Essays about: "biometric systems"
Showing result 1 - 5 of 30 essays containing the words biometric systems.
-
1. Comparative Analysis of Machine Learning Algorithms for Biometric Iris Recognition Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Biometric identification plays a crucial role in various industries such as retail, and banking. Among the different biometric traits, iris patterns have become a reliable means of identification due to their unique features. In our thesis, we focus on evaluating and comparing different machine learning algorithms for irisrecognition. READ MORE
-
2. Contactless palm print recognition: Novel design and palm openness classification
University essay from Lunds universitet/Matematik LTHAbstract : Biometric technologies, such as facial and fingerprint recognition, have become widely adopted for identity verification in various applications. Palm biometrics, utilizing the unique patterns of the human palm, has gained significant attention for its accuracy and security. READ MORE
-
3. Acceptance of Biometric Systemsfor User Authentication and Identification
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins. READ MORE
-
4. Polar Codes for Biometric Identification Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Biometrics are widely used in identification systems, such as face, fingerprint, iris, etc. Polar code is the only code that can be strictly proved to achieve channel capacity, and it has been proved to be optimal for channel and source coding. READ MORE
-
5. Evasion Attacks Against Behavioral Biometric Continuous Authentication Using a Generative Adversarial Network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The aim of the project was to examine the feasibilityof evading continuous authentication systems with a generativeadversarial network. To this end, a group of supervised andunsupervised state-of-the-art classifiers were trained on a publiclyavailable dataset of stroke patterns on mobile devices. READ MORE