Essays about: "security and biometrics"
Showing result 6 - 10 of 30 essays containing the words security and biometrics.
-
6. Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. READ MORE
-
7. Feature learning with deep neural networks for keystroke biometrics : A study of supervised pre-training and autoencoders
University essay from Luleå tekniska universitet/DatavetenskapAbstract : Computer security is becoming an increasingly important topic in today’s society, withever increasing connectivity between devices and services. Stolen passwords have thepotential to cause severe damage to companies and individuals alike, leading to therequirement that the security system must be able to detect and prevent fraudulentlogin. READ MORE
-
8. Using XGBoost to classify theBeihang Keystroke Dynamics Database
University essay from Uppsala universitet/DatalogiAbstract : Keystroke Dynamics enable biometric security systems by collecting and analyzing computer keyboard usage data. There are different approaches to classifying keystroke data and a method that has been gaining a lot of attention in the machine learning industry lately is the decision tree framework of XGBoost. READ MORE
-
9. Improving the Security of the Android Pattern Lock using Biometrics and Machine Learning
University essay from Luleå tekniska universitet/Institutionen för teknikvetenskap och matematikAbstract : With the increased use of Android smartphones, the Android Pattern Lock graphical password has become commonplace. The Android Pattern Lock is advantageous in that it is easier to remember and is more complex than a five digit numeric code. However, it is susceptible to a number of attacks, both direct and indirect. READ MORE
-
10. Machine Learning for Text-Independent Speaker Verification : How to Teach a Machine to RecognizeHuman Voices
University essay from KTH/Skolan för elektro- och systemteknik (EES)Abstract : The aim of speaker recognition and veri cation is to identify people's identity from the characteristics of their voices (voice biometrics). Traditionally this technology has been employed mostly for security or authentication purposes, identi cation of employees/customers and criminal investigations. READ MORE