern, automated border-control systems and resultant e-passports that incorporate more biometric information of citizens to passports – thanks to modern RFID technologies. One can anticipate that this study will provide simple, affordable and secure IT solutions for passport processing. Key words: Information Technology (IT); Management Information Systems (MIS); E-Government; E-Passport; Biometrics; and RFID.
Style APA, Harvard, Vancouver, ISO itp.
19

Gibavičius, Darius. "Genetinių algoritmų taikymas biometrijoje". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100617_141716-09318.

Pełny tekst źródła
Streszczenie:
Baigiamajame magistro darbe nagrinėjamas genetinių algoritmų taikymas biometrijoje. Išnagrinėta plačiausiai naudojama biometrinė informacija, aprašytos labiausiai paplitusios biometrinės sistemos, genetiniai algoritmai bei jų pritaikymas biometrinių sistemų optimizavimui. Baigiamajame darbe pasiūlytas naujas rankos atpažinimo metodas. Šiam metodui pritaikyti genetiniai algoritmai. Darbą sudaro 7 dalys: įvadas, biometrija, genetiniai algoritmai, genetinių algoritmų taikymas biometrinėse sistemose, genetinių algoritmų taikymas rankos atpažinimui, išvados ir literatūra. Darbo apimtis – 51 p. teksto be priedų, 30 pav., 4 lent., 32 bibliografiniai šaltiniai.
In the graduation thesis to receive the master‘s degree the application of genetic algorithms in biometrics is analysed. The most widely used biometric information have been examined, the most common biometric systems, genetic algorithms and their customization in biometric systems optimization have been described. A new method is proposed for hand recognition. Genetic algorithms have been customized for this method. Structure: introduction, biometry, genetic algorithms, application of genetic algorithms in biometric systems, application of genetic algorithms for hand recognition, the conclusions and bibliography. Thesis consist of: 51 p. text without appendixes, 30 pictures, 4 tables, 32 bibliographical entries.
Style APA, Harvard, Vancouver, ISO itp.
20

Martins, Samuel Botter 1990. "A fast and robust negative mining approach for user enrollment in face recognition systems = Uma abordagem eficiente e robusta de mineração de negativos para cadastramento de novos usuários em sistemas de reconhecimento facial". [s.n.], 2015. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275553.

Pełny tekst źródła
Streszczenie:
Orientadores: Alexandre Xavier Falcão, Giovani Chiachia
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-27T14:41:07Z (GMT). No. of bitstreams: 1 Martins_SamuelBotter_M.pdf: 4782261 bytes, checksum: 63cd58756e3fe70ffe625d42974b1a78 (MD5) Previous issue date: 2015
Resumo: Sistemas automáticos de reconhecimento de faces tem atraído a atenção da indústria e da academia, devido à gama de possíveis aplicações, tais como vigilância, controle de acesso, etc. O recente progresso em tais sistemas motiva o uso de técnicas de aprendizado em profundidade e classificadores específicos para cada usuário em cenários de operação não-controlado, que apresentam variações consideráveis em pose, iluminação, etc. Sistemas automáticos de reconhecimento de faces possibilitam construir bases de imagens anotadas por meio do processo de cadastramento de novos usuários. Porém, à medida que as bases de dados crescem, torna-se crucial reduzir o número de amostras negativas usadas para treinar classificadores específicos para cada usuário, devido às limitações de processamento e tempo de resposta. Tal processo de aprendizado discriminativo durante o cadastramento de novos indivíduos tem implicações no projeto de sistemas de reconhecimento de faces. Apesar deste processo poder aumentar o desempenho do reconhecimento, ele também pode afetar a velocidade do cadastramento, prejudicando, assim, a experiência do usuário. Neste cenário, é importante selecionar as amostras mais informativas buscando maximizar o desempenho do classificador. Este trabalho resolve tal problema propondo um método de aprendizado discriminativo durante o cadastramento de usuários com o objetivo de não afetar a velocidade e a confiabilidade do processo. Nossa solução combina representações de alta dimensão com um algoritmo que rapidamente minera imagens faciais negativas de um conjunto de minerção grande para assim construir um classificador específico para cada usuário, baseado em máquinas de vetores de suporte. O algoritmo mostrou ser robusto em construir pequenos e eficazes conjuntos de treinamento com as amostras negativas mais informativas para cada indivíduo. Avaliamos nosso método em duas bases contendo imagens de faces obtidas no cenário de operação não-controlado, chamadas PubFig83 e Mobio, e mostramos que nossa abordagem é capaz de alcançar um desempenho superior em tempos interativos, quando comparada com outras cinco abordagens consideradas. Os resultados indicam que o nosso método tem potencial para ser explorado pela indústria com mínimo impacto na experiência do usuário. Além disso, o algoritmo é independente de aplicação, podendo ser uma contribuição relevante para sistemas biométricos que visam manter a robustez à medida que o número de usuários aumenta
Abstract: Automatic face recognition has attracted considerable attention from the industry and academy due to its wide range of applications, such as video surveillance, access control, online transactions, suspect identification, etc. The recent progress in face recognition systems motivates the use of deep learning techniques and user-specific face representation and classification models for unconstrained scenarios, which present considerable variations in pose, face appearance, illumination, etc. Automatic face recognition systems make possible to build annotated face datasets through user enrollment. However, as the face datasets grow, it becomes crucial to reduce the number of negative samples used to train user-specific classifiers, due to processing constraints and responsiveness. Such a discriminative learning process during the enrollment of new individuals has implications in the design of face recognition systems. Even though it might increase recognition performance, it may affect the speed of the enrollment, which in turn may affect the user experience. In this scenario, it is important to select the most informative samples in order to maximize the performance of the classifier. This work addresses this problem by proposing a discriminative learning method during user enrollment with the challenges of not negatively affecting the speed and reliability of the process, and so the user experience. Our solution combines high-dimensional representations from deep learning with an algorithm for rapidly mining negative face images from a large mining set to build an effective classification model based on linear support vector machines for each specific user. The negative mining algorithm has shown to be robust in building small and effective training sets with the most informative negative samples for each given individual. We evaluate our approach on two unconstrained datasets, namely PubFig83 and Mobio, and show that it is able to attain superior performance, within interactive response times, as compared to five other baseline approaches that use the same classification scheme. The results indicate that our approach has potential to be exploited by the industry with minimum impact to the user experience. Moreover, the algorithm is application-independent. Hence, it may be a relevant contribution for biometric systems that aim to maintain robustness as the number of users increases
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Style APA, Harvard, Vancouver, ISO itp.
21

Hasegawa, Robert Shigehisa. "Using synthetic images to improve iris biometric performance". Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/827.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Clarke, Dalton H., i W. Tracy Young. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database". Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4607.

Pełny tekst źródła
Streszczenie:
Approved for public release, distribution unlimited
The Defense Manpower Data Center (DMDC) manages the Defense Biometric Identification System (DBIDS). DBIDS captures personal and biometric information to manage DoD-wide access, control, and personnel accountability. DBIDS equipment is installed globally, and managed by a central office on the Monterey peninsula. Program managers track data about the numbers and type of equipment installed at each site. Program managers were tracking DBIDS data using a single Microsoft Excel workbook comprised of several, interlinking worksheets (DBIDS Master Plan Spreadsheet). Data updates were error-prone and difficult, requiring close coordination to keep the number of "current" versions of the spreadsheet to a minimum. This thesis initially focused on reviewing the business rules and processes surrounding DBIDS document, and then transitioned into designing, developing, and implementing of a relational database solution to improve problem areas identified during the initial review. After implementation of the database, this thesis explored the effects of making such a change within an organization. This was attempted by identifying and measuring changes in performance and accuracy of the system; by measuring pre- and post-user satisfaction through the qualitative methods of questionnaires and interviews; and finally using this analysis to improve the project through maintenance and growth iterations.
Style APA, Harvard, Vancouver, ISO itp.
23

Young, W. Tracy Clarke Dalton H. "Reengineering of the Defense Biometric Identification System (DBIDS) equipment tracking database". Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FYoung.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Pfeiffer, Karl D. "September 2009." Description based on title screen as viewed on 6 November, 2009. Author(s) subject terms: Database, Database Development Life Cycle, Rapid Prototyping, Business Process Management Software, Business Process Improvement, Business Process Redesign. Includes bibliographical references (p. 63-65). Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
24

Meuth, Lotte. "Zulässigkeit von Identitätsfeststellungen mittels biometrischer Systeme durch öffentliche Stellen /". Berlin : Duncker & Humblot, 2006. http://www.gbv.de/dms/ilmenau/toc/505963787.PDF.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection". HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.

Pełny tekst źródła
Streszczenie:
Biometric systems are being increasingly used, from daily entertainment to critical applications such as security access and identity management. It is known that biometric systems should meet the stringent requirement of low error rate. In addition, for critical applications, the security and privacy issues of biometric systems are required to be concerned. Otherwise, severe consequence such as the unauthorized access (security) or the exposure of identity-related information (privacy) can be caused. Therefore, it is imperative to study the vulnerability to potential attacks and identify the corresponding risks. Furthermore, the countermeasures should also be devised and patched on the systems. In this thesis, we study the security and privacy issues in biometric systems. We first make an attempt to reconstruct raw biometric data from biometric templates and demonstrate the security and privacy issues caused by the data reconstruction. Then, we make two attempts to protect biometric templates from being reconstructed and improve the state-of-the-art biometric template protection techniques.
Style APA, Harvard, Vancouver, ISO itp.
26

Nwatu, Gideon U. "Biometrics Technology: Understanding Dynamics Influencing Adoption for Control of Identification Deception Within Nigeria". ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/921.

Pełny tekst źródła
Streszczenie:
One of the objectives of any government is the establishment of an effective solution to significantly control crime. Identity fraud in Nigeria has generated global attention and negative publicity toward its citizens. The research problem addressed in this study was the lack of understanding of the dynamics that influenced the adoption and usability of biometrics technology for reliable identification and authentication to control identity deception. The support for this study was found in the theoretical framework of the technology acceptance model (TAM). The purpose of the study was to provide scholarly research about the factors that influenced the adoption of biometrics technology to reliably identify and verify individuals in Nigeria to control identity fraud. The mixed-method descriptive and inferential study used interview and survey questionnaires for data collection. The binary logistic regression, point bi-serial correlation, independent samples t test, and content analyses were performed using SPSS version 18, Microsoft Excel spreadsheet 2007, and Nvivo 7.0 software. The results from the findings indicated statistical correlation between adopt biometrics technology and three other variables, ease of use (r = .38, n = 120, p <.01), perceived usefulness (ri = .41, n = 120, p < .01), and awareness (ri = .33, ni = 120, p < .01). The implications for social change include leveraging biometrics technology for recognition, confirmation, and accountability of individuals to prevent identity scheming, ensure security, and control the propagation of personal information. Beyond these immediate benefits, this research presents an example that other developing countries may use to facilitate the adoption of biometrics technology.
Style APA, Harvard, Vancouver, ISO itp.
27

Edmunds, Taiamiti. "Protection of 2D face identification systems against spoofing attacks". Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT007/document.

Pełny tekst źródła
Streszczenie:
Les systèmes d’identification faciale sont en plein essor et se retrouvent de plus en plus dans des produits grand public tels que les smartphones et les ordinateurs portables. Cependant, ces systèmes peuvent être facilement bernés par la présentation par exemple d’une photo imprimée de la personne ayant les droits d’accès au système. Cette thèse s’inscrit dans le cadre du projet ANR BIOFENCE qui vise à développer une certification des systèmes biométriques veine, iris et visage permettant aux industriels de faire valoir leurs innovations en termes de protection. L’objectif de cette thèse est double, d’abord il s’agit de développer des mesures de protection des systèmes 2D d’identification faciale vis à vis des attaques connues à ce jour (photos imprimées, photos ou vidéos sur un écran, masques) puis de les confronter à la méthodologie de certification développée au sein du projet ANR. Dans un premier temps, un état de l’art général des attaques et des contremesures est présenté en mettant en avant les méthodes algorithmiques (« software ») par rapport aux méthodes hardware. Ensuite, plusieurs axes sont approfondis au cours de ce travail. Le premier concerne le développement d’une contremesure basée sur une analyse de texture et le second concerne le développement d’une contre-mesure basée sur une analyse de mouvement. Ensuite, une modélisation du processus de recapture pour différencier un faux visage d’un vrai est proposée. Une nouvelle méthode de protection est développée sur ce concept en utilisant les données d'enrolment des utilisateurs et un premier pas est franchi dans la synthèse d'attaque pour un nouvel utilisateur à partir de sa donnée d'enrolment. Enfin, la méthodologie de certification développée pour les systèmes à empreintes digitales est évaluée pour les systèmes d'identification facial
Face identification systems are growing rapidly and invade the consumer market with security products in smartphones, computers and banking. However, these systems are easily fooled by presenting a picture of the person having legitimate access to the system. This thesis is part of the BIOFENCE project which aim to develop a certification of biometric systems in order for industrials to promote their innovations in terms of protection. Our goal is to develop new anti-spoofing countermeasures for 2D face biometric systems and to evaluate the certification methodology on protected systems. First, a general state of the art in face spoofing attack forgery and in anti-spoofing protection measures is presented. Then texture-based countermeasures and motion-based countermeasures are investigated leading to the development of two novel countermeasures. Then, the recapturing process is modelled and a new fake face detection approach is proposed based on this model. Taking advantage of enrolment samples from valid users, a first step toward the synthesis of spoofing attacks for new users is taken. Finally, the certification methodology originally developed for fingerprint technology is evaluated on face biometric systems
Style APA, Harvard, Vancouver, ISO itp.
28

Li, Jiawei. "Person re-identification with limited labeled training data". HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/541.

Pełny tekst źródła
Streszczenie:
With the growing installation of surveillance video cameras in both private and public areas, it is an immediate requirement to develop intelligent video analysis system for the large-scale camera network. As a prerequisite step of person tracking and person retrieval in intelligent video analysis, person re-identification, which targets in matching person images across camera views is an important topic in computer vision community and has been received increasing attention in the recent years. In the supervised learning methods, the person re-identification task is formulated as a classification problem to extract matched person images/videos (positives) from unmatched person images/videos (negatives). Although the state-of-the-art supervised classification models could achieve encouraging re-identification performance, the assumption that label information is available for all the cameras, is impractical in large-scale camera network. That is because collecting the label information of every training subject from every camera in the large-scale network can be extremely time-consuming and expensive. While the unsupervised learning methods are flexible, their performance is typically weaker than the supervised ones. Though sufficient labels of the training subjects are not available from all the camera views, it is still reasonable to collect sufficient labels from a pair of camera views in the camera network or a few labeled data from each camera pair. Along this direction, we address two scenarios of person re-identification in large-scale camera network in this thesis, i.e. unsupervised domain adaptation and semi-supervised learning and proposed three methods to learn discriminative model using all available label information and domain knowledge in person re-identification. In the unsupervised domain adaptation scenario, we consider data with sufficient labels as the source domain, while data from the camera pair missing label information as the target domain. A novel domain adaptive approach is proposed to estimate the target label information and incorporate the labeled data from source domain with the estimated target label information for discriminative learning. Since the discriminative constraint of Support Vector Machines (SVM) can be relaxed into a necessary condition, which only relies on the mean of positive pairs (positive mean), a suboptimal classification model learning without target positive data can be those using target positive mean. A reliable positive mean estimation is given by using both the labeled data from the source domain and potential positive data selected from the unlabeled data in the target domain. An Adaptive Ranking Support Vector Machines (AdaRSVM) method is also proposed to improve the discriminability of the suboptimal mean based SVM model using source labeled data. Experimental results demonstrate the effectiveness of the proposed method. Different from the AdaRSVM method that using source labeled data, we can also improve the above mean based method by adapting it onto target unlabeled data. In more general situation, we improve a pre-learned classifier by adapting it onto target unlabeled data, where the pre-learned classifier can be domain adaptive or learned from only source labeled data. Since it is difficult to estimate positives from the imbalanced target unlabeled data, we propose to alternatively estimate positive neighbors which refer to data close to any true target positive. An optimization problem for positive neighbor estimation from unlabeled data is derived and solved by aligning the cross-person score distributions together with optimizing for multiple graphs based label propagation. To utilize the positive neighbors to learn discriminative classification model, a reliable multiple region metric learning method is proposed to learn a target adaptive metric using regularized affine hulls of positive neighbors as positive regions. Experimental results demonstrate the effectiveness of the proposed method. In the semi-supervised learning scenario, we propose a discriminative feature learning using all available information from the surveillance videos. To enrich the labeled data from target camera pair, image sequences (videos) of the tagged persons are collected from the surveillance videos by human tracking. To extract the discriminative and adaptable video feature representation, we propose to model the intra-view variations by a video variation dictionary and a video level adaptable feature by multiple sources domain adaptation and an adaptability-discriminability fusion. First, a novel video variation dictionary learning is proposed to model the large intra-view variations and solved as a constrained sparse dictionary learning problem. Second, a frame level adaptable feature is generated by multiple sources domain adaptation using the variation modeling. By mining the discriminative information of the frames from the reconstruction error of the variation dictionary, an adaptability-discriminability (AD) fusion is proposed to generate the video level adaptable feature. Experimental results demonstrate the effectiveness of the proposed method.
Style APA, Harvard, Vancouver, ISO itp.
29

Feng, Yicheng. "Template protecting algorithms for face recognition system". HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/832.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Foltýn, Petr. "Návrh a realizace jednotek modulárního přístupového systému". Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-229208.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Louw, Lloyd A. B. "Automated face detection and recognition for a login system". Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/438.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Adumata, Kofi Agyemang. "Analysis of Affective State as Covariate in Human Gait Identification". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4584.

Pełny tekst źródła
Streszczenie:
There is an increased interest in the need for a noninvasive and nonintrusive biometric identification and recognition system such as Automatic Gait Identification (AGI) due to the rise in crime rates in the US, physical assaults, and global terrorism in public places. AGI, a biometric system based on human gait, can recognize people from a distance and current literature shows that AGI has a 95.75% success rate in a closely controlled laboratory environment. Also, this success rate does not take into consideration the effect of covariate factors such as affective state (mood state); and literature shows that there is a lack of understanding of the effect of affective state on gait biometrics. The purpose of this study was to determine the percent success rate of AGI in an uncontrolled outdoor environment with affective state as the main variable. Affective state was measured using the Profile of Mood State (POMS) scales. Other covariate factors such as footwear or clothes were not considered in this study. The theoretical framework that grounded this study was Murray's theory of total walking cycle. This study included the gait signature of 24 participants from a population of 62 individuals, sampled based on simple random sampling. This quantitative research used empirical methods and a Fourier Series Analysis. Results showed that AGI has a 75% percent success rate in an uncontrolled outdoor environment with affective state. This study contributes to social change by enhancing an understanding of the effect of affective state on gait biometrics for positive identification during and after a crime such as bank robbery when the use of facial identification from a surveillance camera is either not clear or not possible. This may also be used in other countries to detect suicide bombers from a distance.
Style APA, Harvard, Vancouver, ISO itp.
33

Sandström, Marie. "Liveness Detection in Fingerprint Recognition Systems". Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2397.

Pełny tekst źródła
Streszczenie:

Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today.

Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live fingers and artificial clones. The first approach is a literature study, while the second consists of experiments.

A literature study of liveness detection in fingerprint recognition systems has been performed. A description of different liveness detection methods is presented and discussed. Methods requiring extra hardware use temperature, pulse, blood pressure, electric resistance, etc., and methods using already existent information in the system use skin deformation, pores, perspiration, etc.

The experiments focus on making artificial fingerprints in gelatin from a latent fingerprint. Nine different systems were tested at the CeBIT trade fair in Germany and all were deceived. Three other different systems were put up against more extensive tests with three different subjects. All systems werecircumvented with all subjects'artificial fingerprints, but with varying results. The results are analyzed and discussed, partly with help of the A/R value defined in this report.

Style APA, Harvard, Vancouver, ISO itp.
34

Öberg, Fredrik. "Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system". Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42294.

Pełny tekst źródła
Streszczenie:
Biometric identification has already been applied to society today, as today’s mobile phones use fingerprints and other methods like iris and the face itself. With growth for technologies like computer vision, the Internet of Things, Artificial Intelligence, The use of face recognition as a biometric identification on ordinary doors has become increasingly common. This thesis studies is looking into the possibility of replacing regular door locks with face recognition or supplement the locks to increase security by using a pre-trained state-of-the-art face recognition method based on a convolution neural network. A subsequent investigation concluded that a networks based face recognition are is highly vulnerable to attacks in the form of presentation attacks. This study investigates protection mechanisms against these forms of attack by developing a presentation attack detection and analyzing its performance. The obtained results from the proof of concept  showed that local binary patterns histograms as a presentation attack detection could help the state of art face recognition to avoid attacks up to 88\% of the attacks the convolution neural network approved without the presentation attack detection. However, to replace traditional locks, more work must be done to detect more attacks in form of both higher percentage of attacks blocked by the system and the types of attack that can be done. Nevertheless, as a supplement face recognition represents a promising technology to supplement traditional door locks, enchaining their security by complementing the authorization with biometric authentication. So the main contributions is that  by using simple older methods LBPH can help modern state of the art face regognition to detect presentation attacks according to the results of the tests. This study also worked to adapt this PAD to be suitable for low end edge devices to be able to adapt in an environment where modern solutions are used, which LBPH have.
Style APA, Harvard, Vancouver, ISO itp.
35

Bartoň, Jaroslav. "Podpora pro autentizaci pomocí otisků prstu". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-235492.

Pełny tekst źródła
Streszczenie:
The goal of the thesis is the finger-print authentication support within the Linux operating system and the K Desktop Environment (KDE). Theoretical part of the thesis firstly explains main IT security terms and ways to proof the identity. Secondly it describes biometric systems and types of processed biometric characteristics. Lastly the features of finger-prints, their markants as well as types of scanners used in scanning the finger-prints and ways to analyze the scanned material have been elaborated. Practical solution part of the thesis develops and establishes finger-print management application and plugin for KDM graphics login manager.
Style APA, Harvard, Vancouver, ISO itp.
36

Mehdi, Ali. "Developing a Computer System for the Generation of Unique Wrinkle Maps for Human Faces. Generating 2D Wrinkle Maps using Various Image Processing Techniques and the Design of 3D Facial Ageing System using 3D Modelling Tools". Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5144.

Pełny tekst źródła
Streszczenie:
Facial Ageing (FA) is a very fundamental issue, as ageing in general, is part of our daily life process. FA is used in security, finding missing children and other applications. It is also a form of Facial Recognition (FR) that helps identifying suspects. FA affects several parts of the human face under the influence of different biological and environmental factors. One of the major facial feature changes that occur as a result of ageing is the appearance and development of wrinkles. Facial wrinkles are skin folds; their shapes and numbers differ from one person to another, therefore, an advantage can be taken over these characteristics if a system is implemented to extract the facial wrinkles in a form of maps. This thesis is presenting a new technique for three-dimensional facial wrinkle pattern information that can also be utilised for biometric applications, which will back up the system for further increase of security. The procedural approaches adopted for investigating this new technique are the extraction of two-dimensional wrinkle maps of frontal human faces for digital images and the design of three-dimensional wrinkle pattern formation system that utilises the generated wrinkle maps. The first approach is carried out using image processing tools so that for any given individual, two wrinkle maps are produced; the first map is in a binary form that shows the positions of the wrinkles on the face while the other map is a coloured version that indicates the different intensities of the wrinkles. The second approach of the 3D system development involves the alignment of the binary wrinkle maps on the corresponding 3D face models, followed by the projection of 3D curves in order to acquire 3D representations of the wrinkles. With the aid of the coloured wrinkle maps as well as some ageing parameters, simulations and predictions for the 3D wrinkles are performed.
Style APA, Harvard, Vancouver, ISO itp.
37

Кондратенко, Н. Р., i О. А. Рудик. "Штучні імунні системи та їх використання для вирішення різних типів задач". Thesis, ВНТУ, 2019. http://ir.lib.vntu.edu.ua//handle/123456789/24236.

Pełny tekst źródła
Streszczenie:
У доповіді описано принцип роботи штучної імунної системи. Також розглянуто класи задач для рішення яких можуть бути використані відповідні системи задля обґрунтування доцільності використання штучної імунної системи для подальшої розробки засобу біометричної системи ідентифікації по особливостям клавіатурного почерку .
The article describes the principle of the artificial immune system. Also, classes of problems for the solution of which the appropriate systems can be used to justify the feasibility of using an artificial immune system for further development of a means of biometric identification system on the features of keyboard writing.
Style APA, Harvard, Vancouver, ISO itp.
38

Яремко, Олег Ігорович, Oleg Yaremko, Василь Геннадійович Ткачук i Vasyl Tkachuk. "Розробка та дослідження автоматизованої системи для підвищення якості ідентифікації при дактилоскопії". Master's thesis, Тернопіль, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36510.

Pełny tekst źródła
Streszczenie:
Роботу виконано на кафедрі ком’пютерно-інтегрованих технологій Тернопільського національного технічного університету імені Івана Пулюя Міністерства освіти і науки України Захист відбудеться 21 грудня 2021 р. о 09 .00 годині на засіданні екзаменаційної комісії № 24 у Тернопільському національному технічному університеті імені Івана Пулюя за адресою: 46001, м. Тернопіль, вул.Руська, 56, навчальний корпус №1, ауд. 403
В результаті проведеної роботи проаналізовано основні параметри та фактори, що впливають на якість ідентифікації під час дактилоскопії. Метою було створити прототип системи розпізнавання біо-відбитків пальців на основі нечіткої логіки та вивчити якість цього алгоритму порівняно з іншими методами в цій галузі.As a result of this work, the main parameters and factors influencing the quality of identification during fingerprinting are analyzed. The aim was to create a prototype of a fingerprint bio-fingerprint recognition system based on fuzzy logic and to study the quality of this algorithm compared to other methods in this field
ЗМIСТ ВСТУП 6 1. АНАЛIТИЧНА ЧАСТИНА 10 1.1. Біометричні системи 10 1.2 Нечітка логіка 12 2. ТЕХНОЛОГIЧНА ЧАСТИНА 15 2.1 Система розпізнавання відбитків пальців 15 2.2 Вимір якості відбитків пальців 16 2.3 Оцінка якості відбитку 17 2.4 Оцінка сходження двох відбитків 18 3 КОНСТРУКТОРСЬКА ЧАСТИНА 20 3.1. Система підтримки прийняття рішень з використанням нечіткої логіки 20 3.2 Застосування правил 24 3.3 Аналіз і порівняння 26 4 НАУКОВО-ДОСЛIДНИЦЬКА 29 4.1 Детектор кордонів Кенні 29 4.2 Подвійна фільтрація 31 4.3 Метод Віоли-Джонса 33 4.3 Ознаки Хаара 36 5. СПЕЦIАЛЬНА ЧАСТИНА 41 5.1. Алгоритм NFIQ 41 5.2 Помилки FMR, FNMR та EER. 42 5.3 Метод визначення якісних областей відбитків пальців 44 5.4 Зіставлення відбитків пальців за допомогою MCC SDK 49 6 ОХОРОНА ПРАЦI ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦIЯХ 53 6.1 Органiзацiя охорони працi при роботi з системою управлiння 53 6.2 Електробезпека 55 6.3 Розрахунок заземлення 58 ОСНОВНI ВИСНОВКИ ДИПЛОМНОЇ РОБОТИ 62 БIБЛIОГРАФIЯ 63 Додаток 65
Style APA, Harvard, Vancouver, ISO itp.
39

Cerda, III Cruz. "Medical Identity Theft and Palm Vein Authentication: The Healthcare Manager's Perspective". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4778.

Pełny tekst źródła
Streszczenie:
The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The research questions were designed to investigate the relationship between intention to adopt palm vein authentication technology and perceived usefulness, complexity, security, peer influence, and relative advantage. The unified theory of acceptance and use of technology was the theoretical basis for this quantitative study. Data were gathered through an anonymous online survey of 109 healthcare managers and doctors, and analyzed using principal axis factoring, Pearson's product moment correlation, multiple linear regression, and 1-way analysis of variance. The results of the study showed a statistically significant positive correlation between perceived usefulness, security, peer influence, relative advantage, and intention to adopt palm vein authentication. No statistically significant correlation existed between complexity and intention to adopt palm vein authentication. These findings indicate that by effectively using palm vein authentication, organizations can mitigate the risk of medical fraud and its associated costs, and positive social change can be realized.
Style APA, Harvard, Vancouver, ISO itp.
40

El, Khoury Franjieh. "Modélisation de la sécurisation d’accès aux réseaux par la technique de cryptographie asymétrique en utilisant la reconnaissance de l’iris et la technologie des agents". Thesis, Lyon 1, 2009. http://www.theses.fr/2009LYO10308.

Pełny tekst źródła
Streszczenie:
La croissance exponentielle dans l’utilisation du réseau Internet ainsi que l’apparition de nouveaux types d’applications ont augmenté les contraintes du réseau en termes de sécurité. Depuis quelques années, les techniques biométriques ont prouvé une grande précision et fiabilité et ont été utilisées dans plusieurs domaines afin de sécuriser l’accès à différentes ressources. Des solutions intégrant des agents et des systèmes multi-agents (SMA) ont aussi prouvé leur efficacité pour la résolution de nombreux problèmes dans les réeaux. Nous proposons un modèle « IrisCrptoAgentSystem » (ICAS) basé sur la méthode biométrique pour l’authentification utilisant l’iris de l’œil et la méthode de cryptographie asymétrique utilisant l’algorithme « Rivest-Shamir-Adleman » (RSA), et en intégrant des agents. Ce modèle doit assurer un accès sécurisé aux informations et garantir la protection des informations confidentielles. Notre travail porte sur la mise en place de nouvelles méthodes dans le modèle d’authentification biométrique afin de donner plus d’efficacité à notre modèle ICAS. Nous introduisons des aspects prétopologiques dans l’élaboration de la hiérarchie indexée pour classer les gabarits DHVA. Notre approche consiste à améliorer les méthodes relatives à la localisation des contours externe et interne de l’iris
The exponential growth in the use of the Internet as well as the emergence of new types of applications has increased the network’s constraints in terms f security. Fort the last several years, biometric techniques have proven their applicability and reliability in providing secure access to shared resources in different domains. Furthermore, software agents and multi-agent systems (MAS) have evidently been efficient in resolving several problems in network. Therefore, the aim of this research is to propose a model “IrisCryptoAgentSystem” (ICAS) that is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using “Rivest-Shamir-Adleman” (RSA) in an agent-based architecture. This model should provide secure access to information and ensure the protection of confidential information. Therefore, our work focuses on the development of new methods in biometric autheitcation in order to provide greater efficiency in the ICAS model. We introduce pretopological aspects in the development of the indexed hierarchy to classify DHVA templates. Our approach aims to improve the existing methods for the localization of the external and the internal edges of the iris
Style APA, Harvard, Vancouver, ISO itp.
41

Хома, Юрій Володимирович. "Теорія і методи комп’ютерного опрацювання біосигналів на основі машинного навчання". Diss., Національний університет "Львівська політехніка", 2020. https://ena.lpnu.ua/handle/ntb/56149.

Pełny tekst źródła
Streszczenie:
У дисертаційній роботі вирішено актуальну науково-прикладну проблему у галузі інструментального забезпечення біоінформатики – розвиток теоретичних засад і нових підходів до удосконалення комп’ютерних систем опрацювання біосигналів на основі широкого використання штучних нейромереж і технологій глибинного навчання. Представлено концепцію трьох системних рівнів комп’ютерного опрацювання біосигналів, що базується на чіткому розмежуванні функцій системних рівнів від методів і засобів, що їх реалізують. Таке розділення сприяє структуризації знань, уможливлює оцінювання ефективності різних методів і вибір кращих проектних рішень із урахуванням специфіки завдань, умов і сценаріїв. Автоматизовано пошук оптимальних значень гіперпараметрів багатошарового нейрокласифікатора шляхом використання простої прогностичної моделі машинного навчання. Це дає змогу на 4 порядки скоротити час пошуку порівняно із повним перебором в просторі можливих значень. Розроблено і апробовано підхід до виявлення і коригування залишкових аномалій в біосигналах, який базується на застосуванні нейромережевих автоенкодерів для нелінійної фільтрації завад, зосереджених в тій самій частині спектру, що й корисний сигнал. Застосування підходу у 5-7 разів зменшує похибку ідентифікації. Результати роботи можуть бути застосовані до різних прикладних задач, у таких сферах як кібербезпека та системи доступу (біометрична ідентифікація), робототехніка (нейромережеві інтерфейси управління) і афективна інформатика (аналіз психоемоційного стану), а також у медицині (діагностика, клінічні дослідження тощо). В диссертационной работе решена актуальная научно-прикладная проблема в области инструментального обеспечения биоинформатики - развитие теоретических основ и новых подходов к совершенствованию компьютерных систем обработки биосигналов на основе широкого использования искусственных нейронных сетей и технологий глубинного обучения. Представлена концепция трех системных уровней компьютерной обработки биосигналов, основанная на четком разграничении функций системных уровней от методов и средств, которые используются для их реализации. Такое разделение способствует структуризации знаний, позволяет оценить эффективность различных методов и выбрать лучшие проектные решения с учетом специфики задач, условий и сценариев. Автоматизирован поиск оптимальных значений гиперпараметров многослойного нейроклассификатора путем использования простой прогностической модели машинного обучения. Это позволяет на 4 порядка сократить время поиска по сравнению с полным перебором в пространстве всех возможных значений. Разработан и апробирован подход к выявлению и коррекции остаточных аномалий в биосигналах, основанный на применении нейросетевых автоэнкодеров для нелинейной фильтрации помех, сосредоточенных в той же части спектра, и полезный сигнал. Применение коррекции аномалий в 5-7 раз уменьшает погрешность идентификации. Результаты работы могут быть применены в различных направлениях, таких как компьютерная безопасность и системы доступа (биометрическая идентификация), робототехника (нейросетевые интерфейсы управления) и аффективная информатика (анализ психоэмоционального состояния), а также в медицине (диагностика, клинические исследования и т.п.). The thesis solves a scientific problem in the field of instrumental support of bioinformatics - the development of theoretical foundations, improvement of methodological, algorithmic, software, and technical basis of the computer systems for processing of biosignals and data based on the extensive use of artificial neural networks and deep learning technologies. Current state and future perspectives of machine learning usage in the computer bioinformatics systems are analyzed in the thesis. It is shown that the heterogeneousness of data and a wide range of bioinformatics tasks influenced the development of specialized solutions for each separate domain or application. This complicates the possibility to compare the effectiveness of certain methods as well as the usage of the best system design variants for the new tasks. A novel framework related to the development of principles for the design of the biosignals computer processing systems involving a combination of machine learning techniques and digital signal processing is presented in the thesis. The expediency of separation of the system levels within the process of biosignals processing is reasoned, and their functions are outlined. Innovativeness of the suggested approach lies in the separation of functions of the lower, middle, and upper levels from methods with the help of which they are realized, as well as from the implementation variants for these methods based on the hardware and software components. The middle system level is significantly invariable both in regards to the task to be solved and to the biosignal type. At the same time, the upper level is specific as to the final application, and the lower level is specific as to the type of biosignal. Distinct outlining of functions for each system level and the inter-level interfaces opens perspectives for information structuring during the analysis of the known decisions, which simplifies the analysis and comparison of the effectiveness of these solutions. The design process of the computer system for the specific tasks gets simplified and potentially quickens due to the possibility of transferring the best results among the related tasks. On the basis of the developed three system levels concept the range of tasks related to machine learning application and biosignals processing on all the system levels was studied and analyzed. A novel method of optimal hyperparameters selection for a multilayer neural network classifier based on the Monte Carlo method and predictive modeling was developed and introduced in the thesis, new algorithms for detection and correction of anomalies in ECG-signals were presented as well. This resulted in reduction of hyperparameters optimization time by 4 orders compared to a grid search approach in the entire hyperspace of possible values. A new approach to the detection and correction of residual anomalies in biosignals was developed and tested. This approach is based on the use of neural network autoencoders for nonlinear filtering of distortions that are located in the same spectral band as the useful signal and its application reduces identification error by 5-7 times. A method of software conditioning of biosignals was developed, which enabled parameters unification of digital records of biosignals from open databases by resampling, rescaling, time normalization, etc. and its application improves the issue of low data volume while deep neural networks training. A comprehensive study of the influence of the variability of ECG signal acquisition systems (different data sets, sampling frequency, recording duration, data volume) on the accuracy of biometric identification was performed. The obtained results proved sufficient stability and reliability of the electrocardiogram as a biometric marker and confirmed the possibility of its real-world application in biometric identification systems. Neural network equalizer was designed for dynamical error correction of bioimpedance sensors, which resulted in expanding the operating frequency band up to 100 times. Functionality was expanded, metrological characteristics were improved and the speed of the digital rheograph was doubled by improving the Howland current pump by compensating the basic bioimpedance with a coded potentiometer (trimmer) and using a direct digital synthesis of orthogonal probing signals. Intelligent processing of vibroarthrography signals based on a combination of machine learning algorithms and wavelet decomposition was developed, which allowed to achieve better accuracy in terms of knee joint disorders analysis. The results of the work can be used in various applications, such as cybersecurity and access systems (biometric identification), robotics (bio-machine control interfaces), and affective informatics (psycho-emotional state analysis), as well as a medical domain (diagnostics, clinical trials).
Style APA, Harvard, Vancouver, ISO itp.
42

Du, Preez Johan Frederik. "Liveness assurance in biometric systems". Thesis, 2008. http://hdl.handle.net/10210/362.

Pełny tekst źródła
Streszczenie:
The need for a more secure cyber future is apparent in the information age that we live in. Information is fast becoming, and already is, one of the biggest assets in all domains of life. Access to information and specifically personal information must be regulated and secured in a trusted way. The use of passwords and tokens (example: bank card) that’s currently the most popular and well known mechanism for electronic identification can only identify the password or token but NOT the physical user using the password or token for identification. Biometrics addresses the above issue by being part of the physical user. For example: your fingerprint, retina or iris. Current biometric technologies provide an enabling medium to help with more accurate identification and verification. Thereby protecting and securing electronic information…BUT: One of the biggest problem areas surrounding biometrics is the fact that most biometric tokens (fingerprints, hand geometry and the human eye) can be used in some cases to identify the owner of the biometric token even after death as if the owner was still alive. The problem becomes apparent in the case of a person that passed away and the possibility of using the biometric tokens of the deceased to obtain access to his/her bank account. Therefore the importance of effective liveness testing is highlighted. Current liveness testing technologies can not be trusted in a way that would be necessary to provide the trust needed in the example of access to a personal bank account at an ATM (automatic teller machine). This dissertation reports on the initial stages of a research project that addresses the above problem by proposing the use of biometric tokens that doesn’t exist if the owner is not alive, thus the dissertation coins the new term – Inherent Liveness Biometrics. The way the human heart beats as a biometric token to identify or verify a person, might solve the issue of liveness testing, because “The way the human heart beats” might prove to be a natural biometric token that is only valid for a living person, thus an inherent liveness biometric.
Prof. S.H. Von Solms
Style APA, Harvard, Vancouver, ISO itp.
43

Fang, Jian-Shuen, i 方建舜. "Pyroelectric Infrared Biometric Systems for Real-Time Human Identification". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/13781066981337490131.

Pełny tekst źródła
Streszczenie:
博士
國立交通大學
光電工程系所
95
In this study, we proposed novel designs for computational systems that use biometrics and non-conventional imaging approaches to capture thermal motion features of humans to achieve real-time path-dependent and path-independent gait for human identification. Feature representation is key to biometric recognition system. From a thermal perspective, each person represents a distributed infrared source, the distribution function of which is determined by shape and IR emissivity of the skin at every point. When humans walk, the motion of various parts of the body, including the torso, arms, and legs, produces a characteristic signature. Combined with idiosyncrasies of carriage, heat will uniquely impact a surrounding sensor field, even while the subject follows a prescribed path. The pyroelectric infrared (PIR) sensor is a high performance IR radiation detector and its low cost and low power consumption make it attractive for a wide range of applications. When the temperature changes, electric charge will built up on the sensing element by virtue of pyroelectricity. The resulting charge translated into a current that a current-to-voltage transductance amplifier converted to a voltage signal. By measuring the sensor response generated by a person walking within the field of view of a PIR sensor module, we can model this response data to a code vector that uniquely identifies the person. We have developed two PIR feature-generating sensor systems. One system is analog, the other digital, and both are derived from the signals generated by humans crossing the detection areas. We successfully demonstrate that by selecting suitable sensor configurations and feature extraction/training algorithms, the sensor systems are capable of performing human identification.
Style APA, Harvard, Vancouver, ISO itp.
44

"BioVault : a protocol to prevent replay in biometric systems". Thesis, 2014. http://hdl.handle.net/10210/12321.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Makinana, Sisanda. "Iris image quality assessment for online biometrics systems". Thesis, 2014. http://hdl.handle.net/10210/12396.

Pełny tekst źródła
Streszczenie:
M.Ing. (Electrical And Electronic Engineering)
Iris recognition systems have attracted much attention for their uniqueness, stability and reliability. This recognition system is composed of four main modules, namely, iris acquisition, iris segmentation, feature extraction and encoding and - nally iris matching. However, performance of this system is a ected by poor image quality. In this research, a novel iris image quality assessment method based on character component is presented. This method is composed of two steps, individual assessment of character quality parameters and fusion of estimated quality parameters using Principal Component Analysis (PCA). The de ned quality parameters considered in this research are entropy, sharpness, occlusion, dilation, area ratio, contrast and blur. The designed technique was tested on three databases: Chinese Academy of Science Institute of Automation (CASIA), University of Beira Interior (UBIRIS) and Internal Collection (IC). Individual assessment of quality parameters has shown that dilation, sharpness and blur have more in uence on the quality score than the other parameters. The images were classi ed into two categories (good and bad) by human visual inspection. The e ect of the individual parameters on each database is illustrated, with CASIA exhibiting higher quality scores than the UBIRIS and IC databases. Support Vector Machine (SVM) and Linear Discriminant Analysis (LDA) were used to evaluate the performance of the proposed quality assessment algorithm. A k-fold cross validation technique was employed to the classi ers to obtain unbiased results. Two performance measures were used to rate the proposed algorithm, namely, Correct Rate (CR) and Area Under the Curve (AUC). Both performance measures showed that SVM classi er outperforms LDA in correctly classifying the quality of the images in all three databases. The experimental results demonstrated that the proposed algorithm is capable of detecting poor quality images as it yields an e ciency of over 84% and 90% in CR and AUC respectively. The use of character component to assess quality has been found to be su cient, though there is a need to develop a better technique for standardization of quality. The results found using a SVM classi er a rms the proposed algorithm is well-suited for quality assessment.
Style APA, Harvard, Vancouver, ISO itp.
46

"The statistical evaluation of minutiae-based automatic fingerprint verification systems". Thesis, 2006. http://library.cuhk.edu.hk/record=b6074180.

Pełny tekst źródła
Streszczenie:
Basic technologies for fingerprint feature extraction and matching have been improved to such a stage that they can be embedded into commercial Automatic Fingerprint Verification Systems (AFVSs). However, the reliability of AFVSs has kept attracting concerns from the society since AFVSs do fail occasionally due to difficulties like problematic fingers, changing environments, and malicious attacks. Furthermore, the absence of a solid theoretical foundation for evaluating AFVSs prevents these failures from been predicted and evaluated. Under the traditional empirical AFVS evaluation framework, repeated verification experiments, which can be very time consuming, have to be performed to test whether an update to an AFVS can really lead to an upgrade in its performance. Also, empirical verification results are often unable to provide deeper understanding of AFVSs. To solve these problems, we propose a novel statistical evaluation model for minutiae-based AFVSs based on the understanding of fingerprint minutiae patterns. This model can predict the verification performance metrics as well as their confidence intervals. The analytical power of our evaluation model, which makes it superior to empirical evaluation methods, can assist system developers to upgrade their AFVSs purposefully. Also, our model can facilitate the theoretical analysis of the advantages and disadvantages of various fingerprint verification techniques. We verify our claims through different and extensive experiments.
Chen, Jiansheng.
"November 2006."
Adviser: Yiu-Sang Moon.
Source: Dissertation Abstracts International, Volume: 68-08, Section: B, page: 5343.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2006.
Includes bibliographical references (p. 110-122).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
Style APA, Harvard, Vancouver, ISO itp.
47

Pahalawatta, K. K. "Plant species biometric using feature hierarchies : a plant identification system using both global and local features of plant leaves : a thesis submitted in partial fulfilment of the requirement for the degree of Master of Science in Computer Science, Department of Computer Science and Software Engineering, University of Canterbury, Christchurch /". 2008. http://library.canterbury.ac.nz/etd/adt-NZCU20080317.143205.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Nelufule, Nthatheni Norman. "Combining multiple Iris matchers using advanced fusion techniques to enhance Iris matching performance". Thesis, 2014. http://hdl.handle.net/10210/12111.

Pełny tekst źródła
Streszczenie:
M.Phil. (Electrical And Electronic Engineering)
The enormous increase in technology advancement and the need to secure information e ectively has led to the development and implementation of iris image acquisition technologies for automated iris recognition systems. The iris biometric is gaining popularity and is becoming a reliable and a robust modality for future biometric security. Its wide application can be extended to biometric security areas such as national ID cards, banking systems such as ATM, e-commerce, biometric passports but not applicable in forensic investigations. Iris recognition has gained valuable attention in biometric research due to the uniqueness of its textures and its high recognition rates when employed on high biometric security areas. Identity veri cation for individuals becomes a challenging task when it has to be automated with a high accuracy and robustness against spoo ng attacks and repudiation. Current recognition systems are highly a ected by noise as a result of segmentation failure, and this noise factors increase the biometric error rates such as; the FAR and the FRR. This dissertation reports an investigation of score level fusion methods which can be used to enhance iris matching performance. The fusion methods implemented in this project includes, simple sum rule, weighted sum rule fusion, minimum score and an adaptive weighted sum rule. The proposed approach uses an adaptive fusion which maps feature quality scores with the matcher. The fused scores were generated from four various iris matchers namely; the NHD matcher, the WED matcher, the WHD matcher and the POC matcher. To ensure homogeneity of matching scores before fusion, raw scores were normalized using the tanh-estimators method, because it is e cient and robust against outliers. The results were tested against two publicly available databases; namely, CASIA and UBIRIS using two statistical and biometric system measurements namely the AUC and the EER. The results of these two measures gives the AUC = 99:36% for CASIA left images, the AUC = 99:18% for CASIA right images, the AUC = 99:59% for UBIRIS database and the Equal Error Rate (EER) of 0.041 for CASIA left images, the EER = 0:087 for CASIA right images and with the EER = 0:038 for UBIRIS images.
Style APA, Harvard, Vancouver, ISO itp.
49

"Mobile personal authentication using fingerprint". 2004. http://library.cuhk.edu.hk/record=b5896205.

Pełny tekst źródła
Streszczenie:
Cheng Po Sum.
Thesis submitted in: July 2003.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 64-67).
Abstracts in English and Chinese.
List of Figures --- p.i
List of Tables --- p.iii
Acknowledgments --- p.iv
摘要 --- p.v
Thesis Abstract --- p.vi
Chapter 1. --- Mobile Commerce --- p.1
Chapter 1.1 --- Introduction to Mobile Commerce --- p.1
Chapter 1.2 --- Mobile commence payment systems --- p.2
Chapter 1.3 --- Security in mobile commerce --- p.5
Chapter 2. --- Mobile authentication using Fingerprint --- p.10
Chapter 2.1 --- Authentication basics --- p.10
Chapter 2.2 --- Fingerprint basics --- p.12
Chapter 2.3 --- Fingerprint authentication using mobile device --- p.15
Chapter 3. --- Design of Mobile Fingerprint Authentication Device --- p.19
Chapter 3.1 --- Objectives --- p.19
Chapter 3.2 --- Hardware and software design --- p.21
Chapter 3.2.1 --- Choice of hardware platform --- p.21
Chapter 3.3 --- Experiments --- p.25
Chapter 3.3.1 --- Design methodology I - DSP --- p.25
Chapter 3.3.1.1 --- Hardware platform --- p.25
Chapter 3.3.1.2 --- Software platform --- p.26
Chapter 3.3.1.3 --- Implementation --- p.26
Chapter 3.3.1.4 --- Experiment and result --- p.27
Chapter 3.3.2 --- Design methodology II ´ؤ SoC --- p.28
Chapter 3.3.2.1 --- Hardware components --- p.28
Chapter 3.3.2.2 --- Software components --- p.29
Chapter 3.3.2.3 --- Implementation Department of Computer Science and Engineering --- p.29
Chapter 3.3.2.4 --- Experiment and result --- p.30
Chapter 3.4 --- Observation --- p.30
Chapter 4. --- Implementation of the Device --- p.31
Chapter 4.1 --- Choice of platforms --- p.31
Chapter 4.2 --- Implementation Details --- p.31
Chapter 4.2.1 --- Hardware implementation --- p.31
Chapter 4.2.1.1 --- Atmel FingerChip --- p.32
Chapter 4.2.1.2 --- Gemplus smart card and reader --- p.33
Chapter 4.2.2 --- Software implementation --- p.33
Chapter 4.2.2.1 --- Operating System --- p.33
Chapter 4.2.2.2 --- File System --- p.33
Chapter 4.2.2.3 --- Device Driver --- p.35
Chapter 4.2.2.4 --- Smart card --- p.38
Chapter 4.2.2.5 --- Fingerprint software --- p.41
Chapter 4.2.2.6 --- Graphical user interface --- p.41
Chapter 4.3 --- Results and observations --- p.44
Chapter 5. --- An Application Example 一 A Penalty Ticket Payment System (PTPS) --- p.47
Chapter 5.1 --- Requirement --- p.47
Chapter 5.2 --- Design Principles --- p.48
Chapter 5.3 --- Implementation --- p.52
Chapter 5.4 --- Results and Observation --- p.57
Chapter 6. --- Conclusions and future work --- p.62
Chapter 7. --- References --- p.64
Style APA, Harvard, Vancouver, ISO itp.
50

Kjellén, Oliver, i Jillian Pang. "Privatpersoners användning av biometriteknik : Användbarhet, säkerhet och integritet". Thesis, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-25462.

Pełny tekst źródła
Streszczenie:
Bakgrund Biometriteknik är paraplybegrepp för olika automatiserade tekniker som används vid identifikation av individer. Biometriska identifikationsmetoder såsom fingeravtrycksläsning och ansiktsigenkänning har sedan länge varit reserverade för specifika syften. Idag är situationen förändrad, biometriteknik finns tillgänglig för allmänheten och används i allt större utsträckning. Biometriska metoder för identifikation kan erbjuda säkrare identifiering gentemot vanliga lösenord. Detta är av stor vikt då privatpersoner lagrar allt mer känslig information på sina mobiltelefoner, surfplattor och datorer.  Syfte   Syftet med den här studien är att undersöka hur stor inverkan faktorerna användbarhet, säkerhet och integritet har på privatpersoners användning av biometriska metoder för identifiering på mobiltelefoner, surfplattor och datorer. Efter granskning av tidigare forskning gavs dessa tre faktorer extra fokus. Den första faktorn, säkerhet, identifierades i och med att biometriteknik erbjuder förbättrad säkerhet om tekniken används korrekt. Samt att tidigare forskning pekade på säkerhet som en aspekt privatpersoner må ha i åtanke. Den andra faktorn, användbarhet, återfinns i att forskning visar på att individer värderar användbarhet och enkelhet högt. En tredje faktor, integritet, valdes i och med att viss forsking här hade nått motsägande resultat  Metod Rapporten genomfördes främst med hjälp av en kvantitativ enkätundersökning, svar (n=121) från denna undersökning användes senare för att besvara och reflektera kring forskningsfrågan: Hur stor inverkan har faktorerna användbarhet, säkerhet och integritet på privatpersoners användning av biometriteknik? Ett kapitel som namngavs forskningsöversikt inkluderas också, här har litteratur sållats kvalitativt för att finna relevanta artiklar.  Resultat Den enkätundersökning som genomfördes påvisade att en majoritet av privatpersoner använder sig av biometriska identifieringsmetoder på sina mobiltelefoner, surfplattor samt datorer. Vidare visade det sig att faktorn användbarhet värderades högt, vissa fysiologiska egenskaper som används vid biometrisk identifiering ansågs även som mer eller mindre accepterade. Svar som gavs av respondenter visade också på att privatpersoner ej resonerar speciellt mycket kring integritet och personliga data som lagras vid användning av biometriteknik.  Slutsats Efter genomförd diskussion angående tidigare forskning och de resultat som nåddes utifrån enkätundersökningen konstaterades det att faktorn användbarhet hade stor inverkan på privatpersoners användning av biometriteknik. Säkerhet tas även i åtanke av en mindre del. Faktorn integritet ges ingen eller väldigt liten uppmärksamhet gällande användning av biometriska identifieringsmetoder hos privatpersoner.
Background Biometrics is a field including different automated technologies used for thepurpose of identify individuals. Biometric identification methods such asfingerprint scanning and facial recognition used to be a field reserved forspecific application purposes. Nowadays biometrics are used more frequently,and it is available for the public to use in their everyday life. Biometrics canprovide more secure solutions compared to normal passwords, but to achievethis adoption of said methods is key, especially seeing as users store moresensitive and personal data on their smart devices compared to yesterday’s nonsmartphones. Purpose The purpose of this study is to explore how the factors usability, security andprivacy affect people’s use of biometric solutions on their smartphones,tablets, and computers. After thoroughly reviewing previous literature thesethree main factors gained extra focus. The first factor, security, biometrics dooffer greater security advantages when used the right way. Also, previousresearch points towards security as an aspect people should have in mindwhile using biometrics. The second factor, usability, this aspect is based onprevious research showing that people tend to value functions and features thatare usable. A third factor, privacy, was chosen because research showedconflicting results regarding the importance of this factor.  Method This study was conducted primarily through a quantitative survey, answers(n=121) from this survey was later used to reflect upon the research question:How much of an impact does the factors usability, security and privacy haveover peoples use of biometrics? A chapter providing an overview of previousresearch is also included, for this chapter literature has been reviewed in aqualitative matter to sort out relevant research articles.  Results Results from the survey that was conducted showed that most individuals doindeed use biometrics on their mobile phones, tablets, and computers. Datacollected also indicates that the factor usability had a big impact on peoples useof biometrics. People also responded that they saw some physiological traitsused for biometrics as more, or less accepted to be stored and collected. Otheranswers to the survey showed that individuals generally do not care too muchabout their privacy when using biometrics. Conclusion After concluded discussions regarding previous research and the resultscollected from individuals through the survey a conclusion is reached. Thefactor usability had a big impact on individuals use biometrics. A small part ofindividuals does also consider security to be important. However, the factorprivacy was mostly ignored when it comes to using biometrics on smartphones,tablets and computers.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii