Biometrics
33,151 Followers
Recent papers in Biometrics
Gait recognition is a technique that identifies or verifies people based upon their walking patterns. Smartwatches, which contain an accelerometer and gyroscope have recently been used to implement gait-based biometrics. However, this... more
In this project, an attempt has been made to the development of an authenticated electronic voting system using fingerprint and facial images. The two-fold authentication system improves the security of the voting process and reduces the... more
Emotion recognition is one of the important highlights of human emotional intelligence and has long been studied to be incorporated with machine intelligence argued to make machines even more intelligent. This paper aims to contribute to... more
We propose a population pharmacokinetic (PK) model with time-dependent covariates measured with errors. This model is used to model S-oxybutynin's kinetics following an oral administration of Ditropan, and allows the distribution rate to... more
Biometric based systems for individual authentication are increasingly becoming indispensable for protecting life and property. They provide ways for uniquely and reliably authenticating people, and are difficult to counterfeit. Biometric... more
Y. Kominami). a v a i l a b l e a t w w w . s c i e n c e d i r e c t . c o m j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / a g r f o r m e t 0168-1923/$ -see front matter # a g r i c u l t u r a l a n d... more
The Enterprise Excellence (EE) philosophy is a holistic model for leading an enterprise to total excellence by focusing on the needs of the customer whether within the state, the nation, and the world. The rate of change in today's... more
The word biometrics refers to the use of physiological or biological characteristics of human to recognize and verify the identity of an individual. Face is one of the human biometrics for passive identification with uniqueness and... more
In this paper we present a framework for realtime online signature verification scenarios. The proposed framework is based on state-of-the-art feature extraction and Gaussian Mixture Model (GMM) classification. While our signature... more
The reliable extraction of characteristic gait features from image sequences and their recognition are two important issues in gait recognition. In this paper, we propose a novel two-step, model-based approach to gait recognition by... more
The adoption of the Treaty of Lisbon and the granting to the Charter of Fundamental Rights of the same legal force as the Treaty has lent a new impulse to the consideration of fundamental human rights by the European Union (EU). The... more
Most of the existing techniques for palmprint recognition rely on metrics, typically based on static functions, which evaluate the distance between a pair of features. In this paper, we propose a new technique for palmprint verification... more
During 1997, quarterly exploratory cruises of the R/V``Archipelago'' were carried out in order to study the deep water crab Chaceon af®nis [Res. Camp. Sci. Mo Ânaco Fasc. VII (1894) 1], South of Pico island (Azores) and at the Menez Gwen... more
This study aims to establish whether the residential background of consumers has a varying influence on their buying decisions due to the influence of TV advertising.
The study of human gait is one of the interesting fields among several disciplines. This arena has attracted researchers and professionals not only from human physiology and neuro biology but has also fascinated scientists from... more
The matching score distributions produced by different biometric modalities are heterogeneous. The same is true for the matching score distributions obtained for different probes. Both of these problems can be addressed by score... more
Now day’s security of any area is most important task. At different places security required authentication for that purpose biometric system is commonly used. Biometrics is the most suitable means of identifying and authenticating... more
Face recognition is one of the most important image processing research topics which is widely used in personal identification, verification and security applications. In this paper, a face recognition system, based on the principal... more
Competition between contest and scramble strategists was examined using two strains of Callosobruchus maculatus, the contest strain (iQ.) and the scramble strain (tQ). The direct larval interference experiment within each strain showed... more
Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a... more
Iris recognition imaging constraints are receiving increasing attention. There are several proposals to develop systems that operate in the visible wavelength and in less constrained environments. These imaging conditions engender... more
User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, non-universality of the biometric trait and unacceptable error rates. Attempting to improve the... more
The diversity and niche specificity of hemi-epiphytic figs in a lowland dipterocarp forest in Sarawak were investigated in 1998. Twenty-seven fig species (264 individuals, c. 120 ha) colonized a diversity of host taxa (35 families), but... more
For intelligent service robots, it is essential to recognize users in order to provide appropriate services to a correctly authenticated user. However, in robot environments in which users freely move around the robot, it is difficult to... more
In many parts of the world, the military has been very busy in recent times engaging in terror and other related wars. This requires that men and materials have to be located in different parts of their strategic geographic centres. And... more
In this paper we aim to use the power of Social Engineering to bypass Keystroke Recognition based authentication system. We have designed a virtual chat system (basically a chat bot), coded in Python, which performs the much needed social... more
The need for clarity in the healthcare management is a matter of frequent discussion and concern among healthcare professionals, practitioners, patients and academicians. Electronic Health Records would provide clarity, transparency,... more
Palm vein authentication is one of the modern biometric techniques, which employs the vein pattern in the human palm to verify the person. The merits of palm vein on classical biometric (e.g. fingerprint, iris, face) are a low risk of... more
Microalgae and larval feeding in mollusc hatchery In mollusc hatchery the production of living phytoplancton is widely used to feed bivalve larvae. However, to be suitable, the algal cells must have a proper size, have an adequate... more
The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses,... more
Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been... more
The rapid spread of electronic fingerprinting not only creates new regimes of surveillance but compels users to adopt novel ways of performing their bodies to suit the new technology. This ethnography uses two Indian case studies-of a... more
Over the internet today, communication and computing environments are significant aspect for everyone. Then in order to secure our communication from the unauthorized access the network and different enemies we should apply biometric... more
Dr. Mrs. Ravi Kiran School of Management & Social Sciences, Thapar University Patiala, India E-mail: [email protected] Abstract Financial markets are constantly becoming more efficient by providing more promising solutions to the... more
Voice biometric feature extraction is the core task in developing any speaker identification system. This paper proposes a robust feature extraction technique for the purpose of speaker identification. The technique is based on processing... more
Biometrics is a rapidly evolving technology which is being widely used in forensics such as criminal identification and prison security, and has the potential to be used in a large range of civilian application areas. Biometrics can be... more
Recently, several papers have proposed pseudo dynamic methods for automatic handwritten signature verification. Each of these papers uses texture measures of the gray
Security has become a major issue globally and in order to manage the security challenges and reduce the security risks in the world, biometric systems such as face detection and recognition systems have been built. These systems are... more
E xtracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in the fingerprint pattern, mainly terminations and... more