Matyas et al., 2003 - Google Patents
Toward reliable user authentication through biometricsMatyas et al., 2003
View PDF- Document ID
- 11841567546931441285
- Author
- Matyas V
- Riha Z
- Publication year
- Publication venue
- IEEE Security & Privacy
External Links
Snippet
Acquiring samples. During a user's first contact with the biometric system, the system collects a biometric sample using an input device. The quality of the first sample is crucial. Sometimes even multiple acquisitions do not generate biometric samples of sufficient …
- 238000000034 method 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Matyas et al. | Toward reliable user authentication through biometrics | |
| Prabhakar et al. | Biometric recognition: Security and privacy concerns | |
| Matyáš et al. | Biometric authentication—security and usability | |
| Dasgupta et al. | Advances in user authentication | |
| US7864987B2 (en) | Methods and systems for secured access to devices and systems | |
| Roy et al. | Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems | |
| Jain et al. | An introduction to biometric recognition | |
| Dharavath et al. | Study on biometric authentication systems, challenges and future trends: A review | |
| Uludag et al. | Attacks on biometric systems: a case study in fingerprints | |
| US20100174914A1 (en) | System and method for traceless biometric identification with user selection | |
| Jain | Biometric recognition: overview and recent advances | |
| Matyáš et al. | Security of biometric authentication systems | |
| Matyáš et al. | Biometric authentication systems | |
| El-Abed et al. | Towards the security evaluation of biometric authentication systems | |
| Kalra et al. | A survey on multimodal biometric | |
| Shawkat et al. | Biometric technologies in recognition systems: a survey | |
| KR100701583B1 (en) | Biometric Information Authentication Method for Reducing the Acceptance Rate of Others | |
| Meghanathan | Biometric systems for user authentication | |
| Uchenna et al. | Evaluation of a fingerprint recognition technology for a biometric security system | |
| Oyetola et al. | Secured biometrics-crypto authentication system over computer network | |
| Al-Athari et al. | Selection of the Best threshold in Biometric Authentication by Exhaustive Statistical Pre-Testing | |
| Zibran | Biometric authentication: The security issues | |
| Pandiaraja et al. | An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology | |
| Tait | Behavioural biometrics authentication tested using eyewriter technology | |
| Sukaitis et al. | Building a path towards responsible use of Biometrics |