Gotowa bibliografia na temat „Biometric information protection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Biometric information protection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Biometric information protection"
Lee, Boo-Ha, i Shin-Uk Park. "Legislative Policy Consideration for Reinforcement of Biometrics Protection". LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, nr 1 (30.06.2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Pełny tekst źródłaTeng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A. i Connie Tee. "Finger Vein Template Protection with Directional Bloom Filter". HighTech and Innovation Journal 4, nr 2 (1.06.2023): 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Pełny tekst źródłaTaha, Mohammed A., i Hanaa M. Ahmed. "A fuzzy vault development based on iris images". EUREKA: Physics and Engineering, nr 5 (13.09.2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Pełny tekst źródłaKim, Younjin, i Ilhwan Kim. "Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology". Korean Constitutional Law Association 28, nr 4 (30.12.2022): 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Pełny tekst źródłaShin, Yong-Nyuo, Yong-Jun Lee i Myung-Geun Chun. "Biometric Template Security for Personal Information Protection". Journal of Korean Institute of Intelligent Systems 18, nr 4 (25.08.2008): 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Pełny tekst źródłaLee, Yong-Joon, i Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, nr 5 (1.05.2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Pełny tekst źródłaLee, Yong-Joon, i Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, nr 5 (1.05.2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Pełny tekst źródłaSulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised". Information and Control Systems, nr 4 (24.08.2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Pełny tekst źródłaPunithavathi, P., i S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns". Indonesian Journal of Electrical Engineering and Computer Science 7, nr 3 (1.09.2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Pełny tekst źródłaMa, Ruoxue. "Legislative Conception for the Special Protection of Biometric Information: A Study Based on Extraterritorial Experience". Lecture Notes in Education Psychology and Public Media 10, nr 1 (14.09.2023): 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Pełny tekst źródłaRozprawy doktorskie na temat "Biometric information protection"
Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness". Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Pełny tekst źródłaPassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Mtibaa, Aymen. "Towards robust and privacy-preserving speaker verification systems". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS002.
Pełny tekst źródłaSpeaker verification systems are a key technology in many devices and services like smartphones, intelligent digital assistants, healthcare, and banking applications. Additionally, with the COVID pandemic, access control systems based on fingerprint scanners or keypads increase the risk of virus propagation. Therefore, companies are now rethinking their employee access control systems and considering touchless authorization technologies, such as speaker verification systems.However, speaker verification system requires users to transmit their recordings, features, or models derived from their voice samples without any obfuscation over untrusted public networks which stored and processed them on a cloud-based infrastructure. If the system is compromised, an adversary can use this biometric information to impersonate the genuine user and extract personal information. The voice samples may contain information about the user's gender, accent, ethnicity, and health status which raises several privacy issues.In this context, the present PhD Thesis address the privacy and security issues for speaker verification systems based on Gaussian mixture models (GMM), i-vector, and x-vector as speaker modeling. The objective is the development of speaker verification systems that perform biometric verification while preserving the privacy and the security of the user. To that end, we proposed biometric protection schemes for speaker verification systems to achieve the privacy requirements (revocability, unlinkability, irreversibility) described in the standard ISO/IEC IS~24745 on biometric information protection and to improve the robustness of the systems against different attack scenarios
LABATI, R. DONIDA. "CONTACTLESS FINGERPRINT BIOMETRICS: ACQUISITION, PROCESSING, AND PRIVACY PROTECTION". Doctoral thesis, Università degli Studi di Milano, 2013. http://hdl.handle.net/2434/217562.
Pełny tekst źródłaZhou, Xuebing Verfasser], Dieter W. [Akademischer Betreuer] [Fellner i Raymond N. J. [Akademischer Betreuer] Veldhuis. "Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis". Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://d-nb.info/1111908354/34.
Pełny tekst źródłaZhou, Xuebing [Verfasser], Dieter W. [Akademischer Betreuer] Fellner i Raymond N. J. [Akademischer Betreuer] Veldhuis. "Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis". Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-28858.
Pełny tekst źródłaBardou, Sophie. "Les traitements de données biométriques en entreprise". Thesis, Montpellier 1, 2010. http://www.theses.fr/2010MON10031/document.
Pełny tekst źródłaBiometry brings together computing techniques that enable the identification of individuals on the basis of their biological, physical appearance and/or behavioral characteristics. Although firstly reserved for the legal system/judiciary domain, biometry tends to be generalized in all spheres of people life. Recently, biometry has also been used in companies who are always receptive to new technologies. Thus, the introduction of identifying devices such as these into a company life has to be the subject of corporate discussions between the managing teams and staff representatives. Indeed, such technologies are often compared to video surveillance, RFID chips, GPS data … and they can lead to the spying of employees if their uses are not well supervised. In the absence of specific laws, the legislator has given the CNIL the abilities to establish the requirements of eligibility of this technology usage within the companies. The "liberty and computing" legislation is then combined with the labor laws in order to apply common principles such as the finality, the proportionality, the loyalty, the transparency of information and employee consents
Diaz, Rodriguez V. "Transborder biometric information flow : legal challenges to personal privacy and the need for public debate". Thesis, 2014. https://eprints.utas.edu.au/22487/1/Whole-Diaz%20Rodriguez-thesis.pdf.
Pełny tekst źródłaAdom'megaa, Prudencio Selly. "La protection de la vie privée dans le cadre de la lutte contre le terrorisme au Canada". Thesis, 2019. http://hdl.handle.net/1866/24442.
Pełny tekst źródłaThe fight against terrorism implies, amongst others, the execution of preventative and punitive legislation to manage the threats from which Canada is exposed. In this context, the state and its agents have access to many tools, such as “security technology” (facial recognition, video surveillance, fingerprinting, etc.), to achieve their different mandates. The operation of these mechanisms raises questions and concerns in regards to privacy protection. The sharing of personal information between different ministries, the consent pertaining to the collection of personal information, and legislators’ right of access to state secrets, etc., are issues that arise when the executive power undertakes security measures. It’s found that the legislative changes to fight against terrorism create an imbalance with respect to privacy protection. Indeed, unlike the fight against terrorism, the right to privacy is constitutionally protected under the Canadian Charter of rights and freedoms. One of the challenges that must be recognized by the executive, legislative and judiciary authorities is to conduct their actions according to the rule of law in the context of national security.
Książki na temat "Biometric information protection"
Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2012.
Znajdź pełny tekst źródłaMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Pełny tekst źródłaStefan, Katzenbeisser, i SpringerLink (Online service), red. Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Border security: State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Znajdź pełny tekst źródłaTransparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.
Znajdź pełny tekst źródłacomparé, Institut suisse de droit. L'individu face aux nouvelles technologies: Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche: Schulthess, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Border security: Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C: United States Government Accountability Office, 2005.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland security: Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.
Znajdź pełny tekst źródła1951-, Chadwick David, i SpringerLink (Online service), red. Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Znajdź pełny tekst źródłaCzęści książek na temat "Biometric information protection"
Kevenaar, Tom. "Protection of Biometric Information". W Security with Noisy Data, 169–93. London: Springer London, 2007. http://dx.doi.org/10.1007/978-1-84628-984-2_11.
Pełny tekst źródłaSamandari, Juliet, i Amelia Samandari. "Biometric Protection and Security". W Information Technology Security and Risk Management, 278–83. New York: CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-41.
Pełny tekst źródłaRathgeb, Christian, Andreas Uhl i Peter Wild. "Experiments on Iris Biometric Template Protection". W Advances in Information Security, 245–65. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5571-4_14.
Pełny tekst źródłaSasikaladevi, N., A. Revathi, N. Mahalakshmi i N. Archana. "HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection". W Communications in Computer and Information Science, 312–20. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_31.
Pełny tekst źródłaPanigrahy, Saroj Kumar, Debasish Jena, Sathya Babu Korra i Sanjay Kumar Jena. "On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature". W Communications in Computer and Information Science, 182–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03547-0_18.
Pełny tekst źródłaSprokkereef, Annemarie. "Data Protection and the use of Biometric Data in the EU". W The Future of Identity in the Information Society, 277–84. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79026-8_19.
Pełny tekst źródłaRot, Peter, Peter Peer i Vitomir Štruc. "Detecting Soft-Biometric Privacy Enhancement". W Handbook of Digital Face Manipulation and Detection, 391–411. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.
Pełny tekst źródłaBleumer, Gerrit. "Biometric yet Privacy Protecting Person Authentication". W Information Hiding, 99–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49380-8_8.
Pełny tekst źródłaFornazin, Marcelo, Danilo B. S. Netto, Marcos Antonio Cavenaghi i Aparecido N. Marana. "Protecting Medical Images with Biometric Information". W Advances in Computer and Information Sciences and Engineering, 284–89. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8741-7_52.
Pełny tekst źródłaLi, ChunLei, Bin Ma, Yunhong Wang i Zhaoxiang Zhang. "Protecting Biometric Templates Using Authentication Watermarking". W Advances in Multimedia Information Processing - PCM 2010, 709–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15702-8_65.
Pełny tekst źródłaStreszczenia konferencji na temat "Biometric information protection"
Barannik, Vladimir, Sergii Shulgin, Serhii Holovchenko, Pavlo Hurzhiy, Sergy Sidchenko i Pris Gennady. "Method of Hierarchical Protection of Biometric Information". W 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT). IEEE, 2021. http://dx.doi.org/10.1109/aict52120.2021.9628915.
Pełny tekst źródłaChung, Yunsu, Kiyoung Moon i Hyung-Woo Lee. "Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism". W 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.151.
Pełny tekst źródłaGhouzali, Sanaa, i Wadood Abdul. "Private chaotic biometric template protection algorithm". W 2013 IEEE Second International Conference on Image Information Processing (ICIIP). IEEE, 2013. http://dx.doi.org/10.1109/iciip.2013.6707676.
Pełny tekst źródłaFarafonova, A. E., i E. L. Turnetskaya. "TECHNOLOGIES OF BIOMETRIC PERSON’S IDENTIFICATION". W PROCESSING, TRANSMISSION AND PROTECTION OF INFORMATION IN COMPUTER SYSTEMS. St. Petersburg State University of Aerospace Instrumentation, 2020. http://dx.doi.org/10.31799/978-5-8088-1452-3-2020-1-43-49.
Pełny tekst źródłaLozhkova, A. "PROTECTION OF BIOMETRIC PERSONAL DATA IN MEDICAL INFORMATION SYSTEMS". W XIV International Scientific Conference "System Analysis in Medicine". Far Eastern Scientific Center of Physiology and Pathology of Respiration, 2020. http://dx.doi.org/10.12737/conferencearticle_5fe01d9bc43a05.55251061.
Pełny tekst źródłaWang, Zhifang, Qi Han, Xiamu Niu i Christoph Busch. "Template Protection for Multimodal Biometric System". W 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.269.
Pełny tekst źródłaJin, Andrew Teoh Beng, i Jaihie Kim. "FuzzyHash: A Secure Biometric Template Protection Technique". W 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.31.
Pełny tekst źródłaIslam, Md Rajibul, Md Shohel Sayeed i Andrews Samraj. "Biometric template protection using watermarking with hidden password encryption". W 2008 International Symposium on Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/itsim.2008.4631572.
Pełny tekst źródłaZhou, Xuebing, Stephen D. Wolthusen, Christoph Busch i Arjan Kuijper. "Feature Correlation Attack on Biometric Privacy Protection Schemes". W 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.237.
Pełny tekst źródłaMeints, Martin, Heinz Biermann, Manfred Bromba, Christoph Busch, Gerrit Hornung i Gisela Quiring-Kock. "Biometric Systems and Data Protection Legislation in Germany". W 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2008. http://dx.doi.org/10.1109/iih-msp.2008.314.
Pełny tekst źródłaRaporty organizacyjne na temat "Biometric information protection"
Roberts, Tony, Judy Gitahi, Patrick Allam, Lawrence Oboh, Oyewole Oladapo, Gifty Appiah-Adjei, Amira Galal i in. Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia. Institute of Development Studies, wrzesień 2023. http://dx.doi.org/10.19088/ids.2023.027.
Pełny tekst źródła