首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
On the vulnerability of biometric security systems   总被引:1,自引:0,他引:1  
This paper presents an overview of the weakness of biometric security systems and possible solutions to improve it. Different levels of attack are described, and the strengths and weaknesses of the main biometric system are emphasized. Solutions are provided with special emphasis on cryptography and watermarking techniques.  相似文献   

2.
Face recognition is one of the most successful ways for biometric recognition. One of its advantages is the high social acceptance by users, because it does not have the criminal stigma associated to other biometric traits, such as fingerprints. In addition, the cost of a webcam can be below 20 USD, which is certainly lower than other biometric acquisition devices. For this reason, the authors have developed a low-cost door-opening system, which is installed in our university premises for lab control access.  相似文献   

3.
Nowadays many systems need a portable media to store some sensible data, such as smart cards. The information can be protected by the user with his Personal Identification Number (PIN), or through biometrics. Unfortunately, there is not a smart card today that can verify the biometric template inside it, performing this task in the terminal. The author has developed the algorithms and data structures needed to solve this problem. Therefore, he has created a smart card with user biometric authentication, based on an Open Platform smart card (in this case, a JavaCard). To achieve these results, different biometric techniques have been studied: speaker verification, hand geometry and iris recognition. Experimental results are given to show the viability of the prototype developed  相似文献   

4.
A summarization of one of the most successful behavioral biometric recognition methods: signature recognition. Probably this is one of the oldest biometric recognition methods, with high legal acceptance. Technological advances have made possible new perspectives for signature recognition, by means of capturing devices which provide more than the simple signature image: pressure, acceleration, etc., making it even more difficult to forge a signature.  相似文献   

5.
When considering biometrics for a Personal Identification System, different modalities can be considered. The final selection will depend on specific application requirements. From the several modalities existing nowadays, vascular systems have appeared on the scene lately. Vein-based identification is claimed to be as reliable as fingerprint or iris identification, but with the usability of hand geometry or even the face. As with any other biometric modalities, vascular solutions have to be deeply analyzed for all relevant factors that could affect their performance or the security level achieved. This will show the analysis of the performance and security achieved by a commercial vascular biometric system, when being applied in several real-world scenarios. These scenarios will cover typical office environments to the more extreme environments, such as extreme light and temperatures, as those suffered in a banking ATM, or with high humidity such as in a gym. The results will show the strengths of this modality, as well as those points where further improvements are needed.  相似文献   

6.
Biometrics can offer improved security for access control. Several biometric devices can be adapted to our special requirements and some criterion is needed to choose the best solution for us. On the one hand, it is possible to use a standalone embedded system. On the other hand, a low-cost PC-based system can be better fitted to our special requirements, by means of special purpose software. With the actual reduction on the price of informatic components, it can be a good alternative. This describes one of these systems for door-opening with the user's fingerprint. Special emphasis is given on the design, advantages, and inconveniences with respect to embedded systems.  相似文献   

7.
Over the past few years, the authors have tried to integrate biometrics into a smart card. In this paper, to improve error rates obtained with hand geometry biometrics and the costs with the iris recognition system, fingerprints are used. This technique, quite well known in the industry and deeply studied for the last century, has improved its electronic sensors, pulling down prices and, therefore, enabling its use in many more applications. The first step, as in every biometric system, is to obtain an image of the user's fingerprint. After this, a pre-processing algorithm is applied, which enables feature extraction to obtain the location and type of all minutiae, i.e., the discontinuities in the ridges and valleys of the fingerprint. Due to the fact that it is not possible to always catch the same number of minutiae, a special matching algorithm should be applied to compare the feature vector with the corresponding user's template. Efforts to integrate this matching algorithm in a low computer power device, such as a smart card, are given, showing the paths that should be followed in order to improve the security of access control and payment systems available today.  相似文献   

8.
Access control system with hand geometry verification and smartcards   总被引:1,自引:0,他引:1  
An access control system that joins the uniqueness of biometric verification, as well as the storage security and processing capabilities of smart cards, is defined here. The biometric technique chosen has been hand geometry, which is considered to provide low/medium security (there are other much more secure, as fingerprint, iris or retina), to be easy to use, to achieve high acceptance by users, and which performance is given throughout fast processing and medium cost. Also, the small template size needed for each user is positive for storage and processing capabilities required in the system. But the innovation in the system proposed is that the smart card not only stores the user's template, but also performs the verification process with the features set by the terminal to the card. With this improvement, the security of the system has risen because the template is never extracted from the card, avoiding duplication of such sensible data. The specifications for the enrolment process will be presented as well as the applications where this new system is recommended  相似文献   

9.
对 GJB/Z77 多台同型产品增长模型的分析   总被引:10,自引:1,他引:9  
GJB/Z77的附录A中,阐述了如何应用AMSAA模型进行多台同型产品的可靠性增长,给出了趋势检验、参数估计和拟合优度检验的方法,并提供了一个实例。对该模型进行了分析,指出GJB/Z77中存在的错误。  相似文献   

10.
针对商业火箭公司对于液态甲烷过冷加注的需求,开展了基于液氮冷源的甲烷过冷加注系统方案设计,并计算得到了不同甲烷流量和液氮压力参数下的过冷器换热面积。为了防止液氮温度过低造成液态甲烷凝结,参考现有液氧和煤油工艺流程,提出2种不同控制策略的甲烷过冷加注系统,并详细对比分析了这2种系统所能实现的6个不同工艺流程。结果表明:基于背压控制的加注系统相比于基于液位控制的系统具有更高可靠性,同时前者能够实现在线实时加注工艺,原因在于其通过控制换热器中液氮压力来保证液氮温度始终高于甲烷冰点。甲烷过冷器换热面积与甲烷加注流量、液氮背压均成正比,在具体工程实施中应当根据加注需要选取合适的加注流量和液氮背压,以减小过冷器尺寸和降低设备制造成本。  相似文献   

11.
The following topics are dealt with: security environment; civil force protection; security technologies; transportation; vulnerability analysis; smart cards; biometric identification; human detection; passenger-examining imaging systems; intrusion detection; and hoax detection.  相似文献   

12.
The Kalman sequential linear estimation theory, although not always utilized because the number of computations required for many systems of practical importance becomes prohibitive, allows straight-forward synthesis of optimal estimators for many complex systems. Some systems designers have chosen to ignore variables and by such a reduction in system dimension have been able to economize with regard to the number of computations. The purpose of this paper is to demonstrate a method which allows economy of computation by partitioning the system state vector; the variables to be eliminated are placed in one subsystem and the remaining variables in one or more additional subsystems. The resultant system is computationally more efficient if some variables are eliminated. This is so because the remaining states have been partitioned into two or more subsystems. The number of computations for a subsystem varies approximately as the cube of the dimension of its state vector. By operating on several subsystems of lesser dimension than that of the unpartitioned system, the number of computations is decreased; performance will deteriorate. The method for determining the partitioning tends to keep this deterioration under control; it is illustrated by application to a marine-type inertial navigation system.  相似文献   

13.
Today, most every weapon system is electronics intensive. Digital computers are at the core of military aircraft, ship, and vehicle weapons systems. Indeed, each weapon system's performance is largely determined by its digital computers and other electronics. This electronics dependency is necessary in order to provide the speed, functional compliance, and accuracy to achieve the required weapon system performance. Historically, test systems required for the various maintenance levels and also at the manufacturing site have each been uniquely developed, employed, and sustained for only one area of weapon system electronics support. There are a number of reasons for this situation including different organizations responsible for the levels of support, different funding sources, timing limitations, and technical feasibility. In recent years, however, commercial-off-the-shelf (COTS) advances in measurement and stimulation hardware, personal computers, Windows operating systems, flexible test programming languages, and more, have made it technically feasible to develop a family of test systems that provide common weapon system electronics support at all levels. Some use the phrase Vertical Test Integration to describe this concept of factory/field/depot integration  相似文献   

14.
打击恐怖主义首先要预防恐怖分子,生物识别技术有助于将恐怖分子从人群中识别出来.耳朵是长期保持稳定的一个生物特征,并且耳朵的独特性十分明显.介绍了耳朵识别系统的系统功能和设计思路,采用VC 6.0和SQL SERVER 2000数据库,实现耳朵图像数据采集、图像预处理、图像存储等基本功能.  相似文献   

15.
The software complexity is continuously increasing and the competition in the software market is becoming more intensive than ever. Therefore, it is crucial to improve the software quality, and meanwhile, minimize software development cost, and reduce software delivery time in order to gain competitive advantages. Recently, Component-Based Software Development (CBSD) was proposed and has now been applied in various industry and business applications as a possible way to achieve this goal. As verified by numerous practical applications in different fields, CBSD is able to increase software development productivity as well as improve software quality. Modern embedded real-time systems have both strict functional and non-functional requirements and they are essentially safety-critical, real-time, and embedded software-intensive systems. In particular, the crucial end-to-end quality-of-service (QoS) properties should be assured in embedded systems such as timeliness and fault tolerance. Herein, I first introduce the modern component technologies and commonly used component models. Then, the middleware in distributed real-time embedded systems is discussed. Further, adaptive system resource management is elaborated upon. Finally, the prospects of a component-based approach in implementing modern embedded real-time software is discussed and future research directions are suggested.  相似文献   

16.
The geostationary tether satellite system expands the geostationary orbit resource from a one-dimensional arc into a two-dimensional disk. The tethered satellites, each several thousand kilometers apart and aligned along the local vertical, are stabilized at the altitude of the geosynchronous orbital speed. When this system is applied to communications systems, it is estimated that the number of satellites can be increased as much as thirteenfold and the communication capacity can be increased more than seventeenfold, compared with a conventional geostationary satellite orbit system  相似文献   

17.
Due to the great increase in Information Technology (IT) systems where user authentication is needed, security in those systems relies on using PINs or passwords. During recent years, the scientific community has been trying to improve biometric techniques to be accepted as an alternative to other user authentication schemes. One of the sectors where user identity must be verified, is the identification cards sector. In fact, if great security wants to be achieved, smart cards should be used. But cardholder verification is performed using Card Holder Verification Keys (CHV-Keys), which are PIN-based. The authors are trying to integrate fingerprint verification inside a smart card, following their works in the past. The fingerprint scheme used is shown, and the work to achieve the integration inside a commercial smart card is detailed.  相似文献   

18.
A biometric identification system, based on the processing of the human iris by the dyadic wavelet transform, has been introduced. The procedure to obtain an iris signature of 256 bits has been described, as well as the feature extraction block and the verification system. The results have shown that the system can achieve high rates of security.  相似文献   

19.
通信传输系统计算机仿真技术   总被引:1,自引:0,他引:1  
宋茂忠  邹深昌 《航空学报》1990,11(5):209-214
 摘要 本文综述了基于Monte-Carlo方法的各种误码率仿真算法,概括了线性、非线性和编译码通信信道的建模问题,给出了信号通过线性系统的各种仿真方法。最后提出了通信传输系统仿真技术的发展方向和有待深入研究的几个问题。  相似文献   

20.
IriScan Inc. has been developing an identification/verification system capable of positively identifying and verifying the identity of individuals without physical contact or human intervention. A new technology, using the unique patterns of the human iris, shows promise of overcoming previous shortcomings and providing positive identification of an individual without contact or invasion, at extremely high confidence levels. The video-based system locates the eye and iris; evaluates the degree of occlusion by eyelid and spectral reflection; determines the quality of image focus; and determines the center and boundary of the pupil and the limbus (outer edge of the iris) for processing. The iris is zoned, and the features therein measured and encoded into a 256-byte (2048 bit) IrisCode for enrollment or identification. The presented biometric is compared to an extensive database for identification, or to a referenced IrisCode for verification. Computations and decisions are accomplished at extremely high rates of speed, resulting in processing times of less than two seconds. The process is based on the unique nature and extreme richness of the human iris. The multiple features produce a non-duplicable organ with more than 400 degrees of freedom, or measurable variables. The IriScan process typically uses about 200 of these to create a code which can be compared to an entire database in milliseconds, producing a positive identification with “imposter odds” as high as 1 in 1034  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号