800 resultados para BIOMETRIC AUTHENTICATION


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed systems, make it a good candidate to replace most of thesecurity systems around. By making use of the distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person. Identification of this person is possible by applying appropriate matching algorithm.In this paper, Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical analysis of different feature detection operators is performed, features extracted is encoded using Haar wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and False Reject Rate is 10%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Biometrics has become important in security applications. In comparison with many other biometric features, iris recognition has very high recognition accuracy because it depends on iris which is located in a place that still stable throughout human life and the probability to find two identical iris's is close to zero. The identification system consists of several stages including segmentation stage which is the most serious and critical one. The current segmentation methods still have limitation in localizing the iris due to circular shape consideration of the pupil. In this research, Daugman method is done to investigate the segmentation techniques. Eyelid detection is another step that has been included in this study as a part of segmentation stage to localize the iris accurately and remove unwanted area that might be included. The obtained iris region is encoded using haar wavelets to construct the iris code, which contains the most discriminating feature in the iris pattern. Hamming distance is used for comparison of iris templates in the recognition stage. The dataset which is used for the study is UBIRIS database. A comparative study of different edge detector operator is performed. It is observed that canny operator is best suited to extract most of the edges to generate the iris code for comparison. Recognition rate of 89% and rejection rate of 95% is achieved

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The diffusion of highly productive breeds across developing countries goes along with a neglect of indigenous breeds, which are well suited to their environment but often show low yields. Thus, in Niger, the flock of Koundoum sheep are rapidly decreasing. The Koundoum is one of the few wool sheep breeds of Africa and shows important adaptive feature to its native environment, i.e. the humid pastures on the banks of the Niger River. To characterise the breed and to understand its production context, a survey has been conducted in 104 herds in four communes along the Niger River (Kollo, Tillabery, Say and Tera). Nine body measurements, including live weight, were taken on 180 adult sheep (101 females and 79 males). The herds varied from 2 to 60 heads, with a median size of eight animals and two thirds of the herds having less than 10 animals. Mainly fed on natural pastures, 85.6% of the herds received crop residues. Only natural mating was practiced. Veterinary care was restricted to anti-helminthic and some indigenous treatments. The frequent affiliation of breeders to professional unions appeared as favourable to the implementation of a collective conservation program. The Koundoum sheep were white or black coated, with the black colour being most frequent (75.6%). Wattles were present in both sexes at similar frequencies of around 14%. All biometric variables were significantly and positively correlated between them. The thoracic perimeter showed the best correlation with live weight in both males and females. Three variables were selected for live weight prediction: thoracic perimeter, height at withers and rump length. From the present study, it is expected that the in situ conservation of the Koundoum sheep will be highly problematic, due to lack of market opportunities for wool and the willingness of smallholders to get involved in pure Koundoum rearing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Describes different approaches to authentication for wireless networks, and the evolution of eduroam

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a novel method of authentication of users in secure buildings. The main objective is to investigate whether user actions in the built environment can produce consistent behavioural signatures upon which a building intrusion detection system could be based. In the process three behavioural expressions were discovered: time-invariant, co-dependent and idiosyncratic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Password Authentication Protocol (PAP) is widely used in the Wireless Fidelity Point-to-Point Protocol to authenticate an identity and password for a peer. This paper uses a new knowledge-based framework to verify the PAP protocol and a fixed version. Flaws are found in both the original and the fixed versions. A new enhanced protocol is provided and the security of it is proved The whole process is implemented in a mechanical reasoning platform, Isabelle. It only takes a few seconds to find flaws in the original and the fixed protocol and to verify that the enhanced version of the PAP protocol is secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a novel approach for free-text keystroke dynamics authentication which incorporates the use of the keyboard’s key-layout. The method extracts timing features from specific key-pairs. The Euclidean distance is then utilized to find the level of similarity between a user’s profile data and his/her test data. The results obtained from this method are reasonable for free-text authentication while maintaining the maximum level of user relaxation. Moreover, it has been proven in this study that flight time yields better authentication results when compared with dwell time. In particular, the results were obtained with only one training sample for the purpose of practicality and ease of real life application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The TCABR data analysis and acquisition system has been upgraded to support a joint research programme using remote participation technologies. The architecture of the new system uses Java language as programming environment. Since application parameters and hardware in a joint experiment are complex with a large variability of components, requirements and specification solutions need to be flexible and modular, independent from operating system and computer architecture. To describe and organize the information on all the components and the connections among them, systems are developed using the extensible Markup Language (XML) technology. The communication between clients and servers uses remote procedure call (RPC) based on the XML (RPC-XML technology). The integration among Java language, XML and RPC-XML technologies allows to develop easily a standard data and communication access layer between users and laboratories using common software libraries and Web application. The libraries allow data retrieval using the same methods for all user laboratories in the joint collaboration, and the Web application allows a simple graphical user interface (GUI) access. The TCABR tokamak team in collaboration with the IPFN (Instituto de Plasmas e Fusao Nuclear, Instituto Superior Tecnico, Universidade Tecnica de Lisboa) is implementing this remote participation technologies. The first version was tested at the Joint Experiment on TCABR (TCABRJE), a Host Laboratory Experiment, organized in cooperation with the IAEA (International Atomic Energy Agency) in the framework of the IAEA Coordinated Research Project (CRP) on ""Joint Research Using Small Tokamaks"". (C) 2010 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The biometric relationship between the weigth and the carapace width in the swimming crab A. cribrarius was compared with the results from other portunid crabs studied previously. During November/1988 to October/1989, a total of 403 specimens (189 males and 214 females) were collected with otter-trawl nets in north coast of the São Paulo State, Brazil. The animals were measured (carapace width excluding lateral spines = LC! and weighed (wet weight = PE). The empiric points of this relation were fit according to the power function (Y = a.X(b)) for each sex, maturation phases and total of individuals. The relation PE x LC indicates that the mole's growth changes during the ontogenesys from isometric (in juvenile phase) to allometric positive (in adult phase). For the females the growth is isometric in the two phases. The weight grows in a higher proportion than the carapace width variable (allometric positive growth). The data can be grouped in a single equation (PE = 7.85.10(-5).LC(3.14)) for the convertion between the variables there was a greater similarity between the equations obtained far each sex. In spite of this, the males present the fattening grade value (''a'') slightly higher than that of the females, possibly because of the greater size reached in its devellopment. The mean weight of the males is greater than the females one (p < 0.01). In the range 80 proves 90mm the males were more abundant, probably due to the females terminal ecdysis is near this size. The females only have the mean weight greater than the males in the 60 proves 70mm range (p < 0.01) when the puberty molt occurs and they present morphological changes in their reproductive system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses biometric identification using large databases, in particular, iris databases. In such applications, it is critical to have low response time, while maintaining an acceptable recognition rate. Thus, the trade-off between speed and accuracy must be evaluated for processing and recognition parts of an identification system. In this paper, a graph-based framework for pattern recognition, called Optimum-Path Forest (OPF), is utilized as a classifier in a pre-developed iris recognition system. The aim of this paper is to verify the effectiveness of OPF in the field of iris recognition, and its performance for various scale iris databases. The existing Gauss-Laguerre Wavelet based coding scheme is used for iris encoding. The performance of the OPF and two other - Hamming and Bayesian - classifiers, is compared using small, medium, and large-scale databases. Such a comparison shows that the OPF has faster response for large-scale databases, thus performing better than the more accurate, but slower, classifiers.