A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Biometrics or ... biohazards?
2002
Proceedings of the 2002 workshop on New security paradigms - NSPW '02
Secure biometric applications can't be built from flawed components--one can't make a silk purse from a sow's ear, Irish folk wisdom reminds us. Revolution, not evolution, must be the new paradigm. ...
authentication of individual human identities; particularly of those who are runaways, illegal immigrants, fugitives, criminals, terrorists, and so on. ...
token/one-time password, or smart card; when combined with the above, strong two-factor authentication; • "Something You Are"--Personal recognition by a human security guard, or recognition by automation ...
doi:10.1145/844102.844120
dblp:conf/nspw/Williams02
fatcat:febcqjodpfaq3hmmp65qh7peyy
Biometrics or ... biohazards?
2002
Proceedings of the 2002 workshop on New security paradigms - NSPW '02
Secure biometric applications can't be built from flawed components--one can't make a silk purse from a sow's ear, Irish folk wisdom reminds us. Revolution, not evolution, must be the new paradigm. ...
authentication of individual human identities; particularly of those who are runaways, illegal immigrants, fugitives, criminals, terrorists, and so on. ...
token/one-time password, or smart card; when combined with the above, strong two-factor authentication; • "Something You Are"--Personal recognition by a human security guard, or recognition by automation ...
doi:10.1145/844118.844120
fatcat:rl7b3h6f4vbv7lyrjavw72ptvq
Radar-Based Invisible Biometric Authentication
2024
Information
The main test devised was authentication, where a system seeks to validate an individual's claimed identity. ...
The spectral distributions of the BR signal were studied as the biometric template. ...
activity through walls [39] . ...
doi:10.3390/info15010044
fatcat:xsuzedzsrnd4vjsgaaf7lxuzty
Emerging biometric modalities: a survey
2008
Journal on Multimodal User Interfaces
A continuously increasing number of biometric techniques have risen in order to fulfill the different kinds of demands in the market. ...
This is the reason why researchers continuously drive their efforts to newer methods that will provide a higher security stage. In this paper, the emerging biometric modalities are presented. ...
Introduction Biometric recognition of people is a pioneering and evolving research area that aims to fulfil the human need for security. ...
doi:10.1007/s12193-009-0020-x
fatcat:rqotdmxc3nbmtkqse5cwikawuq
Intelligent Multimedia Analysis for Emerging Biometrics
[chapter]
2010
Studies in Computational Intelligence
In this chapter, emerging biometric modalities that appeared in the last years in order to improve the performance of biometric recognition systems, are presented. ...
This is the reason for which researchers are on a continuous effort for more efficient and generic biometric modalities that can be used in various applications. ...
Introduction Biometric recognition is a well-known research area that aims to provide more efficient solutions to everyday growing human need for security. ...
doi:10.1007/978-3-642-11756-5_5
fatcat:4tglhqz245gyhpvpszr36th5dy
Real‐time recognition of human motions using multidimensional features in ultrawideband biological radar
2021
IET Biometrics
Human motion recognition for biological radar has made astonishing progress. ...
Furthermore, because action reflects the behaviour of a human within a period, and the start and end are unavailable, intercepting fixed-length data in the time domain for recognition is not feasible. ...
It aims to detect the characteristics of life in a non-contact, remote and unconstrained manner through non-metallic obstacles such as clothes and walls [1] . ...
doi:10.1049/bme2.12038
fatcat:wlay77bi4vbcnpyq6vawhn4fuq
Use of Biometrics and Artificial Intelligence in Libraries
2021
International Journal of Research in Library Science
It is certain that biometric-based recognition and artificial intelligence will have a profound influence on the security of information in Library and Information Centers. ...
In factual scenario, blend of AI and biometric identification and a keypad code provides virtually unbreakable security. ...
Normally thought to be like human intelligence such as learning, adapting, and self-correction. The extension of human intelligence through the use of computers, as in times past physical power was through ...
doi:10.26761/ijrls.7.1.2021.1368
fatcat:kacaifwxxrc3rbvvqacgsd2m4q
Lightweight Biometric Sensing for Walker Classification Using Narrowband RF Links
2017
Sensors
This article proposes a lightweight biometric sensing system using ubiquitous narrowband radio frequency (RF) links for path-dependent walker classification. ...
in indoor and outdoor environment [23, 24] , through to respiratory monitoring [25] , motion recognition [26, 27] , and elderly fall detection [28, 29] . ...
Therefore, human gait is considered as a highly unique feature for biometric representation and is used as a valid criterion for identification. ...
doi:10.3390/s17122815
pmid:29206188
pmcid:PMC5751503
fatcat:tfay5vvdtzh3bnyg6uuulqgbzy
Anatomy of a Biometric System
[chapter]
2010
Vein Pattern Recognition
Biometrics offers some clear advantages over traditional identity methods: Biometric traits cannot be lost, stolen, or borrowed. • Generally, physical human characteristics are much more diffi-• cult to ...
Most enterprises still rely on antiquated card-based badges that require a radio-frequency identification (RFID) reader posted at the entrance to a building, floor, or room. ...
doi:10.1201/9781439821381-9
fatcat:vwxcgnefnfhupiomui7capmyni
Biometrics: In Search of Identity and Security (Q & A)
2017
IEEE Multimedia
To address the issues like identity theft and security threats, a continuously evolving technology known as biometrics is presently being deployed in a wide range of personal, government, and commercial ...
Despite the great progress in the field, several exigent problems have yet to be addressed to unleash biometrics full potential. ...
ACKNOWLEDGMENT This research work has been partially supported by a grant from the European Commission (H2020 MSCA RISE 690907 "IDENTITY"). ...
doi:10.1109/mmul.2017.265090754
fatcat:lab3frtx2na6tc65gcp4cxfdqm
Automated Air Baggage Security Enhancements with Biometric Recognition using Programmable Logic Controller
2014
International Journal of Computer Applications
This work intends to automate and provide a secure, human intervention-free air baggage security cum access system. ...
The third phase illustrates how the baggage is being transported to the airplanes using a long ramp like conveyor.The fourth phase illustrates the process being carried out at the destination. ...
RFID integrated along with PLC and Biometric Recognition such as Finger-print recognition or Retinal Recognition proves to be an efficient solution. ...
doi:10.5120/16765-6327
fatcat:daronunvajh75iuwnptdzvkpky
The Promise of Radio Analytics: A Future Paradigm of Wireless Positioning, Tracking, and Sensing
2018
IEEE Signal Processing Magazine
A future paradigm for wireless positioning, tracking, and sensing © iS t o c k p h o t o .c o m /c h o m b o S a n W ...
In addition, human activities affect wireless signal propagation, so understanding and analyzing how these signals react to human activities can reveal rich information about the activities around us. ...
As a result, human radio biometrics captured through radio shot are buried in the CSI by other useless components. ...
doi:10.1109/msp.2018.2806300
fatcat:pffib6pqurgdhmtomgeiw6gomu
The Digital Way Using Biometric Data
2020
Contemporary problems of social work
All this serves as a key point for forming an opinion about the safety of using biometric data in the formation of a digital human footprint. ...
the problem of using human biometric data in tracking a digital trace is considered. The possible outcomes of the future are traced and considered by the development of modern technologies. ...
This conclusion opens up a wide field for further research, which may include the development of proposals for the formation of a strategy for Russian-Chinese trade in educational services. ...
doi:10.17922/2412-5466-2020-6-3-4-11
fatcat:26fhhnfduffebeprmqflbiigwy
Human Biometric Signals Monitoring based on WiFi Channel State Information using Deep Learning
[article]
2022
arXiv
pre-print
Our WiFi-based technique addresses privacy concerns and is adapt- able to a variety of settings. ...
The inputs to the neural network are the amplitude and phase of channel state information collected by a pair of WiFi devices. ...
(b) Non-line-of-sight (NLOS, through the wall) environment.
Fig. 11 . 11 Fig. 11. ...
arXiv:2203.03980v1
fatcat:u347rlcogza23nrcwyt6nharoa
Biometric borders: Governing mobilities in the war on terror
2006
Political Geography
Second, the representation of biometrics and the body, such that identity is assumed to be anchored as a source of prediction and prevention. ...
This article proposes the concept of the biometric border in order to signal a dual-faced phenomenon in the contemporary war on terror: the turn to scientific technologies and managerial expertise in the ...
a terrorist is through biometrics' (cited in ''Biometrics: Great'', 2004, p. 17) . ...
doi:10.1016/j.polgeo.2006.02.001
fatcat:nxf4o2mxknahdnkzinouv4ueau
« Previous
Showing results 1 — 15 out of 1,693 results