Advanced search    

Search: Biometrics

18,181 papers found. Showing first 1,000 results.
Use AND, OR, NOT, +word, -word, "long phrase", (parentheses) to fine-tune your search.

Biometrics for Hospitality and Tourism: A New Wave of Information Technology

The technologies that empower biometrics have been around for a number of years, but until recently these technologies have been viewed as exotic. In the not too distant future biometrics will be ... biometrics nil/ be used to regulate i n t e n d pmcesses and to i q m v e semri@ in the ho.pitaL@ and tourism industries. Thi~poperpmvidesan understandtng ofthe m m n t use ofbiometrics ingenera/ and

Combining Cryptography with EEG Biometrics

of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete ... the head of a subject according to a given map such as the 10–20 international system for the placement of EEG electrodes. Recently, BCI applications for biometrics have attracted increased attention

EEG-Based Biometrics: Challenges And Applications

. Introduction Biometrics is aimed at recognizing individuals based on physical, physiological, or behavioural characteristics of a human body such as fingerprint, gait, voice, iris, and gaze. Currently, the state ... -of-the-art methods for biometric authentication are being incorporated in various access control and personal identity management applications. While the hand-based biometrics (including fingerprint

EEG-Based Biometrics: Challenges And Applications

. Introduction Biometrics is aimed at recognizing individuals based on physical, physiological, or behavioural characteristics of a human body such as fingerprint, gait, voice, iris, and gaze. Currently, the state ... -of-the-art methods for biometric authentication are being incorporated in various access control and personal identity management applications. While the hand-based biometrics (including fingerprint

Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art

Biometric Boom: How the Private Sector Commodifies Human Characteristics

Biometric technology has become an increasingly common part of daily life. Although biometrics have been used for decades, recent ad- vances and new uses have made the technology more prevalent ... widespread use of biometrics by the private sector is commodifying human characteristics. As the use of biometrics has become more extensive, it exacerbates and exposes individuals and industry to a number of

Correction: Biometrics: Accessibility challenge or opportunity?

is: Blanco-Gonzalo R , Lunerti C, Sanchez-Reillo R, Guest R (2018) Biometrics: Accessibility The fourth author's name is incorrect. The correct name is: Richard Guest. The correct citation OPEN ACCESS

Biometrics: Accessibility challenge or opportunity?

modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether ... modalities and user category establishing guidelines for future accessible biometric products. - Funding: The authors received no specific funding for this work. Introduction Biometrics have an important

Research Note: Biometric Technology Applications and Trends in Hotels

The purpose of this study is to investigate the biometrics technologies adopted by hotels and the perception of hotel managers toward biometric technology applications. A descriptive, cross sectional ... verification, fingerprint recognition, iris scanning, hand geometry, vein patterns, voice recognition, and facial recognition are major methods used in biometrics. Biometric technology is a highly effective way

Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments

According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a ... possession factor, biometric information which possesses the uniqueness further enhances the security of sensitive datas [ 31, 32 ]. Besides, it is exceedingly difficult for adversary to forge the biometrics

Eye Safety Related to Near Infrared Radiation Exposure to Biometric Devices

Biometrics has become an emerging field of technology due to its intrinsic security features concerning the identification of individuals by means of measurable biological characteristics. Two of the ... legislation. infrared radiation; safety; eye; retina; nonionizing radiation; biometrics INTRODUCTION Biometric methodologies manipulate a measurable biological characteristic of the human anatomy. For a

Biometrics, JABES and the International Biometric Society

' freedom to attend such meetings and to engage with each other on a global scale. - Biometrics: The journal is a top scholarly publication reporting work promoting the use of statistical and mathematical ... theory and methods in the biosciences. Biometrics was founded in 1945 as Biometrics Bulletin, and the streamlined title Biometrics has been in use since 1947. The journal has published many seminal, highly

Biometrics Data Security Techniques for Portable Mobile Devices

gradually gaining usage. Biometrics; Mobile clients Introduction Authentication in a cyber environment is the process of enabling a device to validate the identity of a specific user so as to allow or deny ... the user’s request to access a system/ network or a service. In this paper, we focus on biometrics (and specifically fingerprinting) as a means of authentication, particularly for mobile devices. We

Assessment and Characterization of Physical Habitat, Water Quality, and Biotic Assemblages of the Tyronza River, Arkansas

Department of Environmental Quality’s (ADEQ) regional biometrics. Water samples were collected at 9 stations across 4 seasonal intervals. Physical habitat, fish, and macroinvertebrates were collected at 9

Biometric recognition via texture features of eye movement trajectories in a visual searching task

and eye trackers’ temporal and spatial resolution are still the foremost considerations in eye movement biometrics. With a focus on these issues, we proposed a new visual searching task for eye movement ... data collection and a new class of eye movement features for biometric recognition. In order to demonstrate the improvement of this visual searching task being used in eye movement biometrics, three

User-Authentication on Wearable Devices Based on Punch Gesture Biometrics

user according to the biometrics of this action. This mechanism is light-weighted and do not require user to remember any secret code. We develop an authentication system on Samsung Gear Fit 2 and ... this work we identify the user based on the biometrics generated by punch gesture. Since each person has a unique way of doing a punch gesture which reveals the information of one’s identity. And this

Influence of eye biometrics and corneal micro-structure on noncontact tonometry

Purpose Tonometry is widely used as the main screening tool supporting glaucoma diagnosis. Still, its accuracy could be improved if full knowledge about the variation of the corneal biomechanical properties was available. In this study, Optical Coherence Tomography (OCT) speckle statistics are used to infer the organisation of the corneal micro-structure and hence, to analyse its...

Editorial note: Advances in Multimedia Security: Biometrics and Forensics

: Biometrics and Forensics^. Of 30 papers submitted to this issue, 8 were eventually accepted after the stringent peerreview process.

Societal and ethical issues of digitization

In this paper we discuss the social and ethical issues that arise as a result of digitization based on six dominant technologies: Internet of Things, robotics, biometrics, persuasive technology ... also been digitized by biometrics and persuasive technology. Biometric information enables the use of unique physical characteristics—such as a person’s face, voice or fingerprint—for verification or

Identification performance of evidential value estimation for ridge-based biometrics

Law enforcement agencies around the world use ridge-based biometrics, especially fingerprints, to fight crime. Fingermarks that are left at a crime scene and identified as potentially having ... argument should hold true as well and the EV score q should serve as a basic image quality estimate. We test four image sets of ridge-based biometrics. Each image set consists of a reference set R and a