Fingerprint databases and evaluation

F Alonso-Fernandez, J Fierrez - 2015 - diva-portal.org
Fingerprint data in databases for evaluation are usually detached from the identity of
corresponding individuals. These databases are publicly available for research purposes …

Access Control, Biometrics, and the Future

ML Ali, M Qiu, S Schmeelk - Proceedings of the 2023 5th International …, 2023 - dl.acm.org
Access control is the process of protecting resources by allowing or rejecting access to
particular resources. It is an integral part of physical security systems and protects resources …

Comparative assessment of back propagation neural network and self organising feature map for iris-based access control system

AA Oluyemisi, OE Olusayo, MB Oyeladun… - Global Journal of …, 2023 - gjeta.com
Iris recognition is considered as one of the best biometric methods used for human
identification and verification because of its unique features that differ from one person to …

Registration of three dimensional human face images across pose and their applications in digital forensic

P Bagchi, D Bhattacharjee, M Nasipuri… - … Intelligence in Digital …, 2014 - Springer
In digital forensic, three-dimensional face recognition is very challenging problem. The
problem, with two-dimensional face recognition, is that, pose variation, illumination changes …

[PDF][PDF] An Implementation of Biometric Fingerprint-based Attendance System for Staff Management (BFASSM)

J Soyemi, FO Isinkaye - Journal of Computing and Intelligent …, 2020 - researchgate.net
Accepted on 18th SEP 2020 XXX 2017 Abstract—The workforce is the bedrock of growth,
development, and expansion in any establishment. Therefore, there is need to ensure …

A security model for Namibian Government Services

L Erastus, N Jere, FB Shava - 2017 IST-Africa Week …, 2017 - ieeexplore.ieee.org
As technology evolves, the once reliable traditional authentication and verification systems
are now open to a number of security threats, some of which may not be combated by these …

Two-stage appearance-based re-identification of humans in low-resolution videos

J Metzler - 2012 IEEE International Workshop on Information …, 2012 - ieeexplore.ieee.org
The objective of human re-identification is to recognize a specific individual on different
locations and to determine whether an individual has already appeared. This is especially in …

[PDF][PDF] Fingerprint Identification System Using Half Smoothing Filters

ZA Abdulkader - Webology, 2022 - researchgate.net
Fingerprints have been significantly utilized for enormous security systems for their highlevel
accuracy. They even have been used effectively in smartphone devices for payment in …

An Escape Game to Find the Owner of a Latent Fingerprint While Learning Biometry

M Queiruga-Dios, JJ Bullón Pérez… - Breakthroughs in Digital …, 2022 - Springer
In recent years, several active methodologies and approaches are being used at the
university level. Some courses are easily adapted to different teaching and learning …

Transformations for volumetric range distribution queries

S Martin, HW Shen - 2013 IEEE Pacific Visualization …, 2013 - ieeexplore.ieee.org
Volumetric datasets continue to grow in size, and there is continued demand for interactive
analysis on these datasets. Because storage device throughputs are not increasing as …