[PDF][PDF] BiosecurID: A Multimodal Biometric Database

A Ortega, V Cardenoso-Payo - academia.edu
A new multimodal biometric database, acquired in the framework of the BiosecurID project,
is presented together with the description of the acquisition setup and protocol. The …

[PDF][PDF] ENHANCING FACE RECOGNITION IN NOISY ENVIRONMENTS: A STUDY ON ROBUSTNESS AND PERFORMANCE

R Baimukashev, C Turan - workshops on ACeSYRI 2023 - idt.fri.uniza.sk
This paper explores the critical need for robust face recognition systems capable of handling
image corruption. We focus on assessing the performance of machine learning algorithms …

[PDF][PDF] Biometric Data Visualization: Enhancing Security and User Experience in Graphic Interfaces

M Nalwaya, A Jain - ijcnwc.com
This exploration delves into the convergence of biometric facts visualization and image
interfaces, charting its trajectory from historical roots to present day improvements and …

NOANIQ EKSTRAKTORLARGA ASOSLANGAN BIOMETRIK IDENTIFIKATSIYA TIZIMLARI TAHLILI

S Umarov, A Abduqodirov - Research and implementation, 2024 - fer-teach.uz
This paper presents an analysis of biometric identification systems that affect not only the
best but also high-accuracy extractors. This review presents a survey of recent …

[PDF][PDF] Minimal Preprocessing of ECG Signals for Deep Learning-Based Biometric Systems

Z Mizgalewicz, CR Cuenca, MW Rivolta, RD Labati… - piurilabs.di.unimi.it
In recent years, subject identification through electrocardiograms (ECGs) broaden the
possibilities of existing biometric systems. In this study, we proposed a novel ECG-based …

[PDF][PDF] Biomеtric Data Protеction Measures

BS Sharma, S Kumar, N Mehra - jmeonline.in
Onе of thе fundamеntal mеasurеs involvеs implеmеnting robust еncryption protocols for
biomеtric data during storagе and transmission. Utilizing statе-of-thе-art еncryption …

[PDF][PDF] Differential Privacy in Data Collection

N Singh, M Nalwaya - jmeonline.in
This rеsеarch papеr еxplorеs thе paradigm of diffеrеntial privacy in thе contеxt of data
collеction, addrеssing thе critical nееd to balancе data utility with individual privacy …

Teknologi IMPLEMENTASI IRIS RECONIGTION SEBAGAI AUTENTIFIKASI GUDANG DAN RAK SENJATA BERBASIS ALGORITMA DOUGMAN'S: Telekomunikasi

E Kuncoro - Jurnal Telkommil, 2024 - journal.poltekad.ac.id
Dalam konteks keamanan gudang dan penyimpanan senjata, perlindungan yang kuat dan
otentikasi yang andal menjadi kebutuhan utama. Iris recognition adalah salah satu teknologi …

[PDF][PDF] PERSPECTIVES ON COGNITIVE COMPUTING AND APPLICATIONS

MG SATHIYA - jnao-nu.com
Cognitive Computing (CC) is an emerging paradigm of intelligent computing theories and
technologies based on cognitive informatics, which implements computational intelligence …

[PDF][PDF] 強安全性基準に基づく受動的盗聴者が存在する生体識別システム

小柳翔吾 - uec.repo.nii.ac.jp
要 旨生体識別システム (BIS) は, 指紋などの情報を利用してユーザを識別するシステムである.
パスワード方式や IC カードの識別に比べて記憶忘れや紛失といった問題を回避できるため …