• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 84
  • 31
  • 28
  • 10
  • 9
  • 9
  • 8
  • 4
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 218
  • 43
  • 32
  • 32
  • 30
  • 28
  • 25
  • 25
  • 23
  • 23
  • 20
  • 19
  • 19
  • 19
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Biometri vid fysisk access : En jämförande studie mellan ansiktsigenkänning och fingeravtrycksavläsning

Hanner, Martin, Björk, Tobias January 2006 (has links)
In today’s society, people often find themselves in situations where they need to be identified;for example when we buy alcohol, need to use an ATM or log on to our e-mail account. The most common methods today that are used for these kinds of matters are antiquated, and in the meantime, criminals all over the world get more sophisticated. Companies invest billions every day in order to protect their interests. Maybe it’s time that we finally give biometrics the attention that it deserves. This essay aims to describe the biometric methods that are available today, find some of the most effective when it comes to physical access and make a comparison. Face recognition and fingerprint scanning will be described more thoroughly. Pros and cons will be analyzed and the theory will be linked to interviews with three Swedish organisations. / I dagens samhälle hamnar vi människor regelbundet i situationer där vi blir tvungna att identifiera oss. Det kan till exempelvis vara när vi köper alkohol, tar ut pengar eller loggar in på vårt e-mailkonto. De vanligaste metoderna, som idag används för dessa identifieringar, har funnits länge och är föråldrade och i takt med detta blir brottslingar världen allt mer sofistikerade. Dagligen investerar företag världen över miljarder för att skydda exempelvis data med hjälp av koder och andra mjukvaruinstallationer. Kanske är det istället dags för att vi ger biometrin en ordentlig chans. Den här uppsatsen syftar till att redogöra för de biometriska säkerhetsmetoder som finns tillgängliga, identifiera några av de effektivaste när det gäller fysisk access och jämföra dessa med varandra. Det är framförallt ansiktsigenkänning och fingeravtrycksavläsning som kommer att ges mycket plats i studien. För- och nackdelar kommer att tas upp och teorin kommer att kopplas till intervjuer gjorda med tre svenska företag.
132

Implementação e avaliação do ABID (Aplicativo Biométrico de Impressão Digital) utilizando o método fuzzy vault e ferramentas opensource

Faria, Bruno Guedes 10 June 2014 (has links)
Made available in DSpace on 2016-03-15T19:37:50Z (GMT). No. of bitstreams: 1 Bruno Guedes Faria.pdf: 1541058 bytes, checksum: 27ddaf10102e159357de3c8fbd6d81ca (MD5) Previous issue date: 2014-06-10 / Universidade Presbiteriana Mackenzie / Biometric Systems has increasingly been growing in the past years, mainly those based on fingerprints. In terms of security, they need the same care which is given to traditional systems that uses cards and passwords. The Fuzzy Vault methods comes in this scenario to provide security to biometric systems, specifically, protecting the stored biometric template. This research will present the Fuzzy Vault scheme development and how it can be used to hide a 128 bits secret. The scheme will be used into the context of a biometric application based on fingerprints. Evaluation of security and performance of the application will be shown, as well as the experimental results, common to biometric systems FRR (False Rejection Rate), GAR (Genuine Accept Rate), FAR (False Accept Rate). / A utilização de sistemas biométricos tem apresentado um cenário de crescimento nos últimos anos e que se reflete, principalmente, naqueles que têm a impressão digital como forma de identificação. No que tange à segurança, sistemas baseados em biometria necessitam da mesma preocupação que se tem com sistemas tradicionais de senhas e cartões. Neste contexto, o método Fuzzy Vault aparece para prover a segurança de sistemas biométricos, particularmente, protegendo a amostra biométrica armazenada. Esta pesquisa consiste na implementação do método Fuzzy Vault, aplicando-o para ocultar uma chave de 128 bits, onde o método será utilizado juntamente com algoritmos de código aberto, para o desenvolvimento de um aplicativo biométrico de impressões digitais, denominado por ABID. Serão expostas avaliações sobre o desempenho e segurança do aplicativo e também resultados experimentais comuns a sistemas biométricos, como: Taxa de Falso Aceite (FAR -False Accept Rate), Taxa de Aceite Genuíno (GAR-Genuine Accept Rate) e Taxa de Falsa Rejeição (FRR-False Rejection Rate).
133

Análise de ligação de hidrogênio por superfície de Hirshfeld

Cunha, Mariana da Silva 21 February 2017 (has links)
Submitted by Renata Lopes (renatasil82@gmail.com) on 2017-05-25T14:19:15Z No. of bitstreams: 1 marianadasilvacunha.pdf: 6235170 bytes, checksum: e49cfdcb2f78bafd1146dd684a809c87 (MD5) / Approved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2017-05-25T14:48:17Z (GMT) No. of bitstreams: 1 marianadasilvacunha.pdf: 6235170 bytes, checksum: e49cfdcb2f78bafd1146dd684a809c87 (MD5) / Made available in DSpace on 2017-05-25T14:48:17Z (GMT). No. of bitstreams: 1 marianadasilvacunha.pdf: 6235170 bytes, checksum: e49cfdcb2f78bafd1146dd684a809c87 (MD5) Previous issue date: 2017-02-21 / Neste trabalho foi investigada a influência da modificação dos ligantes Hidrogeno psulfobenzoato de potássio (PSB), Ácido 1,2,4,5-benzenotetracarboxílico (BTC) e Ácido 1,5-naftalenodissulfônico tetrahidratado (1,5NDS) nas interações com a molécula de Isoniazida (INH) em três novos compostos, PSB-INH, BTC-INH e 1,5NDS-INH, e também foi realizado um estudo sobre o composto 1,5NDS-INO no qual o ligante Isoniazida sofreu uma termodecomposição, levando à formação do Ácido isonicotínico (INO). Foi realizado um estudo das ligações de hidrogênio formadas entre os ligantes através da análise de superfície de Hirshfeld e gráficos de impressão digital. Estas análises são extremamente sensíveis ao ambiente químico da molécula e são únicas para cada molécula e, dessa forma, permitem a identificação das diferenças entre os empacotamentos cristalinos no estado sólido. Foi observado que, embora a conformação da molécula de Isoniazida seja praticamente idêntica nos compostos PSB-INH, BTC-INH e 1,5NDS-INH e as principais ligações de hidrogênio presentes envolvem interações do tipo N – H···O e O – H···N, os gráficos de impressão digital são diferentes e exibem a influência da modificação dos ligantes. Nos gráficos de impressão digital obtidos as contribuições mais importantes das interações estão relacionadas aos contatos O···H e N···H, que possuem valores de 31,3% e 6,0% para o composto PSB-INH, 49,9% e 6,9% para o composto BTC-INH e 44,8% e 5,0% para o composto 1,5NDS-INH. No composto 1,5NDS-INO as principais ligações de hidrogênio são do tipo O – H···O e O – H···N e a contribuição mais importante para o gráfico de impressão digital está relacionada ao contato O···H, que contribui com 41,9% para a superfície e também ao contato H···H, que contribui com 30,5%. Este trabalho demonstrou como as análises de superfície de Hirshfeld e dos gráficos de impressão digital conseguem identificar diferenças entre as moléculas no estado sólido e permitiu a análise das interações intermoleculares formadas nos diferentes compostos, comprovando a importância dessas novas ferramentas para a análise estrutural. / In this work was investigated the influence of the modification of the ligands Hydrogen p-sulfobenzoate of potassium (PSB), 1,2,4,5-benzenetetracarboxylic acid (BTC) and 1,5-naphthalenedisulfonic acid tetrahydrate (1,5NDS) in interactions with the molecule of Isoniazid (INH) in three new compounds, PSB-INH, BTC-INH and 1,5NDS-INH, and also a study on the compound 1,5NDS-INO in which the Isoniazid ligand underwent a thermodecomposition, leading to the formation of isonicotinic acid (INO). A study of the hydrogen bonds formed between the ligands was carried out through Hirshfeld surface analysis and fingerprint plots. These analysis are extremely sensitive to the chemical environment of the molecule and are unique to each molecule and thus allow identification of the differences between the crystalline packages in the solid state. It was observed that, although the conformation of the Isoniazide molecule is practically identical in the compounds PSB-INH, BTC-INH and 1,5NDS-INH and the main hydrogen bonds present involve N – H ··· O and O – H ··· N, the fingerprint plots are different and exhibit the influence of the modification of the ligands. In the fingerprint plots obtained, the most important contributions of the interactions are related to the contacts O···H and N···H, which have values of 31.3% and 6.0% for the compound PSB-INH, 49.9% and 6.9% for compound BTC-INH and 44.8% and 5.0% for the compound 1.5NDS-INH. In the compound 1,5NDS-INO the main hydrogen bonds are of the O – H ··· O and O – H ··· N type and the most important contribution to the fingerprint plot is related to the contact O···H, which contributes with 41.9% to the surface and also to the H···H contact, which contributes with 30.5%. This work demonstrated how Hirshfeld surface analysis and fingerprint plots can identify differences between molecules in the solid state and allowed the analysis of the intermolecular interactions formed in the different compounds, proving the importance of these new tools for structural analysis.
134

Liveness Detection in Fingerprint Recognition Systems / Detektering av Artificiella Fingeravtryck vid Användarautentisering

Sandström, Marie January 2004 (has links)
Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today. Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live fingers and artificial clones. The first approach is a literature study, while the second consists of experiments. A literature study of liveness detection in fingerprint recognition systems has been performed. A description of different liveness detection methods is presented and discussed. Methods requiring extra hardware use temperature, pulse, blood pressure, electric resistance, etc., and methods using already existent information in the system use skin deformation, pores, perspiration, etc. The experiments focus on making artificial fingerprints in gelatin from a latent fingerprint. Nine different systems were tested at the CeBIT trade fair in Germany and all were deceived. Three other different systems were put up against more extensive tests with three different subjects. All systems werecircumvented with all subjects'artificial fingerprints, but with varying results. The results are analyzed and discussed, partly with help of the A/R value defined in this report.
135

Účel a implementace snímání otisků prstů v osobních počítačích / The Purpose and Implementation of Fingerprint Scanning in Personal Computers

Varadinov, Petr January 2012 (has links)
This diploma thesis deals with fingerprint recognition applied in personal computers. The topic is analyzed both chronologically in historical context and in connection with other biometric methods. The thesis provides a comprehensive survey of the topic. It starts with physical layer, goes through hardware parts and ends with software architecture. A special attention is paid to programming fingerprint recognition support into end-user applications. These are the aims of the thesis: to place the silicon fingerprint sensing technology into the historical context and describe its evolution in connection with personal computers till the present times, to provide the results of market research of fingerprint sensors used in personal computers, to work out the summary of the functions the end-users have at their disposal, to present the market research results of fingerprint software, to work out the overview and the comparison of available software development kits (SDKs) and that of application programming interfaces (APIs) used for the described fingerprint sensor devices, and last but not least to develop a demonstration application that communicates with a fingerprint sensor device. Technical literature, market researches together with my own experience from the work in this field were used so as to meet the set aims. As for the demo application of this technology it is my own innovative approach. The thesis is divided into seven chapters where Chapter II -- Chapter VI directly deal with the mentioned topics. The completion of a missing angle of approach to the subject from end-users' and application programmers' perspective is the main asset of this thesis. The work also allows orientation on the silicon fingerprint sensor market and fingerprint software market. Moreover it shows possibilities how to extend this technology, it provides a detailed analysis of the software layer and presents programming samples showing that show how to use this technology. The demo application allowing audio volume control by a fingerprint device is an innovation in the branch of computer input devices.
136

Biometric Authentication and Penetration of Smartphones

Aronsson, Erik January 2018 (has links)
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. The function,vulnerabilities, and techniques associated with these systems are compiled usinga literature study of published papers and books on the subject. The performedexperiments apply these techniques in the form of presentation attacks directed atthe fingerprint-, face- and iris recognition systems of the examined smartphones.The result of the experiments showed significant differences between the differentsmartphones, where some exhibited flawless security and others showed significantsecurity flaws. Both fingerprint and face recognition systems were successfullycircumvented, while none of the iris recognition systems were breached. No clearlink could be observed between the cost of the device and success rate of attacks,while only devices using the Android operating system were breached. The resultsundeniably showed that some smartphones are vulnerable to the employed tech-niques. It also showed that some of the tested devices had managed to implementmeasures to counteract the applied presentation attacks. The root cause of thevulnerabilities showcased in the experiment is due to the fact that biometric traitscan be copied and reproduced, highlighting a basic flaw of such systems.
137

Optimization of solid-phase extraction (SPE) as sample preparation for oil samples in forensic investigations.

Chang, Aamanda January 2021 (has links)
Oil spills, especially in water have happened throughout the years. The consequences from this kind of incident have always been a threat to marine life and take a lot of money and time to clean up. The forensic investigations of oil usually focus on oil spill in water, however, this kind of investigation can be applied on more areas, such as in sexual offense cases and arson. The oil from the crime scene and the oil from the suspected source are analyzed and compared to each other to see if the compositions match. The aim of this thesis was to optimize the clean-up process of heavy fuel oil (HFO) using solid-phase extraction (SPE) according to the European Committee for standardization (CEN) 15522-2 method. HFOs are black oils, containing particles and soot which will decrease injector performance. Thus, a cleanup procedure is attractive when analyzing such samples. The three factors of optimization in this study were elution volumes, solvents, and SPE sorbents.The SPE method used in this study was to use the cartridges as a filter; therefore, the samples were both loaded and eluted with an organic solvent, in this case dichloromethane (DCM) or dichloromethane/heptane (DCM/Hp). The gas chromatography mass spectrometry (GC-MS) analysis method used is described in Annex B in the CEN 15522-2 method.Concluding, increasing the eluent volume did not indicate improvement on the extraction method. In terms of the solvents, both dichloromethane and dichloromethane/heptane showed similar results. The percentage weathering plots (PW-plots) showed that the SPE sorbents (dual layer florisil/Na2SO4, florisil and silica gel sorbents) worked similar. The overall conclusion from this thesis work was that further optimization must be made before implementing the method.
138

Přenos bezpečnostních opatření z prohlížeče Brave do rozšíření JavaScript Restrictor / Porting of Brave Fingerprinting Protection to JavaScript Restrictor

Švancár, Matúš January 2021 (has links)
Users of internet browsers are constantly monitored, without their consent. By using the JavaScript APIs, it is possible to obtain various information about the browser, which together form a browser fingerprint, which can then be misused. Therefore, the goal of this work is to use a robust fingerprint protection solution of Brave browser and port it to the JavaScript Restrictor extension. In this work, the problematics of obtaining an fingerprint and countermeasures in the Brave browser are analyzed and then compared with the current protection in the JSR extension. The method of porting of Brave's countermeasures is presented and subsequently the procedure of implementation of these defense elements into the browser extension is described. The resulting implementation has been tested and evaluated, with the new protection appearing to be effective.
139

Vícekamerový snímač biometrických vlastností lidského prstu / Multi-Camera Scanner of Biometric Features of Human Finger

Trhoň, Adam January 2015 (has links)
This thesis describes a conceptual design of touchless fingerprint sensor and design, implementation and testing of its firmware, which is a composition of hardware implemented in VHDL and a program implemented in C. Result of this thesis can be used as the first step of building an industrial solution.
140

Cartoon-Residual Image Decompositions with Application in Fingerprint Recognition

Richter, Robin 06 November 2019 (has links)
No description available.

Page generated in 0.0582 seconds