Spelling suggestions: "subject:"biometric.""
431 |
Pré-processamento dos intervalos de tempos observados na dinâmica de digitação (KeyStroke) de senhas curtasBezerra Júnior, Murilo Alves 27 September 2013 (has links)
In 2006, a method was proposed concerning the use of time interval equalization to improve performances of some biometric methods based on typing dynamics (or keystroke). In the paper where that method was first proposed, relatively small databases were used for showing, in terms of error rates, the effect of time equalization applied as a preprocessing step before the use of classical methods. In 2009, a much larger large database for keystroke research was made publicly available, through the Internet. This database is based on a single hypothetical password, typed by 51 volunteers through 8 sessions (50 samples per session). In this dissertation, the preprocessing method is adapted to this large public database of short typing patterns. Thus, by using the same biometric detectors already used by the owners of the database, we obtain new experimental results which clearly show an outstanding performance gain when the equalization interval (preprocessing) is applied. It is also studied
the performance gain as a function of the password length (in number of symbols), and the stability of typing pattern against changes in the order of typed symbol pairs. Finally, the last study was carried to a new database we acquired with both direct and inverted sequence of symbols, allows for the analysis of keyboard layout changes on biometric performances. / Em 2006, um método foi proposto sobre o uso da equalização de intervalos de tempos, como forma de melhorar o desempenho de alguns métodos biométricos baseados em dinâmica de digitação (keystroke). Naquele artigo, pequenas bases de dados, com textos estáticos e livres, foram usadas para mostrar, em termos de taxas de erros, os ganhos quando a equalização era aplicada antes do uso de métodos clássicos. Em 2009, lançou-se uma base pública grande, correspondente a uma única senha hipotética curta, digitada por 51 voluntários, usada pelos autores do trabalho e, posteriormente, disponibilizada, publicamente, para novos experimentos. Nesta dissertação utilizou-se essa grande base pública, para a qual adapta-se a equalização de intervalos. Utilizando os mesmos métodos usados pelos proprietários da base experimental, obtém-se resultados que mostram, claramente, um notável ganho de desempenho para todos os métodos testados quando a equalização de intervalos é usada no pré-processamento dos dados. É observado também o desempenho no tocante ao tamanho da senha, e analisa-se a estabilização do padrão de digitação. Por fim, foi realizada a montagem de uma nova base, a partir da qual foi possível verificar e analisar o efeito produzido no ritmo de digitação do usuário devido à troca de caracteres da senha, bem como a influência do seu modo de digitação.
|
432 |
La protection de la vie privée dans le cadre de la lutte contre le terrorisme au CanadaAdom'megaa, Prudencio Selly 08 1900 (has links)
La lutte contre le terrorisme implique, entre autres, la mise en œuvre de mesures législatives préventives et punitives pour gérer les menaces auxquelles le Canada est exposé. Dans cet ordre d’idée, l’État et ses agents ont recours à plusieurs outils, dont « les technologies de sécurités » (reconnaissance faciale, la vidéo surveillance, l’empreinte digitale, etc.), pour réaliser leurs différents mandats. Le fonctionnement de ces mécanismes suscite des questionnements quant à la protection de la vie privée.
Le partage des renseignements personnels entre différents ministères, le consentement relatif à la collecte des renseignements, le droit d’accès des parlementaires aux secrets d’État, etc. sont des enjeux qui surgissent lorsque le pouvoir exécutif déploie ses actions sécuritaires. Nous constatons que les modifications législatives pour lutter contre le terrorisme créent un déséquilibre par rapport à la protection de la vie privée.
En effet, contrairement à la lutte contre le terrorisme, la vie privée jouit d’une protection constitutionnelle selon la Charte canadienne des droits et libertés. L’un des défis qui s’imposent au pouvoir exécutif, législatif et judiciaire est de mener leurs actions dans le respect de la primauté du droit dans un contexte de sécurité nationale. / The fight against terrorism implies, amongst others, the execution of preventative and punitive legislation to manage the threats from which Canada is exposed. In this context, the state and its agents have access to many tools, such as “security technology” (facial recognition, video surveillance, fingerprinting, etc.), to achieve their different mandates. The operation of these mechanisms raises questions and concerns in regards to privacy protection.
The sharing of personal information between different ministries, the consent pertaining to the collection of personal information, and legislators’ right of access to state secrets, etc., are issues that arise when the executive power undertakes security measures. It’s found that the legislative changes to fight against terrorism create an imbalance with respect to privacy protection.
Indeed, unlike the fight against terrorism, the right to privacy is constitutionally protected under the Canadian Charter of rights and freedoms. One of the challenges that must be recognized by the executive, legislative and judiciary authorities is to conduct their actions according to the rule of law in the context of national security.
|
433 |
Contribution à l'étude des droits de la personnalité à l'ère numérique / Contribution to the study of personality in the digital ageSabbah, Jeoffrey 09 November 2018 (has links)
Depuis la seconde moitié du XXe siècle, la personnalité connaît une évolution constante. D'abord affectée par des mouvements de pensée philosophique précurseurs de l’article 9 du Code civil, la médecine et les progrès de la science, elle subit aujourd'hui une mutation profonde, tant dans sa forme que dans sa nature, qui résulte de l’avènement de l’informatique et de l’évolution des moyens de communication. En découle une réification de la personnalité, laquelle ne peut plus se confondre avec la personne, ni être conçue comme un simple synonyme de l'identité juridique. La présente contribution a vocation à étudier, dans leurs largesses, les activités de cette nouvelle personnalité pour ensuite définir ce qui compose son spectre numérique et déterminer les fondements juridiques les plus adaptés à sa protection. / Since the second half of the 20th century, the personality has been constantly evolving. First affected by movements of philosophical thought precursors of article 9 of the Civil Code, medicine and the progress of science, it undergoes today a profound mutation, as well in its form as in its nature, which derives from the advent of computers and the evolution of the means of communication. The result is a reification of the personality, which can no longer be confused with the person, nor be conceived as a mere synonym for legal identity. The purpose of this contribution is to study, in their largesse, the activities of this new personality, then to define what constitutes his digital spectrum and to determine the legal bases most suited to his protection.
|
434 |
Biometrická brána využívající kamer pro identifikaci osob / Biometric Gateway Using Camera to Identify PeopleJelen, Vilém January 2019 (has links)
Biometric gateways are used to quickly and accurately identify people. Of the biometric characteristics, iris, face and fingerprints are commonly used. By combining them, better identification results can be achieved. The aim of this thesis is to create such a biometric gateway together with the control application. A combination of iris of both eyes and face is used, which is captured by cameras from three angles to increase accuracy. Neural networks are used to detect and extract face features. Iris recognition is realized using Daugman's algorithm.
|
435 |
Snímač otisku prstu / Realization of fingerprint scannerKovář, Martin January 2015 (has links)
This master’s thesis deals with the issue of scanning human fingerprints, which is currently very topical and represents the most widespread biometric technology. The theoretical part of the work acquaints the reader with basics of dactyloscopy and biometrics and concerns technologies used for fingerprinting, image preprocessing methods and commercially available contactless optical scanners. The practical part is a realisation of a contactless optical scanner based on a Raspberry Pi minicomputer, implementation of preprocessing algorithms in Python and testing of the device from the perspective of image quality.
|
436 |
Detekce šířky papilární linie u otisku prstu / Detection of Papillary Line Width by FingerprintsHomola, Antonín January 2011 (has links)
This work outlines a method of detection of the papillary line width in fingerprints. This method is one of the possible methods of liveness detection. The first part of the work with deals defining of the fingerprint, attacks on today's systems and possibilities to improve security. The next section detection describes of the papillary line width. During the process of resolving, the first thing to do was to start operation of the scanning device and to read the database for tests and experiments. An independent application was created on this purpose. Further, there were projected methods for detection and measuring of the papillary line width. Use of the Canny edge detector with the Sobel operator and the Gaussian filter proved the best. Then, there is described implementation of individual methods. The next part of the work describes and assesses the results of the tests. The last chapter summarizes the work and proposes further possibilities of development.
|
437 |
Rozpoznávání člověka podle žil prstu / Human Recognition by Finger VeinsLisák, Peter January 2011 (has links)
The master's thesis deals with biometric systems, especially these based on human recognition by finger veins. It describes some development principles of the new biometric system. It proposes some new approaches to the comparison of finger vein patterns and their fast identification in sizable databases. Verification is based on templates comparison by similarity and distance measures with proposed alignment approaches. The proposed method of identification is based on the combination of clustering and genetic algorithm. The second option is using the indexing tree structure and searching by range query.
|
438 |
Effects of Movement on Biometric Facial Recognition in Body-Worn CamerasJulia Bryan (8788169) 01 May 2020 (has links)
<p>This study examined how three different manipulations of a single policing stance affected the quality scores and matching performance in a biometric facial recognition system; it was conducted in three phases. In the first phase, the researcher collected qualitative survey data from active, sworn law enforcement officers in 15 states. In the second phase, the researcher collected quantitative data using a single facial recognition subject and a static body-worn camera mounted to an adjustable tripod. In the third phase, the researcher collected quantitative data from body-worn camera-equipped law enforcement officers who filmed a stationary target as they executed a series of specified movements from the interview stance. The second phase tested two different body-worn cameras: one that is popular among law enforcement agencies in the United States, the Axon Body 2; and one that is inexpensive and available to the general public via a popular internet commerce website. The third phase tested only the Axon Body 2. Results of the study showed that matching results are poor in a biometric system where the test body-worn camera was the sensor, with error rates as high as 100% when the body-worn camera wearer was in motion. The general conclusion of this study is that a body-worn camera is not a suitable sensor for a biometric facial recognition system at this time, though advances in camera technology and biometric systems may close the gap in the future. </p>
|
439 |
Popularizing implants : Exploring conditions for eliciting user adoption of digital implants through developers, enthusiasts and usersEricsson Duffy, Mikael January 2020 (has links)
Digital implants have become a new frontier for body hackers, technology enthusiasts and disruptive innovation developers, who seek to service this technology for themselves and to new users. This thesis has explored conditions for future user adoption of human body augmentation with digital implants. The conditions explored were mainly self-beneficial health optimization through technology, self-quantification or convenience scenarios. Applying Diffusion Of Innovation theory, Value-based Acceptance Model and research through design methods were used. The process consisted of quantitative and qualitative data gathering and analysis, using interviews, surveys and iterative prototyping with evaluation. The results show mixed user attitude towards implant usage, mainly depending on users' need for added benefits, whether the user is a technology enthusiast actively using technology for self-beneficial gain or a casual everyday consumer of technology. Certain conditions could affect adoption of implants into mainstream usage, mainly data privacy, regulation, convenience, self-quantification or health management. In order for implants to succeed as a mainstream technology, there needs to be proper secure infrastructure, easy installation and coordinated services that offer individual benefits of health or convenience, with a high consumer confidence in supported services, installation / removal and devices. Several companies are working on offering such a service, in order to evaluate such a proposition, iterative prototypes were created to evaluate a health management scenario as a streamlined consumer service, using a service design blueprint and a related interactive smartphone application prototype.
|
440 |
Fehler von Fingerabdruckerkennungssystemen im Kontext / Begreifbare Vermittlung der Fehler einer biometrischen KontrolltechnologieKnaut, Andrea 12 September 2017 (has links)
In dieser Arbeit werden zwei Fragen im Zusammenhang mit Fehlern von Fingerabdruckerkennungssystemen untersucht.
Erstens: Welche strukturellen Merkmale und begrifflichen Implikationen hat der spezifische Fehlerdiskurs in diesem Teilgebiet der Biometrie? Zur Beantwortung dieser Frage werden im Rahmen einer diskursanalytischen Betrachtung der Fachtexte des Forschungsfeldes die gängigen Fehlertypologien der Biometrie untersucht. Die Arbeitshypothese der Analyse ist, dass der massenhafte Einsatz von Fingerabdruckerkennungssystemen im Alltag trotz aller ihrer Fehler diskursiv durchsetzungsfähig ist. Undzwar nicht unbedingt, weil die Fehler zu vernachlässigen sind, sondern weil die Angst vor „Identitätsbetrug“, die Idee einer Messbarkeit von Identität und die wirtschaftliche und politische Bedeutung von Sicherheitstechniken in einer für unsicher gehaltenen Welt große Wirkmächtigkeit haben.
Es wird diskutiert, inwiefern die Auseinandersetzung mit System- und Überwindungsfehlern in der Informatik zu kurz greift. Daher wird ein erweitertes Fehlermodell vorgeschlagen, das an jüngere transdisziplinäre Fehlerforschung anknüpft und als kritisches Analyseinstrument für die Beurteilung der Wechselwirkung zwischen Informatik(-system) und Gesellschaft genutzt werden kann.
Zweitens: Wie lassen sich die diskursanalytische Methode und ein experimentelles Hands-On-Lernen zu einem Lern- und Lehrkonzept verbinden, dass eine kritische Vermittlung der Probleme von Fingerabdruckerkennungssystemen ermöglicht? Ausgehend von schulischen Unterrichtskonzepten einer an der Lebenswelt orientierten Informatiklehre sowie der Idee des „be-greifbaren Lernens“ an konkreten Gegenständen wurde ein Lern- und Lehrkonzept für Universität und Schule entwickelt und in drei verschiedenen Institutionen ausprobiert. / In this paper two questions will be addressed relating to deficits in fingerprint recognition systems.
Firstly, what structural features and conceptual implications does the analysis of errors have in the field of biometrics? To answer this question, the common error types in biometrics will be examined, as part of an analytical discourse taking into consideration technical texts from the research field. The working hypothesis of this analysis is that the structure of the discourse surrounding fingerprint recognition systems would present no barriers to their widespread implementation in everyday life despite all their faults – not because their shortcomings are negligible but due to the great potency of the fear of “identity fraud”, the notion that identity can be measured, and the economic and political importance of security technologies in a world deemed unsafe.
It will be discussed how the examination of system errors and spoofing attacks in computer science falls short in addressing the whole picture of failing fingerprint recognition systems. Therefore an extended error model will be proposed, one which builds on recent transdisciplinary error research and which can be used as a critical tool for analysing and assessing the interaction between computer systems and society.
Secondly, how could the analytical discourse method and experimental hands-on learning be combined into a teaching concept that would enable critical teaching of the problems of fingerprint recognition systems? Starting from the school-based teaching concepts of a theory of computer science based on real life and the idea of “hands-on learning” using concrete objects, a teaching concept for universities and schools has been developed and tested in three different institutions.
|
Page generated in 0.0782 seconds