Ieee Research Papers On Biometrics

FULL LISTNEWSEARCH

biometric research papers 2015 IEEE PAPER




Image-based ear biometric smartphone app for patient identification in field settings
free download
Abstract: We present a work in progress of a computer vision application that would directly impact the delivery of healthcare in underdeveloped countries. We describe the development of an image-based smartphone application prototype for ear biometrics. The

Expanding the Human-Biometric Sensor Interaction Model to Identity Claim Scenarios
free download
Abstract Biometric technologies represent a significant component of comprehensive digital identity solutions, and play an important role in crucial security tasks. These technologies support identification and authentication of individuals based on their physiological and

Investigation into DCT Feature Selection for Visual Lip-Based Biometric Authentication
free download
Abstract This paper investigated using lip movements as a behavioural biometric for person authentication. The system was trained, evaluated and tested using the XM2VTS dataset, following the Lausanne Protocol configuration II. Features were selected from the DCT

Preliminary analysis of in utero low-level arsenic exposure and fetal growth using biometric measurements extracted from fetal ultrasound reports
free download
Abstract Background: Early life exposure to arsenic is associated with decreased birth weight in highly exposed populations but little is known about effects of low-level arsenic exposure on growth in utero. Methods: Using a sample of 272 pregnancies from New

Private Eyes: Secure Remote Biometric Authentication
free download
Abstract: We propose an efficient remote biometric authentication protocol that gives strong protection to the user's biometric data in case of two common kinds of security breaches:(1) loss or theft of the user's token (smart card, handheld device, etc.), giving the attacker full Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace�a place where they were known and

VULNERABILITY ASSESSMENT OF MULTI BIOMETRIC SYSTEMS
free download
Abstract The objective of this study was to provide vulnerability analysis for multi biometric systems and their performance against the known attacks. The report helps in identifying and analyzing risks that may have detrimental outcomes on the security provided by multi

'Increasing the robustness of biometric templates for dynamic signature biometricsystems
free download
Abstract:Due to the high deployment of devices such as smartphones and tablets and their increasing popularity in our society, the use of biometric traits in commercial and banking applications through these novel devices as an easy, quick and reliable way to perform

Sagittal Thoracic and Lumbar Spine Profiles in upright standing and Lying Prone Positions among Healthy Subjects: Influence of various Biometric features.
free download
Sagittal thoracic and lumbar spine profiles in upright standing and lying prone positions among healthy subjects: influence of various biometric features. prone positions and to analyse their relationship with various biometric characteristics. Summary of Background Data

An image database of Drosophila melanogaster wings for phenomic and biometric analysis
free download
Abstract Background: Extracting important descriptors and features from images of biological specimens is an ongoing challenge. Features are often defined using landmarks and semi- landmarks that are determined a priori based on criteria such as homology or some other

Additional Safeguards for Children Using Biometric Technologies in the European Union Multilevel System from the Perspective of Fundamental Rights
free download
We want to identify the requirements for the respect of fundamental rights in the use of biometric technologies in the context of the European multilevel system in which we live (the compliance with applicable fundamental and human rights standards). with a particular

I feel like i'm taking selfies all day!: Towards understanding biometric authentication on smartphones
free download
ABSTRACT We present the results of an MTurk survey (n= 383) on the reasons for using and not using biometric authentication systems on smartphones. We focused on Apple's Touch ID as well as Android's Face Unlock as they are the most prevalent systems on the

SURVEY ON RECOGNITION OF DIFFERENT BIOMETRIC TRAITS
free download
Abstract: The face is a picture of the mind with the eyes as its interpreter. It is a complex multidimensional structure and needs a good computing technique for recognition. Face detection has been one of the most studied topics in the computer vision literature. As one

A Wearable Biometric Capture and Record System
free download
Page 1. A Wearable Biometric Capture and Record System Carlo Alberto Avizzano Emanuele Ruffaldi powered A novel wearable biometric capture system Page 6. Design Goal A novel biometric capture system (BCS) for capture and analysis of motion and EMG signals.

Notes on biometric variability in invasive species: the case of Psacothea hilaris hilaris
free download
Abstract Species morphometric variability is the result of the combined effect of genes and environment. This is emphasized in insects, especially in ones that rely on discrete food resources, such as xylophagous insects. Psacothea hilaris hilaris (Pascoe)(Coleoptera

A survey of distributed biometric authentication systems
free download
Abstract: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionality in order to detach the biometric data storage from the service provider. Besides, a new

Impacts on Database Performance in a Privacy-Preserving Biometric Authentication Scenario
free download
Abstract:Nowadays, biometric data are more and more used within authentication processes. Such data are usually stored in databases and underlie inherent privacy concerns. Therefore, special attention should be paid to their handling. We propose an

Robust Speaker Recognition Biometric System a Detailed Review
free download
Abstract:his paper reviews Biometric based Speaker Recognition and presents brief about various algorithms and techniques used at various stages of Speaker Recognition and development of Attendance System as application of Speaker Recognition. The research Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace�a place where they were known and

Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node
free download
ABSTRACT Biometric systems are a vital part of physical access control systems. Biometric systems ensure that access to use a system or service is done by a valid user. These systems are used in various applications like ATMs, voting system, aadhar card,

A Multimodal Approach to Improve the Performance of Biometric System
free download
Abstract-Biometric systems have very success rate in identifying an individual based on ones biological traits. In biometric history some features like weight, age, height etc. are also there to provide user recognition to some extent but not fully upto the mark because of

Block Projection Based Feature Extraction for Biometric Recognition with Multi-lead ECG
free download
Abstract:In order to reveal discriminant information from the multi-lead ECG to facilitate the ECG biometric recognition, two novel feature extraction algorithms are proposed in this paper. As opposed to the existing singlelead based techniques, the proposed algorithms

EXPLORING EMPLOYEES'PERCEPTION OF BIOMETRIC TECHNOLOGY ADOPTION IN HOTELS
free download
Abstract Biometric technology is quickly becoming a principal method of identification in today's fast-paced networked and security-conscious society. However, adoption of new technology is considered successful when employees embrace and use it effectively. The Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace�a place where they were known and

A Personal Verification and Identification using Palmprint and Hand Geometry BiometricRecognition System
free download
Abstract-In this research method demonstrates to the study about identification and verification using hand geometry recognition system. The geometric measurement of human hand have been used for personal verification and authentication on the bases of different

A Biometric Evaluation of a Computerized Psychomotor Test for Motor Skill Training
free download
Practitioner Summary: Standardized psychomotor tasks can be computerized for assessing human motor skill, including the use of VR systems with haptic interfaces. Some systems have been validated against conventional test methods in terms of performance. A system

Blood and Biometric Data on an Established Salmo trutta macrostigma (Dumeril, 1858) Population in an Italian Stream: Preliminary Results
free download
Abstract.-The aim of this study was to obtain a basic knowledge of some blood haematological and biochemical characteristics of Salmo trutta macrostigma (S. t. macrostigma) captured in Anapo river, Italy. White blood cell count (WBC), red blood cell

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security.
free download
Abstract Multibiometrics is the usage of more than one physiological or behavioral characteristic to identify an individual. Multibiometrics is advantageous over unibiometrics as it is resilience to spoofing and has low False Acceptance Rate (FAR). However

A Novel IKP-Based Biometric Recognition Using Mobile Phone Camera
free download
This paper explores an inner-knuckle-print (IKP) biometric recognition, based on mobile phone. Since IKP characteristics are captured by using mobile phone camera, the greatest challenge is that IKP images from the same hand have different illumination, posture, and

An Exploration of the Impacts of Three Factors in Multimodal Biometric Score Fusion: Score Modality, Recognition Method, and Fusion Process
free download
Data fusion can be performed at different levels, eg, pixel, feature, score, and decision. Accordingly, the corresponding data preprocessing is also different for each level. For example, pixel-level and feature-level image fusion usually require registration and

Biometric Security Enhancement using GLCM Method: A Review
free download
Abstract:Iris texture pattern can be used for biometric verification and identification of a person from a large dataset. However, such a biometric recognition system can only recognize those people who have already been enrolled in the system. Iris recognition

The Potential for Adaptive Safety through In-Vehicle Biomedical and Biometric Monitoring
free download
ABSTRACT A 2009 study by the National Highway Traffic Safety Administration identified certain medical conditions as contributing factors in crash causation (Hanna 2009). It was

ESTIMATION OF THE BENTHIC ENERGY IN TWO ARID TROPICAL SANDY BEACHES AT SOUTH EASTERN RED SEA, SAUDI ARABIA USING BIOMETRIC
free download
ABSTRACT: The energy content of benthic invertebrates was estimated of two arid tropical sandy beaches, namely AlBirk and AlHorida, on the south eastern coast of the Red Sea, Saudi Arabia in the summer of 2007. This is the first study to deal with the benthic energy Matters do not always unfold as expected on projects. Actions taken by stakeholders are not always realistic, and certain processes can appear chaotic. An ocean of information hits decision makers everyday in the present world. A person can get lost in its quagmire when

Research on Human Silhouette Detection Methods for a Non-cooperative BiometricSystem
free download
Abstract:Together with the development of effective and efficient people identification algorithms, biometric authentication systems become increasingly popular and widespread, leading to a significant growth in the number of institutions interested in implementing and Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace�a place where they were known and

Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System
free download
Abstract:Password-based authentication schemes are convenient, but vulnerable to simple dictionary attacks. Cryptographic secret keys are safe, but difficult to memorize. Recently, biometric information has been used for authentication schemes because it is difficult to Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace�a place where they were known and

An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card
free download
Abstract To protect the resources from unauthorized users, the remote user authentication have become an essential part in the communication network. Currently, smart card-based remote user authentication for multi-server environment is a widely used and researched

Ensuring Quality in Biometric Systems
free download
Abstract Biometric system is using for personal recognition of people in many social and economical activities now a days. A good biometric trait should be measurable, distinctive and stable over time. Real-world deployment of biometric systems often has to contend

Development of a Smart Wearable Device for Human Activity and Biometric Data Measurement
free download
Abstract This paper presents a smart wearable device cooperating with smartphones to measure and utilize human activity and biometric data such as motion tracking, photoplethysmography (PPG), skin temperature (SKT), and galvanic skin response (GSR).

Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction
free download
Wireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace�a place where they were known and

Development of Microcontroller-Based Biometric Locker System with Short Message Service
free download
Abstract:The study was a development of a microcontroller based biometric locker system with short message system (SMS) which ensures the security of personal and confidential belongings of a person. Developmental research method which was comprised of

Multi-Secure Authentication using Sift Algorithm in Biometric Cryptosystem
free download
Abstract Most of the system breaches are caused by authentication errors during the login process and these failures are caused due to the limitations associated with existing authentication methods. The existing proxy-based biometric authentication methods are

Authentication Scheme based on Biometric Key for VANET Information System in M2M Application Service
free download
Abstract: Smart machines and devices are rapidly deployed in the future, a secure mobile environment will be mandatory. Smart machines and devices of future are being developed towards smart machine and device based M2M (Machine to Machine) by using IT (

Cohort Selection of Specific User Using Max-Min-Centroid-Cluster (MMCC) Method to Enhance the Performance of a Biometric System
free download
Abstract Selection of cohort models plays a vital role to increase the accuracy of a biometric authentication system as well as to reduce the computational cost. This paper proposes a novel approach for cohort selection called Max-Min-Centroid-Cluster (MMCC) method.

A New Secure Storing System for Biometric Templates Based Encryption and Concealment
free download
MATERIALS AND METHODS Proposed system: The proposed system has been consist of three phases, improved encryption/decryption method, improved concealment/extracting method and finally combining the two methods. This system has been implemented in

Biometric Solutions as Privacy Enhancing Technologies
free download
Abstract This research is focused on giving a comprehensive overview of the secure biometric systems field, analysing it from privacy enhancing technology (PET) perspective. The widespread use of biometric systems, the nature of the shared data, the kinds of use

A New EEG Acquisition Protocol for Biometric Identification Using Eye Blinking Signals
free download
Abstract:In this paper, a new acquisition protocol is adopted for identifying individuals from electroencephalogram signals based on eye blinking waveforms. For this purpose, a database of 10 subjects is collected using Neurosky Mindwave headset. Then, the eye

Biometric Authentications to Control ATM Theft
free download
Abstract-In the current scenario the way banking and transaction system is changing in the world, the validation, authentication and confirmation of a person is very important and should be of more concern. Authentication and verification has always been the part to Cancelable biometrics describes a class of biometric matching algorithms designed to address the security and privacy concerns because of the limited number of biometric samples. This limitation�humans have only one face, two eyes, and up to ten fingers�

Biometric Analytics Cost Estimating
free download
Abstract This paper examines the interplay between biometric technologies and advanced analytics, referred to as biometric analytics, as a way to detect fraudulent entries in a biometric system. We follow a systematic approach, based on cost estimating standards,

Fast and Secure Linear Regression and Biometric Authentication with Security Update
free download
Abstract. We explicitly present a homomorphic encryption scheme with a flexible encoding of plaintexts. We prove its security under the LWE assumption, and innovatively show how the scheme can be used to handle computations over both binary strings and real numbers. In

A study on the Intelligent Techniques of the ECG-based Biometric Systems
free download
Abstract:Electrocardiogram (ECG) signal reflects the recorded cardiac electrical activity of an individual over time; it has been emerged as an important biometric trait. It has the advantages of being a unique aliveness indicator as it is difficult to spoofed and falsified.

Enhanced Biometric-based User Authentication Protocol Using Non-tamper Resistant Smart Cards
free download
Abstract This paper reviews An's enhanced biometric-based user authentication protocol and shows that it is weak against the password guessing attack and has a problem of verification in the authentication phase. They are very important features to be secured to

Biometric Security through Multimodal Systems
free download
This paper gives a review of multimodal authentication system. For the security of any individual and to prove his uniqueness, multimodal authentication serves as backbone. During the last few years, military and intelligence organization have encountered many

Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam
free download
Abstract Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification and has been employed in diverse fields. It ensures actual presence of biometric entity of a person in

Integrated Multi-Stage Biometric System Design
free download
Abstract In this paper, an integrated multi stage biometric system design is proposed using speech, face and finger print along with Artificial Neural Network (ANN). The voice recognition subsystem utilises Mel-frequency Cepstrum Coefficient (MFCC) feature

Multi-Biometric Recognition for Iris and Ear Images by using ICA, GA, Hamming Distance
free download
Abstract The integration of different biometric sources, often termed as biometric fusion. The design issue is one of the major concerned while choosing the properties of the biometrics. The fusion scheme can be classified into sensor level, feature level, score level and

A biometric-based Password Authentication with key Exchange Scheme using Mobile Device for Multi-Server Environment
free download
Abstract: Remote authentication for multi-server environment can help users register only once and access arbitrary services conveniently in the same registry realm. However, most of the solutions are plagued by security problems. In this paper, we point out that 'a novel Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace�a place where they were known and

An Approach to Robust Biometric Key Generation System Design
free download
Abstract: This paper presents a novel approach to the design of robust multimodal biometric cryptosystems. The design objectives behind the system are robustness, privacy of user's biometric templates and stable cryptographic key generation. The framework presented in

A Multimodal Biometric System Based on Palmprint and Finger Knuckle Print Recognition Methods
free download
Abstract: Biometric authentication is an effective method for automatically recognizing a person's identity. In our previous paper, we have considered palm print for human authentication. Recently, it has been found that the Finger Knuckle Print (FKP), which

A Secured Public Key Cryptosystem for Biometric Encryption
free download
Summary In the modern era security plays an important role in each and every field. The needs for stringent security measures in biometric systems have greater importance for information security systems. The biometric systems to offer reliable and high security to

Error Correction Codes for Biometric Cryptosystem: An Overview
free download
Abstract In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By

Electrocardiogram (ECG) as a Biometric Characteristic: A Review
free download
Abstractiometric systems are mostly used as person identification or verification systems. In the last few decades, the Electrocardiogram (ECG) has been introduced as a most powerful biometric tool for personal/individual identification. ECG has unique cardiac feature to

Modify k-medoids Algorithm with New Efficiency Method for Biometric Database Classification
free download
Abstract:K-medoids algorithm modified by changing the condition factor. Largest cluster elements number is used instead of the cluster number. The modified algorithm is applied to images data base of the human face with different environment (direction, angles etc.).

Hand Vein-based Multimodal Biometric Recognition
free download
Abstract: Multi-modal biometric recognition utilizes more than one modality for recognition of a person, when compared to the single modality with the help of enhanced security. The vascular patterns are one of the physiological biometrics and internal feature of the body,

A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates
free download
Abstract:In this paper, we base our research on biometric systems security. We begin by introducing biometrics after which we will describe how a biometric system works before we later define what a biometric template is. Thereafter, we will explore attacks on biometric

Biometric Authentication of an Individual Using Multilayer Perceptron and Support Vector Machine
free download
Abstract:The proposed method uses multi layered perceptron neural network and support vector machine to classify the normal subjects. Data used for training, testing and cross validation was recorded from normal persons (without any heart disease) within thirty six

MODELING OF BIOMETRIC IDENTIFICATION SYSTEM USING THE COLORED PETRI NETS.
free download
ABSTRACT: In this paper we present a model of biometric identification system transformed into Petri Nets. Petri Nets, as a graphical and mathematical tool, provide a uniform environment for modelling, formal analysis, and design of discrete event systems. The

Hybrid Approach for Securing Biometric Templates Using Visual Cryptography
free download
Abstract: Security of information is one of the most important factors of information technology and communication. Also an accurate automatic personal identification is essential in a wide range of application domains such as national ID card (Aadhar Card),

A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Templates in Verification and Identification Systems
free download
Abstract: The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features

Next Generation Secure Computing: Biometric in Secure E-transaction
free download
Abstract: To establish identity of an individual is becoming critical in our heavy interconnected society. The need for reliable user authentication techniques has increased heightened concerns about security and rapid developments in networking,

Time-intervals as a Behavioral Biometric
free download
Humans perform actions across a wide range of time scales, from the firing of individual neurons approximately 200 times per second, to the submission of a research paper, which may occur only several times per year. Our actions form a hierarchy of time scales

A MULTI-FACTOR AUTHENTICATION SCHEME INCLUDING BIOMETRICCHARACTERISTICS AS ONE FACTOR
free download
Abstract: Multi-factor authentication schemes have been proved to be very useful in many authentication systems including biometric ones. In this paper we have proposed a multi- factor authentication scheme, in which one of the main components is represented by the Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace�a place where they were known and Logical access control is the means and procedures to protect access to information on PCs, networks, and mobile phones. A variety of credential types may be used, such as passwords, tokens, or biometrics, to authenticate the user. These credentials may

Biometric Systems Based on Palm Vein Patterns
free download
Abstract:The work covers issues related to the design of biometric systems based on the hand vascular pattern. The study includes analysis of various stages of biometric systems design ranging from acquisition, feature extraction and biometric pattern creation for

Biometric system based on off-line signatures
free download
Abstract: Biometrics not only authenticates an individual's identity but is also a process that applies security measures to various systems such as bank check verification, authentication of legal documents etc. Handwriting is one of the unique and widely acceptable modes of

Computerising the Voting Process: On the Difficulties and Benefits of BiometricVerification Elections
free download
Abstract:The use of biometric system of verification is increasingly assuming phenomenal dimensions in contemporary electoral activities across the globe. However, the academic community appears to know very little of the extent to which biometric systems of SNR, these images can be digitally deblurred by standard image deconvolution algorithms to recover depth-dependent detail, enabling accurate iris recognition and identification. It is shown that even the intermediate, distorted iris images maintain sufficient low-and mid-

An Efficient Palmprint Biometric System Based On Progressive Image Compression
free download
Abstract:In this paper, we propose an efficient multi-spectral palmprint identification system. For that, we compressed each palmprint band at 0.5 bit per pixel (bpp) by a progressive image compression algorithm where we used the famous Set Partitioning In

A Multimodal Approach to Enhance the Performance of Biometric System
free download
ABSTRACT: Multimodal biometric system is the combination of more than one biometric trait to authenticate an individual. Unimodal biometric systems use only one biometric trait (iris, retina, face, hand geometry, fingerprint, voice, gait, signature etc.) to recognize individual.

RECOGNITION OF FACES IN THE CROWD USING BIOMETRIC TECHNOLOGIES MIXED
free download
Abstract: This paper aims to develop under Microsoft Visual Studio, a practical application detection and recognition of people using Haar classifiers in conjunction with an algorithm personal centroid detection of eye gaze direction. The method uses biometric technology Background checks became important to law enforcement about the time that large numbers of people started moving to cities as a by-product of the Industrial Revolution. Prior to that, few people ever ventured far from their birthplace�a place where they were known and

Research on Multimode Biometric Features Recognition System Adopting Neural Network
free download
Abstract: The small sample issue is a common problem in face recognition system, and multi- modal model has strong generalization ability to solve the problem of small sample, which has already become the most important area of research in pattern recognition, however,

Fake Biometric Detection Using Improved Features in Image and Dempster-Shafer Method
free download
Abstract-Biometric systems are vulnerable to various types of attacks. In this paper, a software based multi biometric and multi attack protection method based on image quality assessment is used to identify the real and fake traits. The present system proposes 30

Multimodal Biometric Approaches to Handle Privacy and Security Issues in Radio Frequency Identification Technology
free download
Abstract: In this technical era, providing a security to the data is a challenging task. This article addresses the issues related to privacy and security issues of RFID technology. RFID is radio frequency identification technology. RFID is a wireless non-contact technology

Fingerprint Registration Using Zernike Moments: An Approach for a Supervised Contactless Biometric System
free download
Abstract In this work, we deal with contactless fingerprint biometrics. More specifically, we are interested in solving the problem of registration by taking into consideration some constraints such as finger rotation and translation. In the proposed method, the registration

Server-Side Encrypting and Digital Signature Platform with Biometric Authorization
free download
Abstract:The most important shortcomings of solutions based on public key infrastructure and digital signatures are: costs, ambiguous laws, and nuisance of daily use. The purpose of this article is to discuss the motivation and benefits, as well as a presentation of concepts,

GAUSSIAN FILTER BASED BIOMETRIC SYSTEM SECURITY ENHANCEMENT
free download
Abstract-A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or

Secured Lip Biometric based Authentication System
free download
Abstract The proposed system is to develop an authentication system based on lip gestures. Lip password verification is an important research topic in the area of biometric authentication. In this project the work is done in such a way that the lip gestures are

Highly Secured Railway Reservation using Biometric Technology
free download
Abstract: Security is the main factor in all organizations and has more importance in Indian Railway. Security can be provided by any mean cannot provide more flexibility, the existing rail system does not contain sufficient security, so we think to implement biometrics in our

Biometric Finger-Vein Recognition for ATM
free download
Abstract: In this paper biometric finger-vein recognition (FVR) system for authentication on ATM network is proposed. The system is implemented on the basis on embedded platform and equipped with a novel finger-vein recognition algorithm and implemented in MATLAB Due to difficulty in controlling the lighting conditions in practical applications, variable illumination is one of the most challenging tasks in face recognition. Prior to face recognition, illumination compensation has to be performed, whereby the uneven illumination of

CONTRIBUTION TO THE FORMULATION OF A CORRELATION LENGTH/WEIGHT ONBIOMETRIC DATA RECORDED ON TUNA (THUNNUS THYNNUS
free download
SUMMARY Oceanis srl, as part of the assignment of the Ministry of Agriculture and Forestry, General Directorate of Fisheries and Aquaculture, Italy, for the implementation of the national observation program for the fishing season for bluefin tuna in 2013, has carried

Multimodal Biometric Authentication For Automated Teller Machine
free download
Abstract:In the world of computer science information technology security is essential and important issue. Identification and Authentication Techniques plays an important role while dealing with security and integrity. The human physical characteristics like

The Practical Implementation of Biometric Technology�Legal Aspects
free download
Abstract:The article refers to legal and social problems, which may occur while implementing a biometric system. The research on biometric regulation made by the author while preparing the Ph. D. thesis resulted in finding general rules, which should be

Biometric Voting System in Ghana. A Case Study
free download
Presently in Ghana, the electoral process involves biometric registration of eligible voters and queuing up of the registered voters, to cast their votes using ballot papers and indelible ink on the day of voting. At the end of the voting exercise, the counting of the ballots

Analysis of Polymorphic DNA Sequences in the Identification of Individuals and its Possible Use in Biometric Systems
free download
Abstract:The article presents the achievements in DNA forensic science practice, the latest developments as well as future trends. The article concerns also other than forensic DNA applications as well as expectations, concerns and obstacles. DNA identification

A Study and Comparison of NIR Hyperspectral Imaging and Other Emerging BiometricTechniques in Security System
free download
ABSTRACT Different human body parts such as eyes, veins, voices, face, fingers etc. have been considered for the biometrics system. Even the typing style and signature of human being have been the part of biometrics. To satisfy the different needs of the global market,

Performance and Security Evaluation of Palmprint Biometric Templates
free download
Abstract:Template security is a critical issue in biometric systems because biometric templates cannot easily revoked and reissued. Nevertheless, biometric systems are prone to a variety of attacks. Hence, providing security to this form is of prime importance. In our

A Biometric Based Secure Session Key Agreement using Modified Elliptic Curve Cryptography
free download
Abstract: Protection of data and network security has been greatly researched. To enhance the security in the case of border control applications like E-Passport, conventional cryptographic concepts are integrated with biometrics. To avoid the intrusion of terrorists

A Comparative Study on Biometrics For Building Similarity Based Multimodal BiometricSystem
free download
Abstract Single biometric systems have a range of issues like noisy information, nonuniversality, spoof attacks and unacceptable error rate. In order to avoid these attacks Multimodal biometric template securing system can be developed by fusing multiple

ECG Biometrics: New Algorithm and Multimodal Biometric System
free download
Page 1. ECG Biometrics: New Algorithm and Multimodal Biometric System by Shahrzad Pouryayevali Page 24. Chapter 2 ECG as a Biometric 2.1 Introduction In this chapter we first describe what the electrocardiogram signal represents and introduce it's different components.

An Efficient Fake Biometric Detection Technique Exploiting Structural Similarity Index
free download
Abstract: In this paper, we propose a novel image quality assessment (IQA) based on an Improved Structural Similarity (ISSIM) which considers the spatial distributions of image structures. The existing structural similarity (SSIM) metric, which deals with structure loss

INVESTIGATE THE POTENTIAL OF EEG SIGNALS FOR BIOMETRICAUTHENTICATION: A POWER SPECTRAL DENSITY APPROACH
free download
1.1 What is Biometrics Biometrics is the science of measuring and analysis of certain unique human body characteristics for authentication purposes (Jain et al. 2000, Jain et al. 2008). In information technology, biometrics refers to technologies that measure and

Study of the Effect of Salt Stress on Biometric Characteristics of Barley: Hordeum Vulgare L.(Poaceae)
free download
Abstract:The aim of our work is to study the response of the barley plant (Hordeum vulgare L.) to salt stress, at different NaCl concentrations (0, 50, 100, 150 and 250 mM) and follow its growth over time in the effect of salt stress. The control is based mainly on measurements

THE EAR AS A BIOMETRIC
free download
Abstract:Biometrics is the science of identifying or verifying the identity of a person based on physiological or behavioral characteristics. Biometric identification methods have proved to be very efficient, more natural and easy for users than traditional methods of human

Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
free download
Abstract:While biometrics have long been promoted as the future of authentication, the recent introduction of Android face unlock and iPhone fingerprint unlock are among the first large-scale deployments of biometrics for consumers. In a 10-participant, within-subjects

E-Voting security system through Biometric Cloud Computing Integration with virtual server application
free download
Abstract: Today, biometric cloud security creates a new explosion in technology. With the advent of Cloud Computing biometric security and reliability plays important role in national and international e-governments. In e-voting system, if we incorporated cloud based

Biometric Personal and Informational privacy concerns: An empirical study in the Kenyan context
free download
Abstract: Purpose: Great strides have been made in the realm of technology in Kenya. This has contributed greatly in the organic growth of the Kenyan economy and improved the standards of living of many Kenyans. However with the sporadic adoption of technologies

The iris biometric feature segmentation using finite element method
free download
Abstract This manuscript presents a method for segmentation of iris images based on a deformable contour (active contour) paradigm. The deformable contour is a novel approach in image segmentation. A type of active contour is the Snake. Snake is a parametric curve

SECURED BIOMETRIC AUTHENTICATION IN CLOUD SHARING SYSTEM
free download
Abstract: The project mainly focus on Secure Storage and Sharing in cloud computing. Cloud services are used for storing and retrieving the data. Nowadays, most of the drawbacks in cloud computing is the user authentication problems. The proposed system

A New Method for Biometric Application Using PCG Signals
free download
Abstract:honocardiogram (PCG) signals as a biometric is a new and novel method for user identification. Use of PCG signals for user recognition is a highly reliable method because heart sounds are produced by internal organs and cannot be forged easily as compared

A Combined Approach for Biometric System in Secured Applications
free download
Abstract: Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot

BIOMETRIC ADVANCE OF SCLERA VEIN AND FINGER VEIN FEATURES FUSION RECOGNITION
free download
Sclera and finger print vein is a new parallel vein recognition method using a two-stage parallel approach for registration and matching. First, we designed a rotation-and scale- invariant Y shape descriptor based feature extraction method to efficiently eliminate most

A Taxonomy of Architecture-specific Use Cases, Security Risks and Mitigations inBiometric Solutions for Mobile Devices
free download
ABSTRACT Biometric solutions for mobile devices are becoming increasingly common. As more biometric applications enter the market, it has become clear that the design choices of a mobile biometric solution could possibly influence the application's usability and security

A Succession Multi-Modal Biometric Identification Hypothesis
free download
ABSTRACT Multibiometrics is the combination of one or more biometrics (eg, Fingerprint, Iris, and Face). Researchers are focusing on how to provide security to the system, the template which was generated from the biometric need to be protected. The problems of

Review of existing Indian Voting System and hybrid design using Biometric Security in Voting Authentication Process
free download
Abstract Voting is a decision making mechanism in a consensus-based society and security is most essential part of voting. The critical role in determining the outcome of an election, Electronic Voting Systems must be designed and developed with the greatest care. It is

Privacy-enhanced Biometric Hamming Distance Classification
free download
ABSTRACT Biometrics is a very effective way of verifying a person's identity, but it also raises privacy concerns. Because biometrics can never be changed, they should be kept private. Therefore it is important that biometric data is always encrypted when stored on a

Influence of the Soil-Free Substrate on the Biometric Parameters of Bean and Barley Germination
free download
ABSTRACT. In the laboratory conditions, influence of the substrate based on brown coal and natural zeolite (clinoptilolite) on the biometric parameters of bean and barley germination has been investigated. In the first version the soil (object of comparison) was used as the

IMAGE QUALITY ASSESSMENT USING BIOMETRIC LIVINESS DETECTION FOR FAKE FINGER PRINT
free download
Abstract A biometric system is a computer based system and is used to identify the person on their behavioural and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.). A typical biometric system consists of feature extraction

Improved Algorithm for Creating a Template for the Information Technology of BiometricIdentification
free download
Abstract The modern tasks of identification of objects require a fine precision and efficiency of their decision. Biometric information technologies are actively applied in different security systems and access control. The most perspective approaches in this case are the

Face Recognition as a Biometric Security for Secondary Password for ATM Users. A Comprehensive Review
free download
ABSTRACT Authentication is an important aspect in system control in computer based communication. Automatic Teller Machines (ATMs) are widely used in our daily lives due to their convenience, wide-spread availability and timeindependent operation. In this paper,

Chaotic Maps for Biometric Template Protection-A Proposal
free download
Abstract Modern biometric technologies claim to provide alternative solution to traditional authentication processes. Even though there are various advantages of biometric process, it is vulnerable to attacks which can decline its security. Towards addressing these concerns

Fake Biometric Trait Detection Using Image Quality
free download
Abstract-Biometric systems are vulnerable to spoofing attack. A reliable and efficient countermeasure is needed in order to combat the epidemic growth in identity theft. To ensure biometric system security, liveness assessment can be applied in order to guard

Aadhaar Automated Biometric Identification Subsystem Interface
free download
The Unique Identification Authority of India (UIDAI) has been created, with the mandate of providing a unique identity to all Indian residents. The UIDAI has published an approach1 to pursuing this mandate, and plans to use biometrics to eliminate duplicates and ensure



FREE IEEE PAPERS






Conferences related to Biometrics

Back to Top

2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Industrial Informatics, Computational Intelligence, Control and Systems, Cyber-physicalSystems, Energy and Environment, Mechatronics, Power Electronics, Signal and InformationProcessing, Network and Communication Technologies

  • 2017 12th IEEE Conference on Industrial Electronics and Applications (ICIEA)

    Industrial Informatics, Computational Intelligence, Control and Systems, Cyber-physical Systems, Energy and Environment, Mechatronics, Power Electronics, Signal and Information Processing, Network and Communication Technologies

  • 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)

    Latest technology advancement as well as future directions and trends in Industrial Electronics and their applications

  • 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA)

    ICIEA 2015 is a premier conference, providing an excellent forum for scientists, researchers, engineers and industrial practitioners throughout the world to present and discuss the latest technology advancement as well as future directions and trends in Industrial Electronics: Industrial Informatics: Computational Intelligence Control and Systems: Energy and Environment:Mechatronics: Robotics, Sensors and actuators, Sensor fusion Power Electronics: Signal and Information Processing: Network and Communication Technologies Optoelectronics and Optical Communication

  • 2014 IEEE 9th Conference on Industrial Electronics and Applications (ICIEA)

    ICIEA 2014 is a premier conference, providing an excellent forum for scientists, researchers, engineers and industrial practitioners throughout the world to present and discuss the latest technology advancement as well as future directions and trends in Industrial Electronics: Industrial Informatics: Computational IntelligenceControl and Systems: Energy and Environment: Mechatronics: Robotics, Sensors and actuators, Sensor fusionPower Electronics: Signal and Information Processing: Network and Communication TechnologiesOptoelectronics and Optical Communication

  • 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA)

    Industrial Informatics, Computational Intelligence, Control and Systems, Energy and Environment, Mechatronics, Power Electronics, Signal and Information Processing, Network and Communication Technologies

  • 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA)

    Industrial Informatics, Computational Intelligence, Control and Systems, Energy and Environment, Mechatronics, Power Electronics, Signal Processing, Network and Communication Technologies.

  • 2011 6th IEEE Conference on Industrial Electronics and Applications (ICIEA)

    Industrial Informatics, Computational Intelligence, Control and Systems, Energy and Environment, Mechatronics, Power Electronics, Signal Processing, Network and Communication Technologies, Aerospace, Engineering Education.

  • 2010 5th IEEE Conference on Industrial Electronics and Applications (ICIEA)

    Industrial Informatics, Computational Intelligence, Control and Systems, Energy and Environment, Mechatronics, Power Electronics, Signal Processing, Network and Communication Technologies.

  • 2009 4th IEEE Conference on Industrial Electronics and Applications (ICIEA)

    Industrial Informatics, Computational Intelligence, Control and Systems, Energy and Environment, Mechatronics, Power Electronics, Signal Processing, Network and Communication Technologies, Aerospace Electronic and Information System.

  • 2008 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA)

    Automation, Computer Intelligence, Control Systems and Applications, Energy and Environment, Mechatronics, Power Electronics, Signal Processing, Network and Communication Technologies and Emerging Technologies

  • 2007 2nd IEEE Conference on Industrial Electronics and Applications (ICIEA)
  • 2006 1st IEEE Conference on Industrial Electronics and Applications (ICIEA)

2018 14th IEEE International Conference on Signal Processing (ICSP)

ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU


2018 17th International Conference on Information Technology Based Higher Education and Training (ITHET)

The convergence of current technologies provides the infrastructure for transmitting and storing information faster and cheaper. For information to be used in gaining knowledge, however, environments for collecting, storing, disseminating, sharing and constructing knowledge are needed. Such environments, knowledge media, brings together telecommunication, computer and networking technologies, learning theories and cognitive sciences to form meaningful environments that provides for a variety of learner needs. ITHET 2018 will continue with the traditional themes of previous events. However, our special theme for this year is a fundamental one. We have previously had MOOCs as our special theme, but now they are just infrastructure. Even “Blended Learning” is what we all do anyway. In a time of the unprecedented access to knowledge through IT, it is time for us to revisit the fundamental purpose of our educational system. It is certainly not about knowledge anymore.

  • 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET)

    The convergence of current technologies provides the infrastructure for transmitting and storing information faster and cheaper. For information to be used in gaining knowledge, however, environments for collecting, storing, disseminating, sharing and constructing knowledge are needed. Such environments, knowledge media, brings together telecommunication, computer and networking technologies, learning theories and cognitive sciences to form meaningful environments that provides for a variety of learner needs. ITHET 2017 will continue with the traditional themes of previous events. However, our special theme for this year is a fundamental one. We seldom talk about MOOCs any more. They are part of the infrastructure. Even “Blended Learning” is what we all do anyway. What we would like to talk about this year is the fundamental purpose of our educational system. Technology has placed knowledge everywhere. "Just Google it".

  • 2016 15th International Conference on Information Technology Based Higher Education and Training (ITHET)

    The convergence of current technologies provides the infrastructure for transmitting and storing information faster and cheaper. For information to be used in gaining knowledge, however, environments for collecting, storing, disseminating, sharing and constructing knowledge are needed. Such environments, knowledge media, brings together telecommunication, computer and networking technologies, learning theories and cognitive sciences to form meaningful environments that provides for a variety of learner needs. The World Wide Web is one such technology that provides access to valuable educational resources such as e-mail, e-groups, bulletin board services, audio conferencing, video conferencing, e-journals, search engines and databases. ITHET 2016 will continue with the traditional themes of previous events. However, this year we want to further explore both the opportunities and the challenges of Massive Open Online Courses (MOOCS), and how these can be combined with “Blended Learning”.

  • 2015 International Conference on Information Technology Based Higher Education and Training (ITHET)

    From its beginning the objective of ITHET has been to provide a wide forum of discussion on higher education and training. The convergence of current technologies provides the infrastructure for transmitting and storing information faster and cheaper. For information to be used in gaining knowledge, however, environments for collecting, storing, disseminating, sharing and constructing knowledge are needed. Such environments, knowledge media, brings together the telecommunication, computer and networking technologies, learning theories and cognitive sciences to form meaningful environments that provides for a variety of learner needs.

  • 2014 Information Technology Based Higher Education and Training (ITHET)

    Technological change, driven by new discoveries and market forces continues in all technical areas enabling advances in products, services and processes. To support this pace of change the world needs a continuous supply of appropriately qualified engineers, scientists and technicians. This need is present in all the major technical challenge areas identified in forward looking strategic plans such as those identified in Europe

  • 2013 12th International Conference on Information Technology Based Higher Education and Training (ITHET)

    Massive Open Online Courses, WWW education tools, Asynchronous learning, Multimedia tutorials, Distance leaning, Intelligent training technology, Blended learning, Authoring technology, Virtual student laboratories, Second language education, Virtual classroom, virtual universities, Industry-university partnership, Creating courses on-line, Learning and Assessment, Network based education and training, Accreditation issues, New strategies for higher education and training, Role of information society and global communication systems, Development and use of IT Tools and Environments, Quality management in higher education, Interactive learning modules

  • 2012 11th International Conference on Information Technology Based Higher Education and Training (ITHET)

    ITHET 2012 aims to provide an environment for experts to discuss the current state of the art for learning both in industry and universities. Virtual environments, e-training and e-learning will be topics of particular interest.

  • 2011 International Conference on Information Technology Based Higher Education and Training (ITHET)

    The scope of the conference will cover but not be limited to: WWW education tools, distance/blended leaning, multimedia tutorials, intelligent training technology, virtual student laboratories, classrooms and universities, creating courses on-line, network based education and training, interactive learning modules, accreditation issues, new strategies for higher education and training.

  • 2010 9th International Conference on Information Technology Based Higher Education and Training (ITHET)

    Asynchronous learning Distance learning Blended learning Virtual student laboratories Virtual classroom, virtual universities Creating courses on-line Network based education and training Interactive learning modules Development and use of IT Tools and Environments New strategies for higher education and training WWW education tools

  • 2009 9th International Conference on Information Technology Based Higher Education and Training (ITHET) (Conference Post-Poned till 2010)

    Asynchronous learning Distance learning Blended learning Virtual student laboratories Virtual classroom, virtual universities Creating courses on-line Network based education and training Interactive learning modules Development and use of IT Tools and Environments New strategies for higher education and training WWW education tools

  • 2006 7th International Conference on Information Technology Based Higher Education and Training (ITHET)
  • 2005 6th International Conference on Information Technology Based Higher Education and Training (ITHET)
  • 2004 5th International Conference on Information Technology Based Higher Education and Training (ITHET)

2018 24th International Conference on Pattern Recognition (ICPR)

ICPR will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields

  • 2016 23rd International Conference on Pattern Recognition (ICPR)

    ICPR'2016 will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields.

  • 2014 22nd International Conference on Pattern Recognition (ICPR)

    ICPR 2014 will be an international forum for discussions on recent advances in the fields of Pattern Recognition; Machine Learning and Computer Vision; and on applications of these technologies in various fields.

  • 2012 21st International Conference on Pattern Recognition (ICPR)

    ICPR is the largest international conference which covers pattern recognition, computer vision, signal processing, and machine learning and their applications. This has been organized every two years by main sponsorship of IAPR, and has recently been with the technical sponsorship of IEEE-CS. The related research fields are also covered by many societies of IEEE including IEEE-CS, therefore the technical sponsorship of IEEE-CS will provide huge benefit to a lot of members of IEEE. Archiving into IEEE Xplore will also provide significant benefit to the all members of IEEE.

  • 2010 20th International Conference on Pattern Recognition (ICPR)

    ICPR 2010 will be an international forum for discussions on recent advances in the fields of Computer Vision; Pattern Recognition and Machine Learning; Signal, Speech, Image and Video Processing; Biometrics and Human Computer Interaction; Multimedia and Document Analysis, Processing and Retrieval; Medical Imaging and Visualization.

  • 2008 19th International Conferences on Pattern Recognition (ICPR)

    The ICPR 2008 will be an international forum for discussions on recent advances in the fields of Computer vision, Pattern recognition (theory, methods and algorithms), Image, speech and signal analysis, Multimedia and video analysis, Biometrics, Document analysis, and Bioinformatics and biomedical applications.

  • 2002 16th International Conference on Pattern Recognition

2018 Chinese Control And Decision Conference (CCDC)

Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2017 29th Chinese Control And Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2016 Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create aforum for scientists, engineers and practitioners throughout the world to present the latestadvancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2015 27th Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2014 26th Chinese Control And Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create aforum for scientists, engineers and practitioners throughout the world to present the latestadvancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2013 25th Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2012 24th Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2011 23rd Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2010 Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies

  • 2009 Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2008 Chinese Control and Decision Conference (CCDC)

More Conferences

Periodicals related to Biometrics

Back to Top

Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Biomedical Circuits and Systems, IEEE Transactions on

The Transactions on Biomedical Circuits and Systems addresses areas at the crossroads of Circuits and Systems and Life Sciences. The main emphasis is on microelectronic issues in a wide range of applications found in life sciences, physical sciences and engineering. The primary goal of the journal is to bridge the unique scientific and technical activities of the Circuits and Systems ...


Biomedical Engineering, IEEE Reviews in

The IEEE Reviews in Biomedical Engineering will review the state-of-the-art and trends in the emerging field of biomedical engineering. This includes scholarly works, ranging from historic and modern development in biomedical engineering to the life sciences and medicine enabled by technologies covered by the various IEEE societies.


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


More Periodicals


Xplore Articles related to Biometrics

Back to Top

Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics

[{u'author_order': 1, u'affiliation': u'Communications and Networking, Aalto-yliopisto Tietoliikenne- ja tietoverkkotekniikan laitos, 313153 Otaniemi, Espoo Finland (e-mail: rainhard.findling@fh-hagenberg.at)', u'full_name': u'Rainhard Dieter Findling'}, {u'author_order': 2, u'affiliation': u'Institute of Networks and Security, Johannes Kepler University Linz, Linz, Upper Austria Austria (e-mail: michael.hoelzl@ins.jku.at)', u'full_name': u'Michael Holzl'}, {u'author_order': 3, u'affiliation': u'Institute of Networks and Security, Johannes Kepler University Linz, Linz, Upper Austria Austria (e-mail: rene.mayrhofer@jku.at)', u'full_name': u'Rene Mayrhofer'}] IEEE Transactions on Mobile Computing, None

Biometrics have become important for mobile authentication, e.g. to unlock devices before using them. One way to protect biometric information stored on mobile devices from disclosure is using embedded smart cards (SCs) with biometric match-on-card (MOC) approaches. However, computational restrictions of SCs also limit biometric matching procedures. We present a mobile MOC approach that uses offline training to obtain authentication ...


A secure framework for enhancing user authentication in cloud environment using biometrics

[{u'author_order': 1, u'affiliation': u'Karunya University', u'full_name': u'G. Jaspher Willsie Kathrine'}] 2017 International Conference on Signal Processing and Communication (ICSPC), None

Cloud is a ubiquitous computing technology dependent on geographically distributed computing entities like storage servers, dedicated systems and softwares. A cloud environment has dedicated systems, servers to provide the service promised by the service providers. As cloud computing is gaining more popularity, more importance is given to security issues such as, authentication, access control, storage, storage security and virtualization. Secure ...


Guest Editorial: Computer Vision for Animal Biometrics

None IET Computer Vision, 2018

None


Fuzzy inference for user identification of pressure-based keystroke biometrics

[{u'author_order': 1, u'affiliation': u'Department of Mechanical Engineering, Faculty of Engineering, Tunku Abdul Rahman University, College, Malaysia', u'full_name': u'Selina Xin Ci Loh'}, {u'author_order': 2, u'affiliation': u'Department of Mechanical Engineering, Faculty of Engineering, Tunku Abdul Rahman University, College, Malaysia', u'full_name': u'Hui Yan Ow-Yong'}, {u'author_order': 3, u'affiliation': u'Department of Mechanical Engineering, Faculty of Engineering, Tunku Abdul Rahman University, College, Malaysia', u'full_name': u'Hui Yan Lim'}, {u'author_order': 4, u'affiliation': u'Department of Electrical & Electronic Engineering, Faculty of Engineering, Tunku Abdul Rahman University College, Malaysia', u'full_name': u'Weng Kin Lai'}, {u'author_order': 5, u'affiliation': u'Faculty of Engineering, Tunku Abdul Rahman University College, Malaysia', u'full_name': u'Li Li Lim'}] 2017 IEEE 15th Student Conference on Research and Development (SCOReD), None

Keystroke biometrics belongs to the class of behavioral biometrics that is based on the user's typing rhythm when the user interacts with a keyboard -- either to authenticate or identify the user. Identification of the users based on just their keystroke patterns captured from a keystroke biometrics system is discussed in this paper. The keystroke pattern generated is represented by ...


Deep multi-task learning for gait-based biometrics

[{u'author_order': 1, u'affiliation': u'University of Cordoba', u'full_name': u'M. J. Mar\xedn-Jim\xe9nez'}, {u'author_order': 2, u'affiliation': u'University of Malaga', u'full_name': u'F. M. Castro'}, {u'author_order': 3, u'affiliation': u'University of Malaga', u'full_name': u'N. Guil'}, {u'author_order': 4, u'affiliation': u'Carnegie Mellon University', u'full_name': u'F. de la Torre'}, {u'author_order': 5, u'affiliation': u'University of Cordoba', u'full_name': u'R. Medina-Carnicer'}] 2017 IEEE International Conference on Image Processing (ICIP), None

The task of identifying people by the way they walk is known as 'gait recognition'. Although gait is mainly used for identification, additional tasks as gender recognition or age estimation may be addressed based on gait as well. In such cases, traditional approaches consider those tasks as independent ones, defining separated task-specific features and models for them. This paper shows ...


More Xplore Articles

Educational Resources on Biometrics

Back to Top

eLearning

No eLearning Articles are currently tagged "Biometrics"

IEEE-USA E-Books

  • Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics

    Biometrics have become important for mobile authentication, e.g. to unlock devices before using them. One way to protect biometric information stored on mobile devices from disclosure is using embedded smart cards (SCs) with biometric match-on-card (MOC) approaches. However, computational restrictions of SCs also limit biometric matching procedures. We present a mobile MOC approach that uses offline training to obtain authentication models with a simplistic internal representation in the final trained state, wherefore we adapt features and model representation to enable their usage on SCs. The pre- trained model can be shipped with SCs on mobile devices without requiring retraining to enroll users. We apply our approach to acceleration based mobile gait authentication as well as face authentication and compare authentication accuracy and computation time of 16 and 32 bit Java Card SCs. Using 16 instead of 32 bit SCs has little impact on authentication performance and is faster due to less data transfer and computations on the SC. Results indicate 11.4% and 2.4-5.4% EER for gait respectively face authentication, with transmission and computation durations on SCs in the range of 2s respectively 1s. To the best of our knowledge this work represents the first practical approach towards acceleration based gait MOC authentication.

  • A secure framework for enhancing user authentication in cloud environment using biometrics

    Cloud is a ubiquitous computing technology dependent on geographically distributed computing entities like storage servers, dedicated systems and softwares. A cloud environment has dedicated systems, servers to provide the service promised by the service providers. As cloud computing is gaining more popularity, more importance is given to security issues such as, authentication, access control, storage, storage security and virtualization. Secure user authentication is one of the main necessities of cloud computing in order to avoid loss for a cloud service provider and to provide secure service to the valid user. A secure biometric based authentication scheme is proposed which provides secure user identification, mutual authentication, session key issue and proxy issue in cases where a single cloud service provider (SP) provides more than one service. Cryptographic algorithm such as Elliptic Curve Cryptography is used for secure key generation and exchange. Freshness is added in the proposed scheme to resist against replay attack. The proposed scheme has optimal communication and computation cost.

  • Guest Editorial: Computer Vision for Animal Biometrics

    None

  • Fuzzy inference for user identification of pressure-based keystroke biometrics

    Keystroke biometrics belongs to the class of behavioral biometrics that is based on the user's typing rhythm when the user interacts with a keyboard -- either to authenticate or identify the user. Identification of the users based on just their keystroke patterns captured from a keystroke biometrics system is discussed in this paper. The keystroke pattern generated is represented by the force applied on a numerical keypad and it is this set of features extracted from a common password that will be used to identify the users. The typing biometrics system had been designed and developed with an 8-bit microcontroller that is based on the AVR enhanced RISC architecture. These keystroke patterns from each user will form the inputs to the fuzzy inference system (FIS) that will identify the users. The results will be validated with 70% of the data as training and the remaining 30% for testing.

  • Deep multi-task learning for gait-based biometrics

    The task of identifying people by the way they walk is known as 'gait recognition'. Although gait is mainly used for identification, additional tasks as gender recognition or age estimation may be addressed based on gait as well. In such cases, traditional approaches consider those tasks as independent ones, defining separated task-specific features and models for them. This paper shows that by training jointly more than one gait-based tasks, the identification task converges faster than when it is trained independently, and the recognition performance of multi-task models is equal or superior to more complex single-task ones. Our model is a multi-task CNN that receives as input a fixed-length sequence of optical flow channels and outputs several biometric features (identity, gender and age).

  • Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation

    The role of soft biometrics to enhance person recognition systems in unconstrained scenarios has not been extensively studied. Here, we explore the utility of the following modalities: gender, ethnicity, age, glasses, beard and moustache. We consider two assumptions: i) manual estimation of soft biometrics, and ii) automatic estimation from two Commercial Off-The-Shelf systems (COTS). All experiments are reported using the LFW database. First, we study the discrimination capabilities of soft biometrics standalone. Then, experiments are carried out fusing soft biometrics with two state-of-the-art face recognition systems based on deep learning. We observe that soft biometrics is a valuable complement to the face modality in unconstrained scenarios, with relative improvements up to 40%/15% in the verification performance when using manual/automatic soft biometrics estimation. Results are reproducible as we make public our manual annotations and COTS outputs of soft biometrics over LFW, as well as the face recognition scores.

  • I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics

    The comprehensive evolution of information communication technologies on mobile sensing objects has led to the provision of versatile ubiquitous network services embedded with specific- purpose modern sensors and intelligent wearable devices. The universal Internet connectivity of such smart objects has brought about a new era of ubiquitous application development for the Internet of Things. Meanwhile, security has become critically important. In the past decade, academia and industry have dedicated great efforts to the design of continuous authentication for multi-modal networks. Multiform authentication bio-tokens have been introduced for continuous entity identification and verification. With the rapid growth and universality of wearable devices, in this article we target continuous authentication for the IoT-based environment with users possessing wearable healthcare (and wellness) related smart objects. To present the state of the art, we provide a comprehensive review of continuous authentication in recent years. Critical characteristics of new biometrics are then introduced. Second, we present a wearable plantar bio-feature extractor constructed via commercial pressure sensors and the Raspberry PI platform. The prototype is adopted to retrieve user plantar bio-data as the raw (and training) data in the proposed authentication system. Third, we apply machinelearning- based techniques to derive a user's plantar bio-features as authentication tokens in the system to support continual (and real-time) entity verification in the background without the user's notice.

  • EEG based biometrics using emotional stimulation data

    EEG based biometrics using linear Support Vector Machine (SVM) is proposed in this paper. Human identification using electroencephalographic signal was done in this research. Reliability of most of the biometrics systems is not up to the mark because of the possibility of being faked or duplicated. Here, the brain signatures were used as a possible biometric identifier. A Database for Emotion Analysis using Physiological Signals containing 40 trials from each participant was used. International 10-20 system of EEG electrode placement was employed and data from Cz electrode was taken for this research. Some researches showed nice performance with few subjects. Here, 20 subjects were used from the dataset for the system. With this, the system gives 77% mean precision and at the same time 100% detection accuracy.

  • An improved authentication system using hybrid of biometrics and cryptography

    Data security is indispensable in our society, as human activities are increasingly becoming computerized and are transferred through complex communication networks across the globe. Existing methods used in securing data include cryptography and biometrics. However, the main shortcoming of cryptography is poorly-chosen or forgotten password while challenges with biometrics include interclass similarities in the feature sets used to represent trait and storing of biometric templates in clear unprotected format. This paper presents combination of cryptography and biometrics; a bimodal biometric Cryptosystem, using fingerprint and face as trait for authentication. Subjects' information were encrypted using Advanced Encryption Standard (AES) and biometric templates were stored as Binary Large Object (BLOB) in MYSQL database secured with Message Digest 5 (MD 5) Hashing Algorithm. The system was developed and implemented to operate on one-try, two-try and three-try configurations at varying threshold values. The developed system's performance was evaluated using False Reject Rate (FRR), False Accept Rate (FAR) and Receiver Operating Characteristic Curve (ROC graph) as performance metrics. On ROC graph, three-try configuration gave optimal performance at all threshold values.

  • A new brazilian hand-based behavioural biometrics database: data collection and analysis

    The technologies of biometrics provide a variety of powerful tools to determine or confirm individual identity while, more recently, there has been considerable interest in using soft biometrics (personal information which is characteristic of, but not unique to, individuals) in the identification task. Although the area has seen an increase advance in the last decade, there is still the need to understand the existing demographics differences. More importantly, though, is the acquisition of new and relevant multimodal databases that can be used for new investigations. Therefore, this paper presents a protocol for the collection of the first hand-based multimodal biometrics database with keystroke dynamics, keystroke-touch dynamics and handwritten signature in Brazil.



Standards related to Biometrics

Back to Top

Health Informatics - Personal Health Device Communication - Application Profile - Optimized Exchange Protocol

Within the context of the ISO/IEEE 11073 family of standards for device communication, this project defines a common framework for making an abstract model of personal health data available in transport independent transfer syntax required to establish logical connections between systems, provide presentation capabilities and services needed to perform communication tasks. The protocol is optimized to personal health usage requirements ...


Health Informatics - Personal Health Device Communication - Device Specialization - Blood Pressure Monitor

Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of communication between personal telehealth blood pressure monitor devices and compute engines (e.g. cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards including ISO/IEEE 11073 terminology, ...


Health Informatics - Personal Health Device Communication - Device Specialization - Glucose Meter

Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of communication between personal telehealth glucose meter devices and compute engines (e.g. cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards including ISO/IEEE 11073 terminology, information ...


Health Informatics - Personal Health Device Communication - Device Specialization - Pulse Oximeter

Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of communication between personal telehealth pulse oximeter devices and compute engines (e.g. cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards including ISO/IEEE 11073 terminology, information ...


Health Informatics - Personal Health Device Communication - Device Specialization - Weighing Scale

Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of communication between personal telehealth weighing scale devices and compute engines (e.g. cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards including ISO/IEEE 11073 terminology, information ...


More Standards


0 thoughts on “Ieee Research Papers On Biometrics

Leave a Reply

Your email address will not be published. Required fields are marked *