[go: up one dir, main page]

Matyas et al., 2003 - Google Patents

Toward reliable user authentication through biometrics

Matyas et al., 2003

View PDF
Document ID
11841567546931441285
Author
Matyas V
Riha Z
Publication year
Publication venue
IEEE Security & Privacy

External Links

Snippet

Acquiring samples. During a user's first contact with the biometric system, the system collects a biometric sample using an input device. The quality of the first sample is crucial. Sometimes even multiple acquisitions do not generate biometric samples of sufficient …
Continue reading at www.cedar.buffalo.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification

Similar Documents

Publication Publication Date Title
Matyas et al. Toward reliable user authentication through biometrics
Prabhakar et al. Biometric recognition: Security and privacy concerns
Matyáš et al. Biometric authentication—security and usability
Dasgupta et al. Advances in user authentication
US7864987B2 (en) Methods and systems for secured access to devices and systems
Roy et al. Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems
Jain et al. An introduction to biometric recognition
Dharavath et al. Study on biometric authentication systems, challenges and future trends: A review
Uludag et al. Attacks on biometric systems: a case study in fingerprints
US20100174914A1 (en) System and method for traceless biometric identification with user selection
Jain Biometric recognition: overview and recent advances
Matyáš et al. Security of biometric authentication systems
Matyáš et al. Biometric authentication systems
El-Abed et al. Towards the security evaluation of biometric authentication systems
Kalra et al. A survey on multimodal biometric
Shawkat et al. Biometric technologies in recognition systems: a survey
KR100701583B1 (en) Biometric Information Authentication Method for Reducing the Acceptance Rate of Others
Meghanathan Biometric systems for user authentication
Uchenna et al. Evaluation of a fingerprint recognition technology for a biometric security system
Oyetola et al. Secured biometrics-crypto authentication system over computer network
Al-Athari et al. Selection of the Best threshold in Biometric Authentication by Exhaustive Statistical Pre-Testing
Zibran Biometric authentication: The security issues
Pandiaraja et al. An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology
Tait Behavioural biometrics authentication tested using eyewriter technology
Sukaitis et al. Building a path towards responsible use of Biometrics