Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - biometric authentication
Search - biometric authentication - List
基于掌纹识别的在线身份验证 识别算法本科毕设 采集本科毕设 供毕设参考-based biometric authentication of online undergraduate recognition algorithm based Bi Bi-based undergraduate collection for BI-based reference
Update : 2008-10-13 Size : 12mb Publisher : 许冉

基于掌纹识别的在线身份验证 识别算法本科毕设 采集本科毕设 供毕设参考-based biometric authentication of online undergraduate recognition algorithm based Bi Bi-based undergraduate collection for BI-based reference
Update : 2025-02-17 Size : 12mb Publisher : 许冉

基于指纹识别生物特征身份认证的信息加密系统-Based on the biometric fingerprint authentication information encryption system
Update : 2025-02-17 Size : 289kb Publisher : 王旺

指纹识别技术是基于生物识别的认证技术,由于每个人的指纹具有唯一性, 终身不变,因此指纹识别是代替传统身份识别手段的最安全、最可靠、最方便的 方法之一。而指纹的预处理的好坏是指纹识别能否正确识别的关键。-Fingerprint recognition technology is based on biometric authentication technology, as each person
Update : 2025-02-17 Size : 2.54mb Publisher : 张杰

This a thesis paper on iris recognition. it will be very helpful in guyz who are doin projects on biometric authentication- This is a thesis paper on iris recognition. it will be very helpful in guyz who are doin projects on biometric authentication
Update : 2025-02-17 Size : 1.68mb Publisher : Shaheer

This matlab code is for paper "Biometric Image Integrity Authentication Based on SVD and Fragile Watermarking"
Update : 2025-02-17 Size : 1kb Publisher : Sathvika

DL : 0
Speaker recognition is the process of identifying a person based on his voice. It is a challenging task to separate the speaker identity information (who is speaking it) from the speech content itself (what is being said). Speaker recognition has several useful applications including biometric authentication and intuitive human computer interaction.
Update : 2025-02-17 Size : 143kb Publisher : shammy

Iris recognition is a method of biometric authentication that uses pattern-recognition techniques based on high-resolution images of the irides of an individual s eyes.
Update : 2025-02-17 Size : 65kb Publisher : shivani

Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a provably secure and blind biometric authentication protocol, which addresses the concerns of user抯 privacy, template protection, and trust issues.
Update : 2025-02-17 Size : 1.51mb Publisher : prabhu

biometric authentication which improves security
Update : 2025-02-17 Size : 609kb Publisher : maddy

An introduction to biometric authentication
Update : 2025-02-17 Size : 147kb Publisher : Felix

biometric authentication using neural networks-biometric authentication using neural networks.....
Update : 2025-02-17 Size : 138kb Publisher : jobin

介绍用于生物认证(生物识别)的图像识别理论和算法。-Biometric Image Discrimination Technologies addresses highly relevant issues to many fundamental concerns of both researchers and practitioners of biometric image discrimination (BID) in biometric applications. This book describes the basic concepts necessary for a good understanding of BID and answers some important introductory questions about BID. Biometric Image Discrimination Technologies covers the theories which are the foundations of basic BID technologies, while developing new algorithms which are verified to be more effective in biometrics authentication. This book will assist students new to the field and will also be useful to senior researchers in this area.
Update : 2025-02-17 Size : 8.44mb Publisher : kankan

DL : 0
CRYPTO-BIOMETRIC AUTHENTICATION SCHEME FOR ATM BANKING SYSTEM
Update : 2025-02-17 Size : 1.93mb Publisher : manju

It is a report on biometric based authentication system.
Update : 2025-02-17 Size : 322kb Publisher : Uttam

A DECISON THEORY BASED MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM USING WAVELET TRANSFORM
Update : 2025-02-17 Size : 461kb Publisher : larbibios

做生物识别认证必备文档 指纹数据格式 ANSI-377 ANSI-378 ANSI-381 人脸识别数据格式 ANSI-385 虹膜(视网膜)识别数据格式 ANSI-379 -Essential document identification data format of the fingerprint data format ANSI-377/ANSI-378/ANSI-381 of face recognition data format ANSI-385 iris (retina) ANSI-379 do biometric authentication
Update : 2025-02-17 Size : 188kb Publisher : skertone

DL : 0
Iris Recognition is a rapidly expanding method of biometric authentication that uses pattern-recognition techniques on images of irides to uniquely identify an individual. Algorithms produced by Professor John Daugman [1] have proven to be increasingly accurate and reliable after over 200 billion comparisons [2]. The aim of this group project is to implement a working prototype of the techniques and methods used for iris recognition, and to test these methods on a database of irides provided by the Chinese Academy of Sciences Institute of Automation (CASIA) [3], which consists of 756 images of irides from 108 individuals-Iris Recognition is a rapidly expanding method of biometric authentication that uses pattern-recognition techniques on images of irides to uniquely identify an individual. Algorithms produced by Professor John Daugman [1] have proven to be increasingly accurate and reliable after over 200 billion comparisons [2]. The aim of this group project is to implement a working prototype of the techniques and methods used for iris recognition, and to test these methods on a database of irides provided by the Chinese Academy of Sciences Institute of Automation (CASIA) [3], which consists of 756 images of irides from 108 individuals
Update : 2025-02-17 Size : 1.1mb Publisher : Mohammad

Biometric recognition is the science of establishing the identity of a person using his/her physical or biological characteristics. Biometric systems can employ different kinds of features, e.g., features of fingerprint, face, iris or posture. EEG signals are the signature of neural activities. It has several advantages, such as (i) it is confidential as it corresponds to a mental task, (ii) it is very difficult to mimic and (iii) it is almost impossible to steal as the brain activity is sensitive to the stress and the mood of the person, an aggressor cannot force the person to reproduce his/her mental pass-phrase. In this report the feasibility of the EEG signals as raw materials for conducting biometric authentication of individuals is investigated. Brain responses are extracted with visual stimulation (leading to biological brain responses known as Visual Evoked Potentials) or while relaxing with the eyes closed.
Update : 2025-02-17 Size : 408kb Publisher : ARUNA RAJAN

DOTNET- Finger Print Authentication Using Biometric Systems
Update : 2025-02-17 Size : 630kb Publisher : Manickam
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.