Results 1 to 10 of about 219,425 (266)
Biometric authentication is used to secure digital or physical access. Such an authentication system uses a biometric database, where data are sometimes protected by cancelable transformations. This paper introduces the notion of biometric masterkeys. A masterkey is a feature vector such that the corresponding template matches with a significant number
Gernot, Tanguy, Lacharme, Patrick
openaire +4 more sources
Worst-Case Morphs Using Wasserstein ALI and Improved MIPGAN
A morph is a combination of two separate facial images and contains the identity information of two different people. When used in an identity document, both people can be authenticated by a biometric face recognition (FR) system. Morphs can be generated
U. M. Kelly +4 more
doaj +1 more source
To expand the potential use of in-shoe motion sensors (IMSs) in daily healthcare or activity monitoring applications for healthy subjects, we propose a real-time temporal estimation method for gait parameters concerning bilateral lower limbs (GPBLLs ...
Chenhui Huang +5 more
doaj +1 more source
BIOMETRICS AND CRIMINAL INVESTIGATION
The work aims to analyze biometrics in trial, the concept, biometrics as a technological research diligence, biometrics in Spain, the biometrics of the future and a proposal towards a law of proceedings and biometric data.
Federico Bueno da Mata
doaj +1 more source
Evaluating biometrics by using a hybrid MCDM model
Biometrics has been developing for decades in diverse industries, such as consumer electronics, internet of things, financial industry, etc. The purpose of this research is to build a decision-making model to evaluate and improve the performances of ...
Hung-Jia Tsuei +2 more
doaj +1 more source
A multi-channel soft biometrics framework for seamless border crossings
As the number of passengers at border entry points such as airports and rail stations increases, so does the demand for seamless, secure, and fast biometric technologies for verification purposes.
Bilal Hassan +3 more
doaj +1 more source
Biometrics, e.g., fingerprints, the iris, and the face, have been widely used to authenticate individuals. However, most biometrics are not cancellable, i.e., once these traditional biometrics are cloned or stolen, they cannot be replaced easily.
Ming Li, Yu Qi, Gang Pan
doaj +1 more source
On the Representation Learning of Conditional Biometrics for Flexible Deployment
Unimodal biometric systems are commonplace nowadays. However, there remains room for performance improvement. Multimodal biometrics, i.e., the combination of more than one biometric modality, is one of the promising remedies; yet, there lie various ...
Tiong-Sik Ng +3 more
doaj +1 more source
Adverse drug reactions of anti-infective drugs for systemic use in Morocco: Pharmaco-Epidemiological study 2008-2016 [PDF]
Analyzing the spontaneous reports of adverse drug reactions (ADRs) of anti-infective drugs for systemic use is an essential pillar in creating valuable database in pharmacovigilance.Therefore, the main of this study is to describe the epidemiological and
Kharbouch Donia +7 more
doaj +1 more source
Biometrics and Biosecurity [PDF]
We are very happy to publish this special issue of a Journal of Biomedicine and Biotechnology published by Hindawi Publishing Corporation. This special issue contains 23 articles among totally 192 papers accepted in the BSBT 2011, AITS 2012, ISA 2012, and UCMA 2012 postsubmission.
Tai hoon Kim +5 more
openaire +2 more sources

