Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








145 Hits in 5.0 sec

Biometrical Fingerprint Recognition: Don't get your Fingers Burned [chapter]

Ton Putte, Jeroen Keuning
2000 Smart Card Research and Advanced Applications  
This article focuses on the drawbacks and risks of biometric verification, specifically verification based on fingerprints.  ...  However, there are ways to compromise a system based on biometric verification.  ...  iris recognition retina recognition vein pattern recognition face recognition recognition of hand or finger geometry fingerprint recognition Before a system is able to verify the specific biometrics of  ... 
doi:10.1007/978-0-387-35528-3_17 fatcat:zt4s7liwgrb5nmzbwg7772bsvq

A Novel Extended Biometric Approach for Human Character Recognition using Fingerprints

Rohit RPrabhu, C. N. Ravikumar
2013 International Journal of Computer Applications  
The recent innovations in Biometrics and its allied areas like pattern recognition have made the task of verification and identification, a reality which is savored in many applications like granting Unique  ...  Palmistry as an abstract science and current systems of pattern recognition can be leveraged in assessing the personality and character of a person which is the basis of our work.  ...  and don't get changed thereafter  ... 
doi:10.5120/13361-0954 fatcat:5tpnlwhyvvf4hkk6vji6hk5biu

Classification of Large Biometric Data in Database System

Varisha Alam*, Pursuing, MTech, Department of Computer Science and Engineering, Integral University, Lucknow, India., Dr. Mohammad Arif, Associate Professor, Department of Computer Science & Engineering, Integral University, Lucknow, India.
2021 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
An effective bunching method suggest for dividing enormous biometrics data set through recognizable proof. This method depends on the changed B+ tree is decreasing the discs get to.  ...  Biometric character are data separated from biometric tests, which can use for examination with a biometric orientation.  ...  Hence, these biometric confirmation frameworks don't accomplish the best outcome.  ... 
doi:10.35940/ijitee.d8592.08101021 fatcat:j6yxdi67xzdx7o5bipxnjgwgfq

BIOMETRIC SYSTEMS SECURITY

2017 Scientific Bulletin of Naval Academy  
Implementing a robust security technologies involves advanced authentication, and biometric systems fall into this category.  ...  Biometrics will play a major role in different industries, from medicine, science, robotics, defence and many areas of enterprise business.  ...  In the book "Biometrical Fingerprint Recognition Don't Get Your Fingers Burned " by Van der Putte and T.  ... 
doi:10.21279/1454-864x-17-i1-066 fatcat:xyttvho3mvcf7mdys2j73qerty

Physical Security and Biometrics [chapter]

Umesh Hodeghatta Rao, Umesha Nayak
2014 The InfoSec Handbook  
We have seen these biometrics systems being defeated by the severed finger of an authorized but slain officer, through static pictures of iris, through forged fingerprints.  ...  Physical biometric systems use methods such as fingerprint biometrics, facial biometrics, hand biometrics, Iris biometrics, retina biometrics, and vascular pattern biometrics. • Fingerprint Biometrics:  ... 
doi:10.1007/978-1-4302-6383-8_14 fatcat:qqcoqy4hgrc4xjxr3r6s7wp7k4

Impact of artificial "gummy" fingers on fingerprint systems

Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, Satoshi Hoshino, Rudolf L. van Renesse
2002 Optical Security and Counterfeit Deterrence Techniques IV  
Potential threats caused by something like real fingers, which are called fake or artificial fingers, should be crucial for authentication based on fingerprint systems.  ...  This paper reports that gummy fingers, namely artificial fingers that are easily made of cheap and readily available gelatin, were accepted by extremely high rates by particular fingerprint devices with  ...  .: Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned, SMART CARD RESEARCH AND ADVANCED APPLICATIONS, IFIP TCS/WG8.8 Four\th Working Conference on Smart Card Research and Advanced Applications  ... 
doi:10.1117/12.462719 fatcat:hneuedzvazfhxjptvw2hgvz6oq

An Investigation on Biometric Internet Security

Omprakash Kaiwartya, Mukesh Prasad, Shiv Prakash, Durgesh Samadhiya, Abdul Hanan Abdullah, andSyed Othmawi Abd Rahman
2017 International Journal of Network Security  
Biometric recognition is discussed in detail wit pros and cons of the approach as a key e-security solution.  ...  Biometric recognition is also investigated as a key e-security solution. E-Security is precisely described to understand the concept and requirements.  ...  His current research interests include machine learning, pattern recognition, fuzzy systems, neural networks and Wireless Sensor Networks. Dr.  ... 
dblp:journals/ijnsec/KaiwartyaPPSAR17 fatcat:kesafrz5kfasvp5bhwvk4peciy

A Study On Multi Phase Security Solutions To Atm Banking Systems

K. Krishna Prasad
2018 Zenodo  
Following are the different tips to educate the customer.  Don't reveal PIN  Don't write PIN anywhere try to remember it  Always pay close attention to the ATM and your surroundings.  ...  Onyesolu and Ezeani (2012) [9] proposed an embedded fingerprint biometric authentication scheme for Automatic Teller Machine (ATM).  ... 
doi:10.5281/zenodo.1481540 fatcat:efwbgfgdobgxjhymx7vgvkwjpa

A Study on Multi Phase Security Solutions to ATM Banking System

Krishna Prasad K.
2018 International journal of applied engineering and management letters  
Following are the different tips to educate the customer. • Don't reveal PIN • Don't write PIN anywhere try to remember it • Always pay close attention to the ATM and your surroundings.  ...  Onyesolu and Ezeani (2012) [9] proposed an embedded fingerprint biometric authentication scheme for Automatic Teller Machine (ATM).  ... 
doi:10.47992/ijaeml.2581.7000.0030 fatcat:i4pokroxyjaaxnw3uopceduazi

A STUDY ON MULTIPLE METHODS OF FINGERPRINT HASH CODE GENERATION BASED ON MD5 ALGORITHM USING MODIFIED FILTERING TECHNIQUES AND MINUTIAE DETAILS

Krishna Prasad K
2021 Zenodo  
A STUDY ON MULTIPLE METHODS OF FINGERPRINT HASH CODE GENERATION BASED ON MD5 ALGORITHM USING MODIFIED FILTERING TECHNIQUES AND MINUTIAE DETAILS - Thesis  ...  The fingerprint hash code is not constant with biometric sensors or reader (https://hackaday.com/2015/11/10/your-unhashable-fingerprints-secure-nothing/).  ...  Today numerous biometric innovations, for example, fingerprint, face recognition, iris, voice print and hand-based biometrics attributes (palm print or unique finger impression) can be utilized to recognize  ... 
doi:10.5281/zenodo.5140714 fatcat:steqwl6bcrg3volizjwqk2weuu

Humanode Whitepaper: You are [not] a bot [article]

Dato Kavazi, Victor Smirnov, Sasha Shilina, MOZGIII, MingDong Li, Rafael Contreras, Hardik Gajera, Dmitry Lavrenov, the Humanode Core
2021 arXiv   pre-print
Users will be able to deploy nodes by staking their encrypted biometric data.  ...  Recognition 3 3 2 3 2 3 3 3 3 3 Facial Thermography Recognition 3 3 2 3 3 3 3 3 3 1 Fingerprint 3 2 3 2 2 1 1 3 1 3 Palm Print / Footprint Recognition 2 2 3 2 2 2 1 3 2 2 Finger/Hand Geometry Recognition  ...  that your vote was practically burned and a person that you did not vote for might be representing you.  ... 
arXiv:2111.13189v1 fatcat:6pc4nj46sjdkvketwydvwh2ulu

Internet of Things (IoT)

Radouan Ait Radouan Ait Mouha
2021 Journal of Data Analysis and Information Processing  
IoT is everywhere, although we don't always see it or know that a device is part of it.  ...  When you place your finger on its surface, the edges of your fingerprints touch the surface while there is a slight gap between the sockets between the edges.  ...  Not only does this provide live finger verification, but it provides more information as a biometric.  ... 
doi:10.4236/jdaip.2021.92006 fatcat:qaxcgxdi75hplgjh3lz7zj23om

Photonics4All App - English [article]

Nora Taourirt
2016 Zenodo  
Those information are called biometrics. Fingerprints are the most known biometrics and the oldest. It has been used by the police for more than hundred years.  ...  Now ink can be used but most of fingerprints images (like in a passport) are made with cameras: Finger placed on a glass panel and light reflects on fingerprints to go the camera that gives a clean image  ...  The reflection design is useful to get thin devices but transmission design can also be used even if more light is needed for the transmission of finger is very low (less than 10%).  ... 
doi:10.5281/zenodo.401004 fatcat:gakgz5mtdzcrjm4kxcctjqfhha

'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective

John R. Sliter
2012 Social Science Research Network  
There are measures that can be taken for both name-based and fingerprint-based searches. There are numerous user authentication systems available, some of which are biometric based 57 .  ...  Their new nano tech fingerprint system was able to produce fingerprints from cases that were decades old.  ... 
doi:10.2139/ssrn.2143915 fatcat:4a7irg4xr5hqho3hwe6cdvpjmy

These fine lines: locating noncitizenship in political protest in Europe

Heather L. Johnson
2015 Citizenship Studies  
Then turn the front two oven rings of your oven on and wait until they are red hot. Then lay four fingers of your right hand on the right oven ring and the four fingers of the left on the left ring.  ...  Such a question is worth asking beyond the act of the burning of fingerprints, a violent and embodied act of resistance against the border regimes of Europe.  ... 
doi:10.1080/13621025.2015.1110287 fatcat:sqmaykubdjgbloiebihiun7v4u
« Previous Showing results 1 — 15 out of 145 results