Buscar
Mostrando ítems 1-10 de 45
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
A video-based biometric authentication for e-learning web applications
(2009-06-02)
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
Protecting medical images with biometric information
(2008-12-01)
Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital medical images is using cryptography to encrypt the images. This paper ...
Fast identification of individuals based on iris characteristics for biometric systems
(2012-02-13)
Nowadays, systems based on biométrie techniques have a wide acceptance in many different areas, due to their levels of safety and accuracy. A biometrie technique that is gaining prominence is the identification of individuals ...
Methodology proposal for acquisition of biotelemetric data in a real time
(2010-12-01)
This work presents a methodological proposal for acquisition of biometric data through telemetry basing its development on a research-action and a case study. Nowadays, the qualified professionals of physical evaluation ...
Ensemble of adaptive algorithms for keystroke dynamics
(Universidade Federal do Rio Grande do Norte – UFRNSociedade Brasileira de Computação – SBCNatal, 2015-11)
Biometric systems have been applied to improve the security of several computational systems. These systems analyse physiological or behavioural features obtained from the users in order to perform authentication. Biometric ...
Usability Assessment In A Multi-biometric Continuous Authentication System
(IEEENew York, 2016)
ON THE IMPORTANCE OF USING HIGH RESOLUTION IMAGES, THIRD LEVEL FEATURES AND SEQUENCE OF IMAGES FOR FINGERPRINT SPOOF DETECTION
(Ieee, 2015-01-01)
The successful and widespread deployment of biometric systems brings on a new challenge: the spoofing, which involves presenting an artificial or fake biometric trait to the biometric systems so that unauthorized users can ...
On the importance of using high resolution images, third level features and sequence of images for fingerprint spoof detection
(2015-01-01)
The successful and widespread deployment of biometric systems brings on a new challenge: the spoofing, which involves presenting an artificial or fake biometric trait to the biometric systems so that unauthorized users can ...
Face recognition using local mapped pattern and genetic algorithms
(2018-08-15)
Facial recognition is one of the most used biometric technologies in automated systems which ensure a person’s identity for authorizes access and monitoring. The acceptance of face use has several advantages over other ...