Now showing items 1-10 of 67
A practical approach for biometric authentication based on smartcards
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
Protecting medical images with biometric information
Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital medical images is using cryptography to encrypt the images. This paper ...
A video-based biometric authentication for e-learning web applications
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
Methodology proposal for acquisition of biotelemetric data in a real time
This work presents a methodological proposal for acquisition of biometric data through telemetry basing its development on a research-action and a case study. Nowadays, the qualified professionals of physical evaluation ...
Fast identification of individuals based on iris characteristics for biometric systems
Nowadays, systems based on biométrie techniques have a wide acceptance in many different areas, due to their levels of safety and accuracy. A biometrie technique that is gaining prominence is the identification of individuals ...
Frontal sinus recognition for human identification
(Spie - Int Soc Optical Engineering, 2008-12-01)
Many methods based on biometrics such as fingerprint, face, iris, and retina have been proposed for person identification. However, for deceased individuals, such biometric measurements are not available. In such cases, ...
Ensemble of adaptive algorithms for keystroke dynamics
(Universidade Federal do Rio Grande do Norte – UFRNSociedade Brasileira de Computação – SBCNatal, 2015-11)
Biometric systems have been applied to improve the security of several computational systems. These systems analyse physiological or behavioural features obtained from the users in order to perform authentication. Biometric ...
On the importance of using high resolution images, third level features and sequence of images for fingerprint spoof detection
The successful and widespread deployment of biometric systems brings on a new challenge: the spoofing, which involves presenting an artificial or fake biometric trait to the biometric systems so that unauthorized users can ...
Usability Assessment In A Multi-biometric Continuous Authentication System
(IEEENew York, 2016)
Semiautomatic dental recognition using a graph-based segmentation algorithm and teeth shapes features
Dental recognition is very important for forensic human identification, mainly regarding the mass disasters, which have frequently happened due to tsunamis, airplanes crashes, etc. Algorithms for automatic, precise, and ...