Essays about: "background of biometrics"
Showing result 1 - 5 of 11 essays containing the words background of biometrics.
-
1. Comparative Analysis of Machine Learning Algorithms for Biometric Iris Recognition Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Biometric identification plays a crucial role in various industries such as retail, and banking. Among the different biometric traits, iris patterns have become a reliable means of identification due to their unique features. In our thesis, we focus on evaluating and comparing different machine learning algorithms for irisrecognition. READ MORE
-
2. Acceptance of Biometric Systemsfor User Authentication and Identification
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins. READ MORE
-
3. Keystroke dynamics for student authentication in online examinations
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Biometrics are distinctive for each person, and can not be given away or hacked like a password. Keystroke dynamics is a behavioral biometric characteristic that can be used as a complementary authentication step [1]. In online examinations it is difficult to make sure that each student write their own work. READ MORE
-
4. Machine Learning for Text-Independent Speaker Verification : How to Teach a Machine to RecognizeHuman Voices
University essay from KTH/Skolan för elektro- och systemteknik (EES)Abstract : The aim of speaker recognition and veri cation is to identify people's identity from the characteristics of their voices (voice biometrics). Traditionally this technology has been employed mostly for security or authentication purposes, identi cation of employees/customers and criminal investigations. READ MORE
-
5. Seamless speaker recognition
University essay from KTH/Radio Systems Laboratory (RS Lab)Abstract : In a technologically advanced society, the average person manages dozens of accounts for e-mail, social networks, e-banking, and other electronic services. As the number of these accounts increases, the need for automatic user identification becomes more essential. READ MORE