首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Data fusion in biometrics   总被引:4,自引:0,他引:4  
Any biometric system has drawbacks and cannot warranty 100% identification rates, nor 0% false acceptance and rejection ratios. One way to overcome the limitations is through a combination of different biometric systems. In addition, a multimodal biometric recognition is more difficult to fool than a single, biometric system, because it is more unlikely to defeat two or three biometric systems than one. This paper summarizes the different data fusion levels, and how it must be performed in order to improve the results of each combined system on its own  相似文献   

2.
Nowadays many systems need a portable media to store some sensible data, such as smart cards. The information can be protected by the user with his Personal Identification Number (PIN), or through biometrics. Unfortunately, there is not a smart card today that can verify the biometric template inside it, performing this task in the terminal. The author has developed the algorithms and data structures needed to solve this problem. Therefore, he has created a smart card with user biometric authentication, based on an Open Platform smart card (in this case, a JavaCard). To achieve these results, different biometric techniques have been studied: speaker verification, hand geometry and iris recognition. Experimental results are given to show the viability of the prototype developed  相似文献   

3.
Face recognition is one of the most successful ways for biometric recognition. One of its advantages is the high social acceptance by users, because it does not have the criminal stigma associated to other biometric traits, such as fingerprints. In addition, the cost of a webcam can be below 20 USD, which is certainly lower than other biometric acquisition devices. For this reason, the authors have developed a low-cost door-opening system, which is installed in our university premises for lab control access.  相似文献   

4.
A summarization of one of the most successful behavioral biometric recognition methods: signature recognition. Probably this is one of the oldest biometric recognition methods, with high legal acceptance. Technological advances have made possible new perspectives for signature recognition, by means of capturing devices which provide more than the simple signature image: pressure, acceleration, etc., making it even more difficult to forge a signature.  相似文献   

5.
The following topics are dealt with: security environment; civil force protection; security technologies; transportation; vulnerability analysis; smart cards; biometric identification; human detection; passenger-examining imaging systems; intrusion detection; and hoax detection.  相似文献   

6.
When considering biometrics for a Personal Identification System, different modalities can be considered. The final selection will depend on specific application requirements. From the several modalities existing nowadays, vascular systems have appeared on the scene lately. Vein-based identification is claimed to be as reliable as fingerprint or iris identification, but with the usability of hand geometry or even the face. As with any other biometric modalities, vascular solutions have to be deeply analyzed for all relevant factors that could affect their performance or the security level achieved. This will show the analysis of the performance and security achieved by a commercial vascular biometric system, when being applied in several real-world scenarios. These scenarios will cover typical office environments to the more extreme environments, such as extreme light and temperatures, as those suffered in a banking ATM, or with high humidity such as in a gym. The results will show the strengths of this modality, as well as those points where further improvements are needed.  相似文献   

7.
Access control system with hand geometry verification and smartcards   总被引:1,自引:0,他引:1  
An access control system that joins the uniqueness of biometric verification, as well as the storage security and processing capabilities of smart cards, is defined here. The biometric technique chosen has been hand geometry, which is considered to provide low/medium security (there are other much more secure, as fingerprint, iris or retina), to be easy to use, to achieve high acceptance by users, and which performance is given throughout fast processing and medium cost. Also, the small template size needed for each user is positive for storage and processing capabilities required in the system. But the innovation in the system proposed is that the smart card not only stores the user's template, but also performs the verification process with the features set by the terminal to the card. With this improvement, the security of the system has risen because the template is never extracted from the card, avoiding duplication of such sensible data. The specifications for the enrolment process will be presented as well as the applications where this new system is recommended  相似文献   

8.
A biometric identification system, based on the processing of the human iris by the dyadic wavelet transform, has been introduced. The procedure to obtain an iris signature of 256 bits has been described, as well as the feature extraction block and the verification system. The results have shown that the system can achieve high rates of security.  相似文献   

9.
Privacy issues on biometric systems   总被引:1,自引:0,他引:1  
In the XXIst century, there is a strong interest on privacy issues. Technology permits obtaining personal information without individuals' consent, computers make it feasible to share and process this information and this can bring about damaging implications. In some sense, biometric information is personal information, so it is important to be conscious about what is true and what is false when some people claim that biometrics is an attempt to impinge upon an individual' privacy. In this paper, key points related to this matter are dealt with.  相似文献   

10.
During the last years, the authors are designing a high resolution fingerprint identification system based on minutiae extraction. In this sense, a fingerprint thinning algorithm by means of morphological image processing operations is presented, to improve the minutiae map involved. The first step, as in every biometric system, is to obtain an image of the user's fingerprint. After this, a pre-processing algorithm is applied which enables feature extraction steps to obtain the location and type of all minutiae; i.e., the discontinuities in the ridges and valleys of the fingerprint.  相似文献   

11.
Due to the great increase in Information Technology (IT) systems where user authentication is needed, security in those systems relies on using PINs or passwords. During recent years, the scientific community has been trying to improve biometric techniques to be accepted as an alternative to other user authentication schemes. One of the sectors where user identity must be verified, is the identification cards sector. In fact, if great security wants to be achieved, smart cards should be used. But cardholder verification is performed using Card Holder Verification Keys (CHV-Keys), which are PIN-based. The authors are trying to integrate fingerprint verification inside a smart card, following their works in the past. The fingerprint scheme used is shown, and the work to achieve the integration inside a commercial smart card is detailed.  相似文献   

12.
打击恐怖主义首先要预防恐怖分子,生物识别技术有助于将恐怖分子从人群中识别出来.耳朵是长期保持稳定的一个生物特征,并且耳朵的独特性十分明显.介绍了耳朵识别系统的系统功能和设计思路,采用VC 6.0和SQL SERVER 2000数据库,实现耳朵图像数据采集、图像预处理、图像存储等基本功能.  相似文献   

13.
Biometrics can offer improved security for access control. Several biometric devices can be adapted to our special requirements and some criterion is needed to choose the best solution for us. On the one hand, it is possible to use a standalone embedded system. On the other hand, a low-cost PC-based system can be better fitted to our special requirements, by means of special purpose software. With the actual reduction on the price of informatic components, it can be a good alternative. This describes one of these systems for door-opening with the user's fingerprint. Special emphasis is given on the design, advantages, and inconveniences with respect to embedded systems.  相似文献   

14.
Over the past few years, the authors have tried to integrate biometrics into a smart card. In this paper, to improve error rates obtained with hand geometry biometrics and the costs with the iris recognition system, fingerprints are used. This technique, quite well known in the industry and deeply studied for the last century, has improved its electronic sensors, pulling down prices and, therefore, enabling its use in many more applications. The first step, as in every biometric system, is to obtain an image of the user's fingerprint. After this, a pre-processing algorithm is applied, which enables feature extraction to obtain the location and type of all minutiae, i.e., the discontinuities in the ridges and valleys of the fingerprint. Due to the fact that it is not possible to always catch the same number of minutiae, a special matching algorithm should be applied to compare the feature vector with the corresponding user's template. Efforts to integrate this matching algorithm in a low computer power device, such as a smart card, are given, showing the paths that should be followed in order to improve the security of access control and payment systems available today.  相似文献   

15.
IriScan Inc. has been developing an identification/verification system capable of positively identifying and verifying the identity of individuals without physical contact or human intervention. A new technology, using the unique patterns of the human iris, shows promise of overcoming previous shortcomings and providing positive identification of an individual without contact or invasion, at extremely high confidence levels. The video-based system locates the eye and iris; evaluates the degree of occlusion by eyelid and spectral reflection; determines the quality of image focus; and determines the center and boundary of the pupil and the limbus (outer edge of the iris) for processing. The iris is zoned, and the features therein measured and encoded into a 256-byte (2048 bit) IrisCode for enrollment or identification. The presented biometric is compared to an extensive database for identification, or to a referenced IrisCode for verification. Computations and decisions are accomplished at extremely high rates of speed, resulting in processing times of less than two seconds. The process is based on the unique nature and extreme richness of the human iris. The multiple features produce a non-duplicable organ with more than 400 degrees of freedom, or measurable variables. The IriScan process typically uses about 200 of these to create a code which can be compared to an entire database in milliseconds, producing a positive identification with “imposter odds” as high as 1 in 1034  相似文献   

16.
一类非线性系统的鲁棒控制   总被引:1,自引:0,他引:1  
马克茂  张勇  王子才 《航空学报》1997,18(4):493-496
针对一类带不确定性的非线性系统,引入坐标变换,对变换后的系统设计了变结构鲁棒控制器,在一定界的限制下,可以达到对不确定性的抑制,不确定性的界不可知时,利用自适应技术进行在线估计;利用线性化方法,对系统的滑动模态进行设计,得到了稳定的滑动模态。  相似文献   

17.
鲍四元  邓子辰 《航空学报》2007,28(5):1098-1103
 提供了弹簧连接的锥形杆结构撞击问题的解析解。振动过程中把杆和质点作为整体考虑,采用无量纲变量,从而简化方程模型。算例说明了锥形杆中波传播情况和撞击端的响应,并且讨论了若干参数,如系统质量参数和锥形杆截面倾角对波传播的影响。解决含弹簧连接的锥形杆结构的纵向撞击问题,并且与等截面杆相应的纵向撞击问题进行了比较。  相似文献   

18.
无人机编队飞行问题初探   总被引:30,自引:1,他引:30  
朱战霞  袁建平 《飞行力学》2003,21(2):5-7,12
回顾了国内外无人机的发展历史和近年来的发展趋势,简要介绍了无人机在军事、国民经济和科学技术方面的作用。分析了单架无人机执行任务时面临的问题和编队飞行的优势,介绍了国内外在无人机编队飞行方面的研究状况,同时对保证无人机编队飞行的关键技术进行了探讨和分析。  相似文献   

19.
介绍了国产各型飞机舱盖玻璃所用的材料并进行了性能比较;介绍了飞机舱盖玻璃的主要故障模式并分别给予了故障原因分析;提出了提高飞机舱盖玻璃的抗故障能力的方法。  相似文献   

20.
分析微细超声加工机理;通过微细组合电加工技术制作多种截面形状的微细工具头;以此为基础进行多种硬脆材料的微结构超声加工试验及导电材料的超声电解复合加工试验.通过试验结果分析,得到微结构超声加工工艺特性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号