Spelling suggestions: "subject:"[een] BIOMETRICS"" "subject:"[enn] BIOMETRICS""
241 |
Securing Borders in West Africa: Transnational Actors, Practices, and KnowledgesFrowd, Philippe Mamadou 20 November 2015 (has links)
This dissertation examines border security practices in West Africa, with emphasis on the effects of practices of international intervention. The dissertation advances an understanding of borders as institutional spaces, eschewing a view of borders as geographical features alone. It leverages this view of borders to examine the everyday practices of border control, focusing in particular on the security professionals who cooperate and compete over the meaning and enactment of border security. The dissertation draws from ethnographic fieldwork in Senegal and Mauritania to advance three case studies. First, it examines Spanish police cooperation with Senegal and Mauritania on the prevention of irregular migration by sea and land routes. Second, it analyzes Mauritania’s construction of new border posts in response to migration and terrorism. Third, it looks into the adoption of biometric identification at airports and in official documents in Senegal and Mauritania. In each of these cases, the dissertation argues, everyday border security practices are framed in terms of capacity, with border control taking on the practical characteristics of statebuilding.
This dissertation makes three key contributions to knowledge. First, by focusing on the quotidian social and technical aspects of borders, it provides a view into the concrete knowledge practices and organizational politics that drive border control, even if they are of complex causality. Second, this dissertation contributes to security studies a theorization of the movement of security practices and understandings between global contexts. Third, by relying on fieldwork in closed and rarely accessible contexts, it provides a view into the functioning and social relations of West African fields of security. / Thesis / Doctor of Philosophy (PhD) / This dissertation examines efforts to boost border security in Senegal and Mauritania—two states on the Atlantic coast of West Africa—with emphasis on the international cooperation and knowledge transmission that emerges as part of these efforts. The dissertation argues that borders are not only lines on a map, but institutions in which security professionals compete and cooperate over questions such as who should carry out border control and how. It also argues that with security framed as a question of development and state capacity, securing borders becomes a question of statebuilding. To show this, the dissertation draws on data from interviews in law enforcement and national security agencies, embassies, and international organizations to provide a mapping of actors in the field of border security and their relations. Its empirical cases focus on joint migration patrols, border post construction, and the use of biometric identification
|
242 |
Acceptance of Biometric Systemsfor User Authentication and IdentificationDobaibi, Mymoon January 2023 (has links)
Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins.However, achieving a method that provides a 100% guarantee in all fields and for alldevices remains a challenge. To explore user perceptions on the acceptance of biometricsystems, an online survey was conducted with 99 participants from diversebackgrounds, education levels, ages, and countries. The survey focused on understandingusers’ acceptance of biometric systems based on their experiences and perspectives.Additionally, it aimed to investigate whether demographic factors, suchas age, education, and background, influence user acceptance. The study also comparedthe preferred authentication technique among users with findings from previousstudies. The survey results supported previous research, showing that fingerprinttechnology is the most recommended and preferred method for user authentication,followed by facial recognition. This study sheds light on the growing adoption ofbiometric systems to overcome password-related issues and provides valuable insightsinto user preferences for authentication and identification methods.
|
243 |
KUDDLERLewis, Evan January 2010 (has links)
No description available.
|
244 |
Multimodal recognition using simultaneous images of iris and face with opportunistic feature selectionTompkins, Richard Cortland 22 August 2011 (has links)
No description available.
|
245 |
DESIGN AND PERFORMANCE ANALYSIS OF A SECURE PROCES-SOR SCAN-SP WITH CRYPTO-BIOMETRIC CAPABILITIESKannavara, Raghudeep 29 October 2009 (has links)
No description available.
|
246 |
Secure Trust Establishment in an Internet of Things FrameworkMeharia, Pallavi January 2016 (has links)
No description available.
|
247 |
SINGULAR VALUE DECOMPOSITION AND 2D PRINCIPAL COMPONENT ANALYSIS OF IRIS-BIOMETRICS FOR AUTOMATIC HUMAN IDENTIFICATIONBrown, Michael J. 05 September 2006 (has links)
No description available.
|
248 |
Evasion Attacks Against Behavioral Biometric Continuous Authentication Using a Generative Adversarial NetworkBlenneros, Herman, Sävenäs, Erik January 2021 (has links)
The aim of the project was to examine the feasibilityof evading continuous authentication systems with a generativeadversarial network. To this end, a group of supervised andunsupervised state-of-the-art classifiers were trained on a publiclyavailable dataset of stroke patterns on mobile devices. To find thebest configurations for each classifier, hyper-parameter searcheswere performed. To attack the classifiers, a generative adversarialnetwork was trained on the dataset to reproduce samples followingthe same distribution. The generative adversarial networkwas optimized to maximize the Equal Error Rate metric of theclassifiers on the reproduced data. Our results show that theEqual Error Rate and the Threshold False Acceptance Rateincreased on generated samples compared to random evasionattacks. Across the classifiers, the greatest increase in Equal ErrorRate was 26 percent (for the artificial neural network), and thegreatest increase in Threshold False Acceptance Rate was 60percent for the same classifier. Moreover, it was found that, ingeneral, the unsupervised classifiers were more robust towardsthis type of attack. The results indicate that evasion attacksagainst continuous authentication systems using a generativeadversarial network are feasible and thus constitute a real threat. / Målet med detta projekt var att undersökamöjligheten att undgå ett aktivt verifieringssystem med hjälpav ett generativt nätverk. För att göra detta valde vi ut ettantal moderna klassifieringsalgoritmer och tränade dem på enoffentlig datasamling av svepmönster på mobiltelefoner. För atterhålla de bästa konfigurationerna för varje klassifieringsalgoritmutfördes hyper-parameter sökningar. För att attackera klassifieringsalgorithmernaimplementerades ett generative adversarialnetwork som tränades på datasamlingen för att reproduceraliknande svepmönster. Det generativa nätverket optimerades föratt maximera klassifieringsalgoritmernas likvärdiga felkvot medden reproducerade datan. Resultaten visar att den likvärdigafelkvoten och tröskeln av den felaktiga verifieringskvoten ökademed den reproducerade datan jämfört med slumpmässiga tester.Den högsta ökningen av den likvärdiga felkvoten var 26 procent(för det artificiella neurala nätverket) och den högsta ökningenav tröskeln av den felaktiga verifieringskvoten var 60 procent forsamma algoritm. Därutöver fann vi att de oövervakade klassifieringsalgoritmernavar mer motståndskraftiga mot denna typenav attack jämfört med de övervakade klassifieringsalgoritmerna.Resultaten tyder på att det är möjligt att till viss del undgå ettaktivt verifieringssystem med hjälp av ett generative adversarialnetwork och att denna typen av attacker utgör ett konkret hot. / Kandidatexjobb i elektroteknik 2021, KTH, Stockholm
|
249 |
Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security ManagersLease, David R. 10 1900 (has links)
The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examining managers’ perceptions of the security effectiveness, need, reliability, and cost-effectiveness of biometrics. The research indicates that positive perceptions of security effectiveness, need, reliability, and cost-effectiveness correlate with IT/IA managers’ willingness to recommend biometric security technologies. The implications of this study are that executives and managers can make informed decisions about the recommendation and adoption process relevant to biometric security technologies through an understanding of how perceptions of biometric technology affect the decision to recommend this type of technology. The study’s results may also help biometric product developers, vendors, and marketers understand the important perceptions of biometric security technologies within their customer base of IT/IA managers.
|
250 |
Design and Verification of Privacy and User Re-authentication SystemsJagadeesan, Harini 29 May 2009 (has links)
In the internet age, privacy and security have become major concerns since an increasing number of transactions are made over an unsecured network. Thus there is a greater chance for private data to be misused. Further, insider attacks can result in loss of valuable data. Hence there arises a strong need for continual, non-intrusive, quick user re-authentication. Previously, a number of studies have been conducted on authentication using behavioral attributes. Currently, few successful re-authentication mechanisms are available since they use either the mouse or the keyboard for re-authentication and target particular applications. However, successful re-authentication is still dependent on a large number of factors such as user excitation level, fatigue and using just the keyboard or the mouse does not mitigate these factors successfully.
Both keyboard and mouse contain valuable, hard-to-duplicate information about the user's behavior. This can be used for analysis and identification of the current user. We propose an application independent system that uses this information for user re-authentication. This system will authenticate the user continually based on his/her behavioral attributes obtained from both the keyboard and mouse operations. This re-authentication system is simple, continual, non-intrusive and easily deployable. To utilize the mouse and keyboard information for re-authentication, we propose a novel heuristic that uses the percentage of mouse-to-keyboard interaction ratio. This heuristic allows us to extract suitable user-behavioral attributes. The extracted data is compared with an already trained database for user re-authentication.
The accuracy of the system is calculated by the number of correct identifications to total number of identifications. At present, the accuracy of the system is around 96% for application based user re-authentication and around 82% for application independent user re-authentication. We perform black box, white box testing and Spec# verification procedures that prove the robustness of the proposed system. On testing POCKET, a privacy protection software for children, it was found that the security of POCKET was inadequate at the user level. Our system enhances POCKET security at the user level and ensures that the child's privacy is protected. / Master of Science
|
Page generated in 0.0318 seconds