Literatura científica selecionada sobre o tema "Biometric information protection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Biometric information protection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Biometric information protection"
Lee, Boo-Ha, e Shin-Uk Park. "Legislative Policy Consideration for Reinforcement of Biometrics Protection". LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, n.º 1 (30 de junho de 2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Texto completo da fonteTeng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A. e Connie Tee. "Finger Vein Template Protection with Directional Bloom Filter". HighTech and Innovation Journal 4, n.º 2 (1 de junho de 2023): 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Texto completo da fonteTaha, Mohammed A., e Hanaa M. Ahmed. "A fuzzy vault development based on iris images". EUREKA: Physics and Engineering, n.º 5 (13 de setembro de 2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Texto completo da fonteKim, Younjin, e Ilhwan Kim. "Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology". Korean Constitutional Law Association 28, n.º 4 (30 de dezembro de 2022): 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Texto completo da fonteShin, Yong-Nyuo, Yong-Jun Lee e Myung-Geun Chun. "Biometric Template Security for Personal Information Protection". Journal of Korean Institute of Intelligent Systems 18, n.º 4 (25 de agosto de 2008): 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Texto completo da fonteLee, Yong-Joon, e Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n.º 5 (1 de maio de 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texto completo da fonteLee, Yong-Joon, e Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n.º 5 (1 de maio de 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texto completo da fonteSulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised". Information and Control Systems, n.º 4 (24 de agosto de 2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Texto completo da fontePunithavathi, P., e S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns". Indonesian Journal of Electrical Engineering and Computer Science 7, n.º 3 (1 de setembro de 2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Texto completo da fonteMa, Ruoxue. "Legislative Conception for the Special Protection of Biometric Information: A Study Based on Extraterritorial Experience". Lecture Notes in Education Psychology and Public Media 10, n.º 1 (14 de setembro de 2023): 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Texto completo da fonteTeses / dissertações sobre o assunto "Biometric information protection"
Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness". Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Texto completo da fontePassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Mtibaa, Aymen. "Towards robust and privacy-preserving speaker verification systems". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS002.
Texto completo da fonteSpeaker verification systems are a key technology in many devices and services like smartphones, intelligent digital assistants, healthcare, and banking applications. Additionally, with the COVID pandemic, access control systems based on fingerprint scanners or keypads increase the risk of virus propagation. Therefore, companies are now rethinking their employee access control systems and considering touchless authorization technologies, such as speaker verification systems.However, speaker verification system requires users to transmit their recordings, features, or models derived from their voice samples without any obfuscation over untrusted public networks which stored and processed them on a cloud-based infrastructure. If the system is compromised, an adversary can use this biometric information to impersonate the genuine user and extract personal information. The voice samples may contain information about the user's gender, accent, ethnicity, and health status which raises several privacy issues.In this context, the present PhD Thesis address the privacy and security issues for speaker verification systems based on Gaussian mixture models (GMM), i-vector, and x-vector as speaker modeling. The objective is the development of speaker verification systems that perform biometric verification while preserving the privacy and the security of the user. To that end, we proposed biometric protection schemes for speaker verification systems to achieve the privacy requirements (revocability, unlinkability, irreversibility) described in the standard ISO/IEC IS~24745 on biometric information protection and to improve the robustness of the systems against different attack scenarios
LABATI, R. DONIDA. "CONTACTLESS FINGERPRINT BIOMETRICS: ACQUISITION, PROCESSING, AND PRIVACY PROTECTION". Doctoral thesis, Università degli Studi di Milano, 2013. http://hdl.handle.net/2434/217562.
Texto completo da fonteZhou, Xuebing Verfasser], Dieter W. [Akademischer Betreuer] [Fellner e Raymond N. J. [Akademischer Betreuer] Veldhuis. "Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis". Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://d-nb.info/1111908354/34.
Texto completo da fonteZhou, Xuebing [Verfasser], Dieter W. [Akademischer Betreuer] Fellner e Raymond N. J. [Akademischer Betreuer] Veldhuis. "Privacy and Security Assessment of Biometric Template Protection / Xuebing Zhou. Betreuer: Dieter W. Fellner ; Raymond N. J. Veldhuis". Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2012. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-28858.
Texto completo da fonteBardou, Sophie. "Les traitements de données biométriques en entreprise". Thesis, Montpellier 1, 2010. http://www.theses.fr/2010MON10031/document.
Texto completo da fonteBiometry brings together computing techniques that enable the identification of individuals on the basis of their biological, physical appearance and/or behavioral characteristics. Although firstly reserved for the legal system/judiciary domain, biometry tends to be generalized in all spheres of people life. Recently, biometry has also been used in companies who are always receptive to new technologies. Thus, the introduction of identifying devices such as these into a company life has to be the subject of corporate discussions between the managing teams and staff representatives. Indeed, such technologies are often compared to video surveillance, RFID chips, GPS data … and they can lead to the spying of employees if their uses are not well supervised. In the absence of specific laws, the legislator has given the CNIL the abilities to establish the requirements of eligibility of this technology usage within the companies. The "liberty and computing" legislation is then combined with the labor laws in order to apply common principles such as the finality, the proportionality, the loyalty, the transparency of information and employee consents
Diaz, Rodriguez V. "Transborder biometric information flow : legal challenges to personal privacy and the need for public debate". Thesis, 2014. https://eprints.utas.edu.au/22487/1/Whole-Diaz%20Rodriguez-thesis.pdf.
Texto completo da fonteAdom'megaa, Prudencio Selly. "La protection de la vie privée dans le cadre de la lutte contre le terrorisme au Canada". Thesis, 2019. http://hdl.handle.net/1866/24442.
Texto completo da fonteThe fight against terrorism implies, amongst others, the execution of preventative and punitive legislation to manage the threats from which Canada is exposed. In this context, the state and its agents have access to many tools, such as “security technology” (facial recognition, video surveillance, fingerprinting, etc.), to achieve their different mandates. The operation of these mechanisms raises questions and concerns in regards to privacy protection. The sharing of personal information between different ministries, the consent pertaining to the collection of personal information, and legislators’ right of access to state secrets, etc., are issues that arise when the executive power undertakes security measures. It’s found that the legislative changes to fight against terrorism create an imbalance with respect to privacy protection. Indeed, unlike the fight against terrorism, the right to privacy is constitutionally protected under the Canadian Charter of rights and freedoms. One of the challenges that must be recognized by the executive, legislative and judiciary authorities is to conduct their actions according to the rule of law in the context of national security.
Livros sobre o assunto "Biometric information protection"
Kanade, Sanjay G. Enhancing information security and privacy by combining biometrics with cryptography. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2012.
Encontre o texto completo da fonteMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Texto completo da fonteStefan, Katzenbeisser, e SpringerLink (Online service), eds. Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonteOffice, United States Government Accountability. Border security: State Department rollout of biometric visas on schedule, but guidance is lagging : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Encontre o texto completo da fonteTransparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.
Encontre o texto completo da fontecomparé, Institut suisse de droit. L'individu face aux nouvelles technologies: Surveillance, identification et suivi : actes du colloque international des 10 et 11 novembre 2004 à Lausanne. Züriche: Schulthess, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Border security: Strengthened visa process would benefit from improvements in staffing and information sharing : report to congressional committees. Washington, D.C: United States Government Accountability Office, 2005.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland security: Further actions needed to coordinate federal agencies' facility protection efforts and promote key practices : report to the chairman, Committee on Government Reform, House of Representatives. Washington, D.C: United States Government Accountability Office, 2004.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.
Encontre o texto completo da fonteDecker, Bart. Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Biometric information protection"
Kevenaar, Tom. "Protection of Biometric Information". In Security with Noisy Data, 169–93. London: Springer London, 2007. http://dx.doi.org/10.1007/978-1-84628-984-2_11.
Texto completo da fonteSamandari, Juliet, e Amelia Samandari. "Biometric Protection and Security". In Information Technology Security and Risk Management, 278–83. New York: CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-41.
Texto completo da fonteRathgeb, Christian, Andreas Uhl e Peter Wild. "Experiments on Iris Biometric Template Protection". In Advances in Information Security, 245–65. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5571-4_14.
Texto completo da fonteSasikaladevi, N., A. Revathi, N. Mahalakshmi e N. Archana. "HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection". In Communications in Computer and Information Science, 312–20. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_31.
Texto completo da fontePanigrahy, Saroj Kumar, Debasish Jena, Sathya Babu Korra e Sanjay Kumar Jena. "On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature". In Communications in Computer and Information Science, 182–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03547-0_18.
Texto completo da fonteSprokkereef, Annemarie. "Data Protection and the use of Biometric Data in the EU". In The Future of Identity in the Information Society, 277–84. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79026-8_19.
Texto completo da fonteRot, Peter, Peter Peer e Vitomir Štruc. "Detecting Soft-Biometric Privacy Enhancement". In Handbook of Digital Face Manipulation and Detection, 391–411. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.
Texto completo da fonteBleumer, Gerrit. "Biometric yet Privacy Protecting Person Authentication". In Information Hiding, 99–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49380-8_8.
Texto completo da fonteFornazin, Marcelo, Danilo B. S. Netto, Marcos Antonio Cavenaghi e Aparecido N. Marana. "Protecting Medical Images with Biometric Information". In Advances in Computer and Information Sciences and Engineering, 284–89. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8741-7_52.
Texto completo da fonteLi, ChunLei, Bin Ma, Yunhong Wang e Zhaoxiang Zhang. "Protecting Biometric Templates Using Authentication Watermarking". In Advances in Multimedia Information Processing - PCM 2010, 709–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15702-8_65.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Biometric information protection"
Barannik, Vladimir, Sergii Shulgin, Serhii Holovchenko, Pavlo Hurzhiy, Sergy Sidchenko e Pris Gennady. "Method of Hierarchical Protection of Biometric Information". In 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT). IEEE, 2021. http://dx.doi.org/10.1109/aict52120.2021.9628915.
Texto completo da fonteChung, Yunsu, Kiyoung Moon e Hyung-Woo Lee. "Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism". In 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.151.
Texto completo da fonteGhouzali, Sanaa, e Wadood Abdul. "Private chaotic biometric template protection algorithm". In 2013 IEEE Second International Conference on Image Information Processing (ICIIP). IEEE, 2013. http://dx.doi.org/10.1109/iciip.2013.6707676.
Texto completo da fonteFarafonova, A. E., e E. L. Turnetskaya. "TECHNOLOGIES OF BIOMETRIC PERSON’S IDENTIFICATION". In PROCESSING, TRANSMISSION AND PROTECTION OF INFORMATION IN COMPUTER SYSTEMS. St. Petersburg State University of Aerospace Instrumentation, 2020. http://dx.doi.org/10.31799/978-5-8088-1452-3-2020-1-43-49.
Texto completo da fonteLozhkova, A. "PROTECTION OF BIOMETRIC PERSONAL DATA IN MEDICAL INFORMATION SYSTEMS". In XIV International Scientific Conference "System Analysis in Medicine". Far Eastern Scientific Center of Physiology and Pathology of Respiration, 2020. http://dx.doi.org/10.12737/conferencearticle_5fe01d9bc43a05.55251061.
Texto completo da fonteWang, Zhifang, Qi Han, Xiamu Niu e Christoph Busch. "Template Protection for Multimodal Biometric System". In 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.269.
Texto completo da fonteJin, Andrew Teoh Beng, e Jaihie Kim. "FuzzyHash: A Secure Biometric Template Protection Technique". In 2007 Frontiers in the Convergence of Bioscience and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/fbit.2007.31.
Texto completo da fonteIslam, Md Rajibul, Md Shohel Sayeed e Andrews Samraj. "Biometric template protection using watermarking with hidden password encryption". In 2008 International Symposium on Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/itsim.2008.4631572.
Texto completo da fonteZhou, Xuebing, Stephen D. Wolthusen, Christoph Busch e Arjan Kuijper. "Feature Correlation Attack on Biometric Privacy Protection Schemes". In 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2009. http://dx.doi.org/10.1109/iih-msp.2009.237.
Texto completo da fonteMeints, Martin, Heinz Biermann, Manfred Bromba, Christoph Busch, Gerrit Hornung e Gisela Quiring-Kock. "Biometric Systems and Data Protection Legislation in Germany". In 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2008. http://dx.doi.org/10.1109/iih-msp.2008.314.
Texto completo da fonteRelatórios de organizações sobre o assunto "Biometric information protection"
Roberts, Tony, Judy Gitahi, Patrick Allam, Lawrence Oboh, Oyewole Oladapo, Gifty Appiah-Adjei, Amira Galal et al. Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia. Institute of Development Studies, setembro de 2023. http://dx.doi.org/10.19088/ids.2023.027.
Texto completo da fonte