Добірка наукової літератури з теми "Biometrical method"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Biometrical method".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Biometrical method"

1

Chmielińska, Jolanta, and Jacek Jakubowski. "Biometrical driver face verification." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, no. 6 (September 7, 2018): 68–72. http://dx.doi.org/10.24136/atest.2018.039.

Повний текст джерела
Анотація:
The paper discusses the problem of face verification in a driver monitoring system for the purpose of traffic safety. Two different methods of face verification were proposed. Both of them are based on a convolutional neural network and were developed with the use of a transfer learning technique. In the paper, the results produced by both proposed method have been presented and compared. Moreover, their advantages and disadvantages have been discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Salman, Duha D., Raghad A. Azeez, and Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm." Engineering and Technology Journal 38, no. 3B (December 25, 2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.

Повний текст джерела
Анотація:
Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity. By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-less, the encryption keys are produced with the use of an approach of swarm intelligence. Emergent collective intelligence in groups of simple autonomous agents is collectively termed as a swarm intelligence. The Meerkat Clan Key Generation Algorithm (MCKGA) is a method for the generation of a key stream for the encryption of the plaintext. This method will reduce and distribute the number of keys. Testing of system, it was found that the keys produced by the characteristics of the eye are better than the keys produced by the characteristics of the ear. The advantages of our approach comprise generation of strong and unique keys from users’ biometric data using MCKGA and it is faster and accurate in terms of key generation.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Salman, Duha D., Raghad A. Azeez, and Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm." Engineering and Technology Journal 38, no. 3B (December 25, 2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.

Повний текст джерела
Анотація:
Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity. By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-less, the encryption keys are produced with the use of an approach of swarm intelligence. Emergent collective intelligence in groups of simple autonomous agents is collectively termed as a swarm intelligence. The Meerkat Clan Key Generation Algorithm (MCKGA) is a method for the generation of a key stream for the encryption of the plaintext. This method will reduce and distribute the number of keys. Testing of system, it was found that the keys produced by the characteristics of the eye are better than the keys produced by the characteristics of the ear. The advantages of our approach comprise generation of strong and unique keys from users’ biometric data using MCKGA and it is faster and accurate in terms of key generation.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Philippe, P. "Twinning causative origin investigated by Sartwell's biometrical method." American Journal of Human Biology 2, no. 2 (1990): 107–15. http://dx.doi.org/10.1002/ajhb.1310020203.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bogdanov, M. A., V. M. Kartak, A. А. Dumchikov, and A. I. Fabarisova. "STATISTICAL ASSESSMENT OF BIOMETRICAL SIGNS BY ELECTROCARDIOGRAPHY." Russian Journal of Cardiology, no. 7 (August 14, 2018): 84–91. http://dx.doi.org/10.15829/1560-4071-2018-7-84-91.

Повний текст джерела
Анотація:
Statistical analysis performed, of the informativity of biometric signs of electrocardiogram. It was found that amplitude and time parameters of PQST areas of electrocardiograms show enough dispersion and are not easily distinguished. For reliable biometric personality identification quite a range of such signs is needed. Based on the known signs, novel signs were formulated via the bootstrap method. The novel signs presented much lower dispersion. It was found, that reliable identification of personality is possible with combined usage of the amplitudes in Sand T-areas of cardiocycle.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Santos, Filipe Martins, David Risco, Nayara Yoshie Sano, Gabriel Carvalho de Macedo, Wanessa Teixeira Gomes Barreto, Pilar Gonçalves, Pedro Fernández-Llario, and Heitor Miraglia Herrera. "An alternative method for determining the body condition index of the free-living South American coati." Neotropical Biology and Conservation 15, no. 4 (December 23, 2020): 561–69. http://dx.doi.org/10.3897/neotropical.15.e56578.

Повний текст джерела
Анотація:
Assessing and monitoring the welfare of free-living mammals is not a usual process due to the logistical complications associated with their capture and sedation, collection and storage of biological samples and their release. In this context, non-invasive methods for monitoring wildlife constitute a good alternative approach for in situ conservation. Body condition index, as a measurement of health status, has been used in free-living mammals; its low value may be associated with negative effects on reproduction and survival. The present study aimed to generate an alternative and reliable non-invasive method and then determine the body condition index, based on previously-collected biometric measurements, without the need to capture and immobilise the animals. A total of 178 free-living Nasua nasua Linnaeus, 1766 were trapped, weighed and measured. Statistical methods were used, based on Boosted Regression Trees (BRT) using body mass, biometric measurements (body length, height and chest girth) and gender as explanatory variables. To assess the agreement between the real Body Condition Indices (BCIs) and the predicted values of BCIs, we explored the correlation between each model using the Bland-Altman method. This method showed a strong agreement between the predictive BRT models proposed (standardised residuals from a linear regression between body length and chest girth) and standardised residuals (linear regression between body mass and body length). The results obtained herein showed that BRT modelling, based on biometrical features, is an alternative way to verify the body conditions of coatis without the need to capture and immobilise the animals.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zintzaras, E., P. Bouka, and A. Kowald. "Biometrical evaluation of bioequivalence trials using a bootstrap individual direct curve comparison method." European Journal of Drug Metabolism and Pharmacokinetics 27, no. 1 (March 2002): 11–16. http://dx.doi.org/10.1007/bf03190400.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Stander, Mark, and Julian Stander. "A simple method for correcting for the Will Rogers phenomenon with biometrical applications." Biometrical Journal 62, no. 4 (January 20, 2020): 1080–89. http://dx.doi.org/10.1002/bimj.201900199.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Desrosiers, G., B. Vincent, C. Retière, and L. Boucher. "Comparaison de critères utilisables pour l'étude de la structure des populations du polychète Nereis virens (Sars)." Canadian Journal of Zoology 66, no. 6 (June 1, 1988): 1454–59. http://dx.doi.org/10.1139/z88-212.

Повний текст джерела
Анотація:
The various biometrical criteria used in the study of the population structure of the annelid polychaete Nereis virens (Sars) are reviewed. This type of study, which requires the examination of large numbers of specimens representing all size classes, is sometimes complicated by the occurrence of autotomy, a phenomenon quite frequent in this species, and by mechanical breaks during sampling and sieving. Measurements such as total length, width of an anterior segment, and total weight are not good criteria. We have used a new biometrical criterium developed at the Laboratoire maritime de Dinard (France). This criterium is based on a partial weight of animals that have been put in formaldehyde and wiped; the weight is determined from an histogram in which breaking points are "ranked". This ponderal measurement has been compared with the linear measurement of the jaw length. The new method allows the manipulation of a larger number of individuals and it is easier and faster to use than the method based on jaw measurements.[Journal translation]
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Wu, Shu-Fei. "Bayesian Interval Estimation for the Two-Parameter Exponential Distribution Based on the Right Type II Censored Sample." Symmetry 14, no. 2 (February 10, 2022): 352. http://dx.doi.org/10.3390/sym14020352.

Повний текст джерела
Анотація:
The Bayesian interval estimation of the scale parameter for two-parameter exponential distribution is proposed based on the right type II censored sample. Under this type of censoring, two methods of Bayesian joint confidence region of the two parameters are also proposed. The simulation results show that the Bayesian method has a higher coverage probability than the existing method, so the Bayesian method is recommended for use. This research is related to the topic of asymmetrical probability distributions and applications across disciplines. The predictive interval of the future observation based on the right type II censored sample is also provided. One biometrical example is given to illustrate the proposed methods for the Bayesian interval estimations and prediction interval.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Biometrical method"

1

Holeksa, David. "Návrh audio-vizuální databáze pro extrakci sekundárních biometrických a ne-biometrických znaků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220544.

Повний текст джерела
Анотація:
The aim of this semester project is to design a suitable database structure for the audio-visual data, parts extracted from the data corresponding to secondary biometric and non-biometric characteristics and description of these characters. The resulting database will be used for research into the identification of audio-visual content of multimedia data.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Fransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Повний текст джерела
Анотація:
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began to search for biometric methods that are available today to find them that would be best suited together with a mobile phone. After we had read information about them we did choose three methods for further investigation. These methods were Fingerprint Recognition, Iris Scan and Speaker Verification. Iris Scan is the method that is best suited to solve the authentication problem. The reasons for this are many. One of them is the uniqueness and stability of the iris, not even identical twins or the pair of the same individual has the same iris minutiae. The iris is also very protected behind eyelids, cornea and the aqueous humor and therefore difficult to damage. When it comes to the method itself, is it one of the most secure methods available today. One of the reasons for this is that the equal error rate is better than one in a million. However, this rate can be even better. It all depends on the Hamming Distance, which is a value that show how different the saved and temporarily template are, and what it is set to. To solve our session authentication, which was to make sure that no one else could take over a connected mobile phone, a sensor plate is the answer. This sensor will be able to sense for touch, heat and pulse. These three sensor measurements will together secure a validated session since the mobile phone will disconnect if the sensor looses its sensor data. There are, however, technological and other challenges to be solved before our proposed solutions will become viable. We address some of these issues in our thesis.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Betschart, Willie. "Applying intelligent statistical methods on biometric systems." Thesis, Blekinge Tekniska Högskola, Avdelningen för signalbehandling, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1694.

Повний текст джерела
Анотація:
This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The layer is influenced by the general procedure of biometrics in a multimodal behavioural way. It is working in an unsupervised way and performs in an unsupervised manner. While biometric systems are increasingly adopted the technologies have some inherent problems such as false match and false non-match. In practice, a rejected user can not be interpreted as an impostor since the user simply might have problems using his/her biometric feature. The proposed methods in this project are dealing with these problems when analysing biometric usage in runtime. Another fact which may give rise to false rejections is template aging; a phenomenon where the enrolled user’s template is too old compared towards the user’s current biometric feature. A theoretical approach of template aging was known; however since the analysis of template aging detection was correlated with potential system flaws such as device defects or human generated risks such as impostor attacks this task would become difficult to solve in an unsupervised system but when ignoring the definition of template aging, the detection of similar effects was possible. One of the objectives of this project was to detect template aging in a predictive sense; this task failed to be carried out because the absence of basis performing this kind of tasks. The developed program performs abnormality detection at each incoming event from a biometric system. Each verification attempt is assumed to be from a genuine user unless any deviation according to the user's history is found, an abnormality. The possibility of an impostor attack depends on the degree of the abnormality. The application makes relative decisions between fraud possibilities or if genuine user was the source of what caused the deviations. This is presented as an alarm with the degree of impostor possibility. This intelligent layer has increased Optimum preCon´s capacity as a surveillance tool for biometrics. This product is an efficient complement to biometric systems in a steady up-going worldwide market.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Anderson, Niall Hay. "Methods for the investigation of spatial clustering, with epidemiological applications." Thesis, University of Glasgow, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.364260.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Fakhir, Mahammad Majed. "Biometric fusion methods for adaptive face recognition in computer vision." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/4001.

Повний текст джерела
Анотація:
Face recognition is a biometric method that uses different techniques to identify the individuals based on the facial information received from digital image data. The system of face recognition is widely used for security purposes, which has challenging problems. The solutions to some of the most important challenges are proposed in this study. The aim of this thesis is to investigate face recognition across pose problem based on the image parameters of camera calibration. In this thesis, three novel methods have been derived to address the challenges of face recognition and offer solutions to infer the camera parameters from images using a geomtric approach based on perspective projection. The following techniques were used: camera calibration CMT and Face Quadtree Decomposition (FQD), in order to develop the face camera measurement technique (FCMT) for human facial recognition. Facial information from a feature extraction and identity-matching algorithm has been created. The success and efficacy of the proposed algorithm are analysed in terms of robustness to noise, the accuracy of distance measurement, and face recognition. To overcome the intrinsic and extrinsic parameters of camera calibration parameters, a novel technique has been developed based on perspective projection, which uses different geometrical shapes to calibrate the camera. The parameters used in novel measurement technique CMT that enables the system to infer the real distance for regular and irregular objects from the 2-D images. The proposed system of CMT feeds into FQD to measure the distance between the facial points. Quadtree decomposition enhances the representation of edges and other singularities along curves of the face, and thus improves directional features from face detection across face pose. The proposed FCMT system is the new combination of CMT and FQD to recognise the faces in the various pose. The theoretical foundation of the proposed solutions has been thoroughly developed and discussed in detail. The results show that the proposed algorithms outperform existing algorithms in face recognition, with a 2.5% improvement in main error recognition rate compared with recent studies.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Iqbal, K. "Image detection and retrieval for biometric security from an image enhancement perspective." Thesis, Coventry University, 2011. http://curve.coventry.ac.uk/open/items/ed5b98d3-84e6-4070-89cb-7ede2f0e9c0b/1.

Повний текст джерела
Анотація:
Security methods based on biometrics have been gaining importance increasingly in the last few years due to recent advances in biometrics technology and its reliability and efficiency in real world applications. Also, several major security disasters that occurred in the last decade have given a new momentum to this research area. The successful development of biometric security applications cannot only minimise such threats but may also help in preventing them from happening on a global scale. Biometric security methods take into account humans’ unique physical or behavioural traits that help to identify them based on their intrinsic characteristics. However, there are a number of issues related to biometric security, in particular with regard to surveillance images. The first issue is related to the poor visibility of the images produced by surveillance cameras and the second issue is concerned with the effective image retrieval based on user query. This research addresses both issues. This research addresses the first issue of low quality of surveillance images by proposing an integrated image enhancement approach for face detection. The proposed approach is based on contrast enhancement and colour balancing methods. The contrast enhancement method is used to improve the contrast, while the colour balancing method helps to achieve a balanced colour. Importantly, in the colour balancing method, a new process for colour cast adjustment is introduced which relies on statistical calculation. It can adjust the colour cast and maintain the luminance of the whole image at the same level. The research addresses the second issue relating to image retrieval by proposing a content-based image retrieval approach. The approach is based on the three welliii known algorithms: colour histogram, texture and moment invariants. Colour histogram is used to extract the colour features of an image. Gabor filter is used to extract the texture features and the moment invariant is used to extract the shape features of an image. The use of these three algorithms ensures that the proposed image retrieval approach produces results which are highly relevant to the content of an image query, by taking into account the three distinct features of the image and the similarity metrics based on Euclidean measure. In order to retrieve the most relevant images the proposed approach also employs a set of fuzzy heuristics to improve the quality of the results further. The integrated image enhancement approach is applied to the enhancement of low quality images produced by surveillance cameras. The performance of the proposed approach is evaluated by applying three face detection methods (skin colour based face detection, feature based face detection and image based face detection methods) to surveillance images before and after enhancement using the proposed approach. The results show a significant improvement in face detection when the proposed approach was applied. The performance of the content-based image retrieval approach is carried out using the standard Precision and Recall measures, and the results are compared with wellknown existing approaches. The results show the proposed approach perform s better than the well-known existing approaches.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Mráček, Štěpán. "Biometric Recognition of 3D Faces." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237237.

Повний текст джерела
Анотація:
Diplomová práce byla vypracována na studijním pobytu na "Gjovik University College" v Norsku, a je zpracována v angličtině. Tato práce se zabývá rozpoznáváním 3D obličejů. Je zde popsán obecný biometrický systém a také konkrétní postupy používané při rozpoznávání 2D i 3D obličejů. Následně je navžena metoda pro rozpoznávání 3D obličejů. Algoritmus je vyvíjen a testován pomocí databáze Face Recognition Grand Challenge (FRGC). Během předzpracování jsou nalezeny význačné body v obličeji a následně je trojrozměrný model zarovnán do referenční polohy. Dále jsou vstupní data porovnávána s biometrickými šablonami uloženými v databázi, a to je zajištěno využitím tří základních technik pro rozpoznávání obličejů -- metoda eigenface (PCA), rozpoznávání založené na histogramu obličeje a rozpoznávání založené na anatomických rysech. Nakonec jsou jednotlivé metody spojeny do jednoho systému, jehož celková výsledná výkonnost převyšuje výkonnost jednotlivých použitých technik.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Subramanian, Ravichandran. "Orientation Invariance Methods for Inertial Gait." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7369.

Повний текст джерела
Анотація:
Intelligent devices such as smart phones, smart watches, virtual reality (VR) headsets and personal exercise devices have become integral elements of accessories used by many people. The ability of these devices to verify or identify the user could be applied for enhanced security and user experience customization among other things. Almost all these devices have built-in inertial sensors such as accelerometer and gyroscope. These inertial sensors respond to the movements made by the user while performing day to day activities like walking, getting up and sitting down. The response depends on the activity being performed and thus can be used for activity recognition. The response also captures the user's unique way of doing the activity and can be used as a behavioral biometric for verification or identification. The acceleration (accelerometer) and rate of rotation (gyroscope) are recorded in the device coordinate frame. But to determine the user's motion, these need to be converted to a coordinate frame relative to the user. In most situations the orientation of the device relative to the user can neither be controlled nor determined reliably. The solution to this problem requires methods to remove the dependence on device orientation while comparing the signals collected at different times. In a vast of majority of research to date, the performance of authentication algorithms using inertial sensors have been evaluated on small datasets with few tens of subjects, collected under controlled placement of the sensors. Very often stand alone inertial sensors have been used to collect the data. Stand alone sensors afford better calibration, while the sensors built into smart devices offer little or no means of calibration. Due to these limitations of the datasets used, it is difficult to extend the results from these research to realistic performance with a large number subjects and natural placement of off-the-shelf smart devices. This dissertation describes the Kabsch algorithm which is used to achieve orientation invariance of the recorded inertial data, enabling better authentication independent of device orientation. It also presents the Vector Cross Product (VCP) method developed to achieve orientation invariance. Details of a realistic inertial dataset (USF-PDA dataset) collected with commercial smart phones placed in natural positions and orientations using 101 subjects are given. The data includes sessions from different days on a subset of 56 subjects. This would enable realistic evaluation of authentication algorithms. This dataset has been made publicly available. The performance of five methods that address the orientation dependence of signals are compared to a baseline that performs no compensation for orientation of the device. The methods as a part of a overall gait authentication algorithm are evaluated on the USF-PDA dataset mentioned above and another large dataset with more than 400 subjects. The results show that the orientation compensation methods are able to improve the authentication performance on data with uncontrolled orientation to be close to performance on data collected with controlled orientation. The Kabsch method shows the highest improvement.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Robertson, Joshua. "The application of the human-biometric sensor interaction method to automated border control systems." Thesis, University of Kent, 2017. https://kar.kent.ac.uk/66822/.

Повний текст джерела
Анотація:
Biometrics components are used in many different systems and technologies to verify that the user is whom they say they are. In Automated Border Control systems, biometrics components used in conjunction with a traveller's documents to make sure the user is whom they say they are so that they can cross into a countries borders. The systems are expected to verify the identity with a higher degree than officers who manually check travellers. Each year the number of travellers crossing through a country borders increases and so systems are expected to handle bigger demands; through improving the user experience to ensuring accuracy and performance standards increase. While the system does bring its benefits through increased speed and higher security, there are drawbacks. One of the main issues with the systems is a lack of standardisation across implementations. Passing through an automated process at Heathrow may be different to Hong Kong. The infrastructure, information, environment and guidance given during the transaction will all greatly differ for the user. Furthermore, the individual components and subsequent processing will be evaluated using a different methodology too. This thesis reports on the contrasts between implementations, looking at solutions which utilise different biometric modalities and travel documents. Several models are devised to establish a process map which can be applied to all systems. Investigating further, a framework is described for a novel assessment method to evaluate the performance of a system. An RGB-D sensor is implemented, to track and locate the user within an interactive environment. By doing so, the user's interaction is assessed in real-time. Studies then report on the effectiveness of the solution within a replicated border control scenario. Several relationships are studied to improve the technologies used within the scenario. Successful implementation of the automated assessment method may improve the user's experience with systems, improving information and guidance, increasing the likelihood of successful interaction while maintaining a high level of security and quicker processing times.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Bin, Safie Sairul Izwan. "Pulse domain novel feature extraction methods with application to ecg biometric authentication." Thesis, University of Strathclyde, 2012. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=17829.

Повний текст джерела
Анотація:
This thesis presents the concept of representing finite signals in terms of sequential output pulses called pulse domain to extract Electrocardiogram (ECG) features for biometric authentication systems. Two novel methods based on the pulse domain philosophy namely Pulse Active (PA) and Adaptive Pulse Active (APA) techniques are presented in this thesis. A total of 11 algorithms are derived from these two methods and used to generate novel ECG feature vectors. Six algorithms of the PA technique are named as Pulse Active Bit (PAB), Pulse Active Width (PAW), Pulse Active Area (PAA), Pulse Active Mean (PAM), Pulse Active Ratio (PAR) and Pulse Active Harmonic (PAH). Five APA algorithms are named as Adaptive Pulse Active Bit (APAB), Adaptive Pulse Active Width (APAW), Adaptive Pulse Active Area (APAA), Adaptive Pulse Active Mean (APAM) and Adaptive Pulse Active Harmonic (APAH). The proposed techniques are validated using ECG experimental data from 112 subjects. Simulation results indicate that APAW generates the best biometric performance of all 11 algorithms. Selected ranges of PA and APA parameters are determined in this thesis that generates approximate similar biometric performance. Using this suggested range, these parameters are than used as a personal identification number (PIN) which are a part of the proposed PA-APA ECG based multilevel security biometric authentication system.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Biometrical method"

1

Derbel, Nabil, and Olfa Kanoun, eds. Advanced Methods for Human Biometrics. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81982-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Harvey, Schuster, and Metzger Wilfred, eds. Biometrics: Methods, applications and analyses. Hauppauge, N.Y: Nova Science Publishers, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Biometrics: Methods, applications and analyses. New York: Nova Science Publishers, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Biometrics: Theory, methods, and applications. Piscataway, N.J: IEEE Press, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ranta, Esa. Biometria: Tilastotiedettä ekologeille. 4th ed. Helsinki: Yliopistopaino, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Schuckers, Michael E. Computational Methods in Biometric Authentication. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-202-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Schuckers, Michael E. Computational methods in biometric authentication: Statistical methods for performance evaluation. London: Springer, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bilan, Stepan, Mohamed Elhoseny, and D. Jude Hemanth, eds. Biometric Identification Technologies Based on Modern Data Mining Methods. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-48378-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Pejaś, Jerzy, and Andrzej Piegat, eds. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b101135.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

1928-, Searle S. R., ed. Proceedings of the conference in honor of Shayle R. Searle: August 9-10, 1996, Biometrics Unit, Cornell University. Ithaca, NY: Biometrics Unit, Cornell University, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Biometrical method"

1

Kumlander, Deniss. "Soft Biometrical Students Identification Method for e-Learning." In Advances in Computer and Information Sciences and Engineering, 114–18. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-8741-7_21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ding, Sophia, Emilia Nunes, Pascal Bettendorff, and Weyde Lin. "Biometrics." In Trends in Data Protection and Encryption Technologies, 121–28. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_22.

Повний текст джерела
Анотація:
AbstractIn biometrics, physiological characteristics (e.g., fingerprints, facial features, voices) are measured to identify individuals. Since biometry does not share the same characteristics as other authentication techniques, such as passwords or PIN codes, it is widely used as a second-factor authentication. A fully integrated solution offers significant advantages as it aligns biometric hardware, key generation, validation, and storage with the cryptographic provider, providing a coherent control environment. As a result, designing and implementing secure biometric authentication methods requires highly specialized technical expertise and experience. In addition, as biometrics become prevalent and their integration with artificial intelligence systems increases, ethical and regulatory questions become more pressing.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wen, Mengna, Ziyun Ye, and Jinfeng Yang. "Finger Trimodal Features Coding Fusion Method." In Biometric Recognition, 466–74. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20233-9_47.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zeng, Junying, Yao Chen, Chuanbo Qin, Fan Wang, Junying Gan, Yikui Zhai, and Boyuan Zhu. "A Novel Method for Finger Vein Recognition." In Biometric Recognition, 46–54. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31456-9_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zhang, Yongliang, Xiaozhu Chen, Xiao Chen, Dixin Zhou, and Erzhe Cao. "An Eye Localization Method for Iris Recognition." In Biometric Recognition, 420–27. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69923-3_45.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Luo, Qi, Hongxia Wang, and Jianyun Chen. "Phase Retrieval by the Inverse Power Method." In Biometric Recognition, 223–30. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97909-0_24.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tapiador, Marino, and Juan A. Sigüenza. "Writer Identification Method Based on Forensic Knowledge." In Biometric Authentication, 555–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_76.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

He, Xiaofu, Yue Lu, and Pengfei Shi. "A New Fake Iris Detection Method." In Advances in Biometrics, 1132–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_114.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ren, Chunxiao, Yilong Yin, and Yanbin Ning. "A Performance Improvement Method for Existing Fingerprint Systems." In Biometric Recognition, 120–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35136-5_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hu, Changhui, Xiaobo Lu, and Yijun Du. "A Novel Face Recognition Method Using Vector Projection." In Biometric Recognition, 61–69. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12484-1_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Biometrical method"

1

Kirci, Murvet, and Faezeh Sadat Babmir. "A digest-based method for efficiency improvement of security in biometrical cryptography authentication." In 2017 International Symposium on Computer Science and Software Engineering Conference (CSSE). IEEE, 2017. http://dx.doi.org/10.1109/csicsse.2017.8320113.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

de Araújo, Lúcio B., Manuela M. Oliveira, Carlos Tadeu dos S. Dias, Amílcar Oliveira, and Teresa A. Oliveira. "Tucker3 method in biometrical research: Analysis of experiments with three factors, using R." In NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2012: International Conference of Numerical Analysis and Applied Mathematics. AIP, 2012. http://dx.doi.org/10.1063/1.4756506.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Denisova, Anna. "An improved simple feature set for face presentation attack detection." In WSCG'2022 - 30. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2022. Západočeská univerzita, 2022. http://dx.doi.org/10.24132/csrn.3201.3.

Повний текст джерела
Анотація:
Presentation attacks are weak points of facial biometrical authentication systems. Although several presentation attack detection methods were developed, the best of them require a sufficient amount of training data and rely on computationally intensive deep learning based features. Thus, most of them have difficulties with adaptation to new types of presentation attacks or new cameras. In this paper, we introduce a method for face presentation attack detection with low requirements for training data and high efficiency for a wide range of spoofing attacks. The method includes feature extraction and binary classification stages. We use a combination of simple statistical and texture features and describe the experimental results of feature adjustment and selection. We validate the proposed method using WMCA dataset. The experiments showed that the proposed features decrease the average classification error in comparison with the RDWT-Haralick-SVM method and demonstrate the best performance among non-CNN-based methods.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sarangaraja, A. P., D. Rajagopalan, A. Vignesh, and P. Mohamed Fathimal. "Secret Sharing Scheme with Fingerprint Authentication." In International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-u6em0l.

Повний текст джерела
Анотація:
Medical imaging is very important in medical diagnosis. X-rays, ultrasound images, CT scans, brain pictures, and patient mri images are examples of images that contain sensitive information. However, poor communication channels and loopholes in hospital and medical centre storage systems risk accessing these images by unauthorised individuals who utilise them for nefarious purposes other than diagnostics. Image encryption is a common strategy for enhancing the integrity of communication and storage channels for protecting medical images from unauthorized access. This task proposes a biometrics-based method of secret sharing. Instead of sharing secrets between participants as in encryption, the biometric properties of participants create a single biometric configuration. If the biometric vaults are verified for the required number of actual during the authentication process, participants must provide a valid encryption key from the configuration is disclosed.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Jangua, Daniel, and Aparecido Marana. "A New Method for Gait Recognition Using 2D Poses." In Workshop de Visão Computacional. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/wvc.2020.13483.

Повний текст джерела
Анотація:
Over the last decades, biometrics has become an important way for human identification in many areas, since it can avoid frauds and increase the security of individuals in society. Nowadays, most popular biometric systems are based on fingerprint and face features. Despite the great development observed in Biometrics, an important challenge lasts, which is the automatic people identification in low-resolution videos captured in unconstrained scenarios, at a distance, in a covert and noninvasive way, with little or none subject cooperation. In these cases, gait biometrics can be the only choice. The goal of this work is to propose a new method for gait recognition using information extracted from 2D poses estimated over video sequences. For 2D pose estimation, our method uses OpenPose, an open-source robust pose estimator, capable of real-time multi-person detection and pose estimation with high accuracy and a good computational performance. In order to assess the new proposed method, we used two public gait datasets, CASIA Gait Dataset-A and CASIA Gait Dataset-B. Both datasets have videos of a number of people walking in different directions and conditions. In our new method, the classification is carried out by a 1-NN classifier. The best results were obtained by using the chi-square distance function, which obtained 95.00% of rank-1 recognition rate on CASIA Gait Dataset-A and 94.22% of rank-1 recognition rate on CASIA Gait Dataset-B, which are comparable to state-of-the-art results.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Gaipov, J. B. "DIGITAL PAYMENT TECHNOLOGIES WITH BIOMETRICS." In НОВЫЕ БИЗНЕС-МОДЕЛИ ЦИФРОВОЙ ЭКОНОМИКИ В СУБЪЕКТАХ РФ. ХГУЭП, 2022. http://dx.doi.org/10.38161/978-5-7823-0753-0-2022-131-134.

Повний текст джерела
Анотація:
This article focuses on identifying and studying the technology of payment systems with biometrics for further improvement and anticipation of development, in the banking sector of the Republic of Uzbekistan, examines the key problems hindering the development of the innovative payment systems market and analyses the activities of commercial banks in the digital services market of the Republic of Uzbekistan in the context of information technology development and digitalization of the economy in the banking sector. Methodological techniques and methods of evaluation of efficiency of using biometric data of payment systems are investigated. Details of basic payment systems, their development and distribution in different countries are determined. Modern trends in the development of electronic payment systems and services using modern IT-technologies are presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Rahmes, Mark, Josef DeVaughn Allen, Abdelmoula Elharti, and Gnana Bhaskar Tenali. "Fingerprint Reconstruction Method Using Partial Differential Equation and Exemplar-Based Inpainting Methods." In 2007 Biometrics Symposium. IEEE, 2007. http://dx.doi.org/10.1109/bcc.2007.4430539.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Veiga, Rafael, Cristiano B. Both, Iago Medeiros, Denis Rosário, and Eduardo Cerqueira. "A Federated Learning Approach for Authentication and User Identification based on Behavioral Biometrics." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc.2023.536.

Повний текст джерела
Анотація:
A smartphone can collect behavioral data without requiring additional actions on the user’s part and without the need for additional hardware. In an active or continuous user authentication process, information from integrated sensors, such as touch, and gyroscope, is used to monitor the user continuously. These sensors can capture behavioral (touch patterns, accelerometer) or physiological (fingerprint, face) data of the user naturally interacting with the device. However, transferring data from multiple users’ mobile devices to a server is not recommended due to user data privacy concerns. This paper introduces an Federated Learning (FL) approach to define a user’s biometric behavior pattern for continuous user identification and authentication. We also evaluate whether FL can be helpful in behavioral biometrics. Evaluation results compare CNNs in different epochs using FL and a centralized method with low chances of wrong predictions in user identification by the gyroscope.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Karabat, Cagatay, and Hakan Erdogan. "Trustworthy biometric hashing method." In 2009 IEEE 17th Signal Processing and Communications Applications Conference (SIU). IEEE, 2009. http://dx.doi.org/10.1109/siu.2009.5136333.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

"Entropy based Biometric Template Clustering." In International Conference on Pattern Recognition Applications and Methods. SciTePress - Science and and Technology Publications, 2013. http://dx.doi.org/10.5220/0004266205600563.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Biometrical method"

1

Soller, Moshe (Morris), Hans Cheng, and Lyman Crittenden. Mapping the Chicken Genome, Including Loci Affecting Traits of Economic Importance. United States Department of Agriculture, September 1994. http://dx.doi.org/10.32747/1994.7568779.bard.

Повний текст джерела
Анотація:
A total of 195 microsatellites were added to the chicken genome map. Mapping of fifty known genes revealed a high degree of conserved linkage order between human and chicken genomes. A new, statistically powerful mapping design, the full-sib intercross line (produced by mating two parents, and intercrossing their progeny over a number of generations), was developed for use in species with high reproductive capacity. The Jerusalem Resource Population (JRP), now at the F12 generation, was established to implement this design i chickens. The biometrical picutre in the JRP is similar to that generally found in chicken populations; inbreeding effects were not observed. The F2 and F3 generations of the JRP were genotyped with respect to twelve production traits, using a battery of 23 microsatellites markers. The number of significant effects was twice that expected on chance alone, validating the high statistical power of the JRP with respect to QTL differentiating the parental lines. Selective DNA pooling, based on estimation of marker allele frequencies in pooled DNA samples, has been proposed to reduce high genotyping costs of QTL mapping. A method to correct for overlapping shadow bands of dinucleotide microsatellite markers in pooled DNA samples was developed and validated. In a retrospective study using this procedure, previously mapped loci affecting Marek's disease were successfully identified.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Frenzen, Christopher L. Convolution Methods for Mathematical Problems in Biometrics. Fort Belvoir, VA: Defense Technical Information Center, January 1999. http://dx.doi.org/10.21236/ada359925.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Varastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani, and Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, December 2020. http://dx.doi.org/10.34074/ocds.086.

Повний текст джерела
Анотація:
Authentication methods based on human traits, including fingerprint, face, iris, and palm print, have developed significantly, and currently they are mature enough to be reliably considered for human identification purposes. Recently, as a new research area, a few methods based on non-facial skin features such as vein patterns have been developed. This literature review paper explores some key biometric systems such as face recognition, iris recognition, fingerprint, and palm print, and discusses their respective advantages and disadvantages; then by providing a comprehensive analysis of these traits, and their applications, vein pattern recognition is reviewed.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Cheng, Su Lan, Ross J. Micheals, and Z. Q. John Lu. Comparison of confidence intervals for large operational biometric data by parametric and non-parametric methods. Gaithersburg, MD: National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7740.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Тарасова, Олена Юріївна, and Ірина Сергіївна Мінтій. Web application for facial wrinkle recognition. Кривий Ріг, КДПУ, 2022. http://dx.doi.org/10.31812/123456789/7012.

Повний текст джерела
Анотація:
Facial recognition technology is named one of the main trends of recent years. It’s wide range of applications, such as access control, biometrics, video surveillance and many other interactive humanmachine systems. Facial landmarks can be described as key characteristics of the human face. Commonly found landmarks are, for example, eyes, nose or mouth corners. Analyzing these key points is useful for a variety of computer vision use cases, including biometrics, face tracking, or emotion detection. Different methods produce different facial landmarks. Some methods use only basic facial landmarks, while others bring out more detail. We use 68 facial markup, which is a common format for many datasets. Cloud computing creates all the necessary conditions for the successful implementation of even the most complex tasks. We created a web application using the Django framework, Python language, OpenCv and Dlib libraries to recognize faces in the image. The purpose of our work is to create a software system for face recognition in the photo and identify wrinkles on the face. The algorithm for determining the presence and location of various types of wrinkles and determining their geometric determination on the face is programmed.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії