Search results for "Biometrics"

showing 10 items of 60 documents

A real-time network architecture for biometric data delivery in Ambient Intelligence

2012

Ambient Intelligent applications involve the deployment of sensors and hardware devices into an intelligent environment surrounding people, meeting users’ requirements and anticipating their needs (Ambi- ent Intelligence-AmI). Biometrics plays a key role in surveillance and security applications. Fingerprint, iris and voice/speech traits can be acquired by contact, contact-less, and at-a-distance sensors embedded in the environment. Biometric traits transmission and delivery is very critical and it needs real-time transmission net- work with guaranteed performance and QoS. Wireless networks become suitable for AmI if they are able to satisfy real-time communication and security system requi…

Network architectureAmbient intelligenceGeneral Computer ScienceBiometricsbusiness.industryComputer scienceWireless networkQuality of serviceComputational intelligenceAutomationAmbient Intelligence Efficient wireless sensor networks Real-time scheduling Biometric traits processingSoftware deploymentEmbedded systemWirelessIntelligent environmentbusinessJournal of Ambient Intelligence and Humanized Computing
researchProduct

Optimized Parallel Implementation of Face Detection based on GPU component

2015

Display Omitted An algorithm for face detection has been implemented on CPU.An acceleration of this algorithm on GPU migration.Performance of GPU implementation shows the effectiveness of this implementation.Another optimization method on GPU are operated. Face detection is an important aspect for various domains such as: biometrics, video surveillance and human computer interaction. Generally a generic face processing system includes a face detection, or recognition step, as well as tracking and rendering phase. In this paper, we develop a real-time and robust face detection implementation based on GPU component. Face detection is performed by adapting the Viola and Jones algorithm. We hav…

Parallel computingBiometricsComputer Networks and CommunicationsComputer science02 engineering and technologyParallel computing[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingFace detectionRendering (computer graphics)CUDACUDA optimizationArtificial Intelligence0202 electrical engineering electronic engineering information engineeringGraphics processorsAdaBoost[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsGraphicsWaldBoostFace detectionComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processingViola and Jones algorithmAdaBoostGrid020202 computer hardware & architectureShared memoryHardware and Architecture020201 artificial intelligence & image processing[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingSoftware
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct

An Embedded Biometric Sensor for Ubiquitous Authentication

2013

Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…

PasswordInformation managementUser informationSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEngineeringUbiquitous computingBiometricsTraceabilitybusiness.industry FPGA rapid prototypingBiometric identity managementFingerprintSelf-contained sensorUbiquitous authenticationIdentity managementEmbedded systembusinessEmbedded system
researchProduct

Fingerprint classification based on deep learning approaches: Experimental findings and comparisons

2021

Biometric classification plays a key role in fingerprint characterization, especially in the identification process. In fact, reducing the number of comparisons in biometric recognition systems is essential when dealing with large-scale databases. The classification of fingerprints aims to achieve this target by splitting fingerprints into different categories. The general approach of fingerprint classification requires pre-processing techniques that are usually computationally expensive. Deep Learning is emerging as the leading field that has been successfully applied to many areas, such as image processing. This work shows the performance of pre-trained Convolutional Neural Networks (CNNs…

Physics and Astronomy (miscellaneous)BiometricsComputer scienceGeneral Mathematicsfingerprint featuresfingerprint classification; deep learning; convolutional neural networks; fingerprint featuresConvolutional neural networks Deep learning Fingerprint classification Fingerprint featuresImage processing02 engineering and technologyConvolutional neural networkField (computer science)fingerprint classification020204 information systemsconvolutional neural networksQA1-9390202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Reliability (statistics)business.industryDeep learningFingerprint (computing)deep learningPattern recognitionIdentification (information)Chemistry (miscellaneous)Convolutional neural networks; Deep learning; Fingerprint classification; Fingerprint features020201 artificial intelligence & image processingArtificial intelligencebusinessMathematics
researchProduct

Obesity under full fresh fruit and vegetable access conditions

2021

There is no agreement regarding the role of fresh fruit and vegetables’ affordability, accessibility and availability, or access in general, on obesity rates. In this article we investigated whether access to fresh fruit and vegetables is related to better biometric indicators such as weight and body mass index. Using mediation and matching methods and assuming that farmers and traditional market sellers have easy access to fruit and vegetables, we found that having better access is not associated to a reduction in weight or body mass index. Potential explanations for this result are that better access was not associated with fresh fruit and vegetables’ consumption and fruit and vegetables’…

Physiology030309 nutrition & dieteticsSciencePopulationSocial SciencesBiologyResearch and Analysis MethodsHuman GeographyFood SupplyEducationBody Mass IndexUrban GeographyToxicology03 medical and health sciences0302 clinical medicineSociologyVegetablesComputational TechniquesMedicine and Health SciencesmedicineHumansObesity030212 general & internal medicineeducationEducational AttainmentNutritionMatching methodsConsumption (economics)0303 health scienceseducation.field_of_studyFarmersMultidisciplinaryGeographyBody WeightQRBiology and Life Sciencesfood and beveragesmedicine.diseaseObesityDietPhysiological ParametersBiometricsFoodFruitEarth SciencesMedicineBody mass indexResearch ArticlePLOS ONE
researchProduct

Fingerprint Traits and RSA Algorithm Fusion Technique

2012

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationBiometricsbusiness.industryComputer scienceData_MISCELLANEOUSPublic key infrastructureFingerprint recognitionComputer securitycomputer.software_genreEncryptionPublic-key cryptographyIdentifierFingerprint biometric and encryption algorithm fusion asymetric encryption tecniqueSmart cardbusinessAlgorithmcomputer
researchProduct

A Frequency-based Approach for Features Fusion in Fingerprint and Iris Multimodal Biometric Identification Systems

2010

The basic aim of a biometric identification system is to discriminate automatically between subjects in a reliable and dependable way, according to a specific-target application. Multimodal biometric identification systems aim to fuse two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy and dependability. In this paper, an innovative multimodal biometric identification system based on iris and fingerprint traits is proposed. The paper is a state-of-the-art advancement of multibiometrics, offering an innovative perspective on features fusion. In greater detail, a frequency-based approach result…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniBiometricsComputer sciencebusiness.industryIris recognitionFeature extractionFingerprint Verification CompetitionPattern recognitionFingerprint recognitionSensor fusionComputer Science ApplicationsHuman-Computer InteractionIdentification (information)Control and Systems EngineeringMultimodal biometricsFingerprintFusion techniques identification systems iris and fingerprint biometry multimodal biometric systemsComputer visionArtificial intelligenceElectrical and Electronic EngineeringbusinessSoftwareInformation Systems
researchProduct

An Embedded Module for Iris Micro-Characteristics Extraction

2009

In this paper a new approach, based on iris micro-characteristics, has been used to make possible an embedded biometric extractor. This recognition approach is based on ophthalmologic studies that have proven the existence of different micro-characteristics as well as fingerprint minutiae. These micro-characteristics are permanent and immutable and they can be used to create strong and robust identification systems.Biometric recognition systems are critical components of our everyday lives. Since such electronic products evolve to software intensive systems, where software, becoming larger, more complex and prevalent, introduces many problems in the development phases. The development of em…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniBiometricsbusiness.industryComputer scienceembedded software intensive systems iris micro-characteristics embedded module FPGA technologies biometric system.Feature extractionFingerprint recognitionIdentification (information)SoftwareEmbedded systemIRIS (biosensor)Field-programmable gate arraybusinessReactive systemComputer hardware
researchProduct