Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,693 Hits in 4.9 sec

Biometrics or ... biohazards?

John Michael Williams
2002 Proceedings of the 2002 workshop on New security paradigms - NSPW '02  
Secure biometric applications can't be built from flawed components--one can't make a silk purse from a sow's ear, Irish folk wisdom reminds us. Revolution, not evolution, must be the new paradigm.  ...  authentication of individual human identities; particularly of those who are runaways, illegal immigrants, fugitives, criminals, terrorists, and so on.  ...  token/one-time password, or smart card; when combined with the above, strong two-factor authentication; • "Something You Are"--Personal recognition by a human security guard, or recognition by automation  ... 
doi:10.1145/844102.844120 dblp:conf/nspw/Williams02 fatcat:febcqjodpfaq3hmmp65qh7peyy

Biometrics or ... biohazards?

John Michael Williams
2002 Proceedings of the 2002 workshop on New security paradigms - NSPW '02  
Secure biometric applications can't be built from flawed components--one can't make a silk purse from a sow's ear, Irish folk wisdom reminds us. Revolution, not evolution, must be the new paradigm.  ...  authentication of individual human identities; particularly of those who are runaways, illegal immigrants, fugitives, criminals, terrorists, and so on.  ...  token/one-time password, or smart card; when combined with the above, strong two-factor authentication; • "Something You Are"--Personal recognition by a human security guard, or recognition by automation  ... 
doi:10.1145/844118.844120 fatcat:rl7b3h6f4vbv7lyrjavw72ptvq

Radar-Based Invisible Biometric Authentication

Maria Louro da Silva, Carolina Gouveia, Daniel Filipe Albuquerque, Hugo Plácido da Silva
2024 Information  
The main test devised was authentication, where a system seeks to validate an individual's claimed identity.  ...  The spectral distributions of the BR signal were studied as the biometric template.  ...  activity through walls [39] .  ... 
doi:10.3390/info15010044 fatcat:xsuzedzsrnd4vjsgaaf7lxuzty

Emerging biometric modalities: a survey

Georgios Goudelis, Anastasios Tefas, Ioannis Pitas
2008 Journal on Multimodal User Interfaces  
A continuously increasing number of biometric techniques have risen in order to fulfill the different kinds of demands in the market.  ...  This is the reason why researchers continuously drive their efforts to newer methods that will provide a higher security stage. In this paper, the emerging biometric modalities are presented.  ...  Introduction Biometric recognition of people is a pioneering and evolving research area that aims to fulfil the human need for security.  ... 
doi:10.1007/s12193-009-0020-x fatcat:rqotdmxc3nbmtkqse5cwikawuq

Intelligent Multimedia Analysis for Emerging Biometrics [chapter]

Georgios Goudelis, Anastasios Tefas, Ioannis Pitas
2010 Studies in Computational Intelligence  
In this chapter, emerging biometric modalities that appeared in the last years in order to improve the performance of biometric recognition systems, are presented.  ...  This is the reason for which researchers are on a continuous effort for more efficient and generic biometric modalities that can be used in various applications.  ...  Introduction Biometric recognition is a well-known research area that aims to provide more efficient solutions to everyday growing human need for security.  ... 
doi:10.1007/978-3-642-11756-5_5 fatcat:4tglhqz245gyhpvpszr36th5dy

Real‐time recognition of human motions using multidimensional features in ultrawideband biological radar

Jinxiao Zhong, Liangnian Jin, Qiang Mao
2021 IET Biometrics  
Human motion recognition for biological radar has made astonishing progress.  ...  Furthermore, because action reflects the behaviour of a human within a period, and the start and end are unavailable, intercepting fixed-length data in the time domain for recognition is not feasible.  ...  It aims to detect the characteristics of life in a non-contact, remote and unconstrained manner through non-metallic obstacles such as clothes and walls [1] .  ... 
doi:10.1049/bme2.12038 fatcat:wlay77bi4vbcnpyq6vawhn4fuq

Use of Biometrics and Artificial Intelligence in Libraries

Preeti Shrivastava
2021 International Journal of Research in Library Science  
It is certain that biometric-based recognition and artificial intelligence will have a profound influence on the security of information in Library and Information Centers.  ...  In factual scenario, blend of AI and biometric identification and a keypad code provides virtually unbreakable security.  ...  Normally thought to be like human intelligence such as learning, adapting, and self-correction.  The extension of human intelligence through the use of computers, as in times past physical power was through  ... 
doi:10.26761/ijrls.7.1.2021.1368 fatcat:kacaifwxxrc3rbvvqacgsd2m4q

Lightweight Biometric Sensing for Walker Classification Using Narrowband RF Links

Tong Liu, Zhuo-qian Liang
2017 Sensors  
This article proposes a lightweight biometric sensing system using ubiquitous narrowband radio frequency (RF) links for path-dependent walker classification.  ...  in indoor and outdoor environment [23, 24] , through to respiratory monitoring [25] , motion recognition [26, 27] , and elderly fall detection [28, 29] .  ...  Therefore, human gait is considered as a highly unique feature for biometric representation and is used as a valid criterion for identification.  ... 
doi:10.3390/s17122815 pmid:29206188 pmcid:PMC5751503 fatcat:tfay5vvdtzh3bnyg6uuulqgbzy

Anatomy of a Biometric System [chapter]

2010 Vein Pattern Recognition  
Biometrics offers some clear advantages over traditional identity methods: Biometric traits cannot be lost, stolen, or borrowed. • Generally, physical human characteristics are much more diffi-• cult to  ...  Most enterprises still rely on antiquated card-based badges that require a radio-frequency identification (RFID) reader posted at the entrance to a building, floor, or room.  ... 
doi:10.1201/9781439821381-9 fatcat:vwxcgnefnfhupiomui7capmyni

Biometrics: In Search of Identity and Security (Q & A)

Zahid Akhtar, Abdenour Hadid, Mark Nixon, Massimo Tistarelli, Jean-Luc Dugelay, Sebastien Marcel
2017 IEEE Multimedia  
To address the issues like identity theft and security threats, a continuously evolving technology known as biometrics is presently being deployed in a wide range of personal, government, and commercial  ...  Despite the great progress in the field, several exigent problems have yet to be addressed to unleash biometrics full potential.  ...  ACKNOWLEDGMENT This research work has been partially supported by a grant from the European Commission (H2020 MSCA RISE 690907 "IDENTITY").  ... 
doi:10.1109/mmul.2017.265090754 fatcat:lab3frtx2na6tc65gcp4cxfdqm

Automated Air Baggage Security Enhancements with Biometric Recognition using Programmable Logic Controller

D. AnithaJebakumari, Kirthini Godweena. A, Kavyaa. R
2014 International Journal of Computer Applications  
This work intends to automate and provide a secure, human intervention-free air baggage security cum access system.  ...  The third phase illustrates how the baggage is being transported to the airplanes using a long ramp like conveyor.The fourth phase illustrates the process being carried out at the destination.  ...  RFID integrated along with PLC and Biometric Recognition such as Finger-print recognition or Retinal Recognition proves to be an efficient solution.  ... 
doi:10.5120/16765-6327 fatcat:daronunvajh75iuwnptdzvkpky

The Promise of Radio Analytics: A Future Paradigm of Wireless Positioning, Tracking, and Sensing

Beibei Wang, Qinyi Xu, Chen Chen, Feng Zhang, K.J. Ray Liu
2018 IEEE Signal Processing Magazine  
A future paradigm for wireless positioning, tracking, and sensing © iS t o c k p h o t o .c o m /c h o m b o S a n W  ...  In addition, human activities affect wireless signal propagation, so understanding and analyzing how these signals react to human activities can reveal rich information about the activities around us.  ...  As a result, human radio biometrics captured through radio shot are buried in the CSI by other useless components.  ... 
doi:10.1109/msp.2018.2806300 fatcat:pffib6pqurgdhmtomgeiw6gomu

The Digital Way Using Biometric Data

A.V. Novichkova, Russian State Social University, S.V. Veretekhina, Russian State Social University
2020 Contemporary problems of social work  
All this serves as a key point for forming an opinion about the safety of using biometric data in the formation of a digital human footprint.  ...  the problem of using human biometric data in tracking a digital trace is considered. The possible outcomes of the future are traced and considered by the development of modern technologies.  ...  This conclusion opens up a wide field for further research, which may include the development of proposals for the formation of a strategy for Russian-Chinese trade in educational services.  ... 
doi:10.17922/2412-5466-2020-6-3-4-11 fatcat:26fhhnfduffebeprmqflbiigwy

Human Biometric Signals Monitoring based on WiFi Channel State Information using Deep Learning [article]

Moyu Liu, Zihuai Lin, Pei Xiao, Wei Xiang
2022 arXiv   pre-print
Our WiFi-based technique addresses privacy concerns and is adapt- able to a variety of settings.  ...  The inputs to the neural network are the amplitude and phase of channel state information collected by a pair of WiFi devices.  ...  (b) Non-line-of-sight (NLOS, through the wall) environment. Fig. 11 . 11 Fig. 11.  ... 
arXiv:2203.03980v1 fatcat:u347rlcogza23nrcwyt6nharoa

Biometric borders: Governing mobilities in the war on terror

Louise Amoore
2006 Political Geography  
Second, the representation of biometrics and the body, such that identity is assumed to be anchored as a source of prediction and prevention.  ...  This article proposes the concept of the biometric border in order to signal a dual-faced phenomenon in the contemporary war on terror: the turn to scientific technologies and managerial expertise in the  ...  a terrorist is through biometrics' (cited in ''Biometrics: Great'', 2004, p. 17) .  ... 
doi:10.1016/j.polgeo.2006.02.001 fatcat:nxf4o2mxknahdnkzinouv4ueau
« Previous Showing results 1 — 15 out of 1,693 results