Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Biometrics" wg kryterium: Temat


Tytuł:
Analiza obrazów dłoni na potrzeby biometrii
Autorzy:
Kasprzak, W.
Powiązania:
https://bibliotekanauki.pl/articles/91385.pdf
Data publikacji:
2007
Wydawca:
Warszawska Wyższa Szkoła Informatyki
Tematy:
biometria
systemy biometryczne
obrazy dłoni
biometrics
biometrics systems
hand images
Opis:
W artykule przedstawiono podstawy metodologiczne systemów biometrycznych opartych o analizę obrazów cyfrowych. Skupiono się na opisie metod wyznaczania cech osobniczych w obrazach odcisków palców i dłoni. Zaprezentowano autorskie podejście do analizy dłoni w warunkach swobodnego położenia dłoni względem kamery.
The paper presents computational methods of image analysis applied in human biometric systems. Special attention is paid to fingerprint- and hand-image analysis. An original approach is proposed for the recognition of a freely located hand, coupled with a subsequent detection and matching of relative hand features.
Źródło:
Zeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki; 2007, 2, 2; 9-22
1896-396X
2082-8349
Pojawia się w:
Zeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Possibilities for the use of biometric data in security systems
Autorzy:
Kopczewski, M.
Smal, T.
Powiązania:
https://bibliotekanauki.pl/articles/347366.pdf
Data publikacji:
2017
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
biometrics
management
security
services
Opis:
Possibilities for the use of biometric data are growing and hence their practical application is also increasing. Therefore, an important element to be considered in the design, construction and exploitation of systems using biometrics is the question of identifying a specific person and assigning him or her to the relevant data contained in the documents or databases. The ability and, in some cases, the need to use biometric data results from the growing use of information technology in everyday life and the ever increasing attempts to steal the identity of those using these technologies. Modern IT systems often have a high level of security in terms of protection and access to data, and in particular the management of security systems. The article presents an outline of the theory related to the possibility of using and applying biometric data to provide security and have the ability to inspect officers of various departments. The subject of analysis also considered the possibility of using security measures in the form of biometric data identification for the purpose of securing the security services.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2017, 4; 168-179
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Probabilistic Issues in Biometric Template Design
Autorzy:
Pacut, A.
Powiązania:
https://bibliotekanauki.pl/articles/308515.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometrics
sample median
template
Opis:
Since the notion of biometric template is not well defined, various concepts are used in biometrics practice. In this paper we present a systematic view on a family of template concepts based on the L1 or L2 dissimilarities. In particular, for sample vectors of independent components we find out how likely it is for the median code to be a sample vector.
Źródło:
Journal of Telecommunications and Information Technology; 2010, 4; 75-85
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Simulation Model of Biometric Authentication Using Multiagent Approach
Autorzy:
Kapczyński, A.
Owczarek, T.
Powiązania:
https://bibliotekanauki.pl/articles/308541.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometrics
multi-agent
multimodal
simulation
Opis:
In this article authors present the concept of application of multiagent approach in modeling biometric authentication systems. After short introduction, we present a short primer to multiagent technology. Next, we depict current state of the art related to biometrics combined with multiagent approach. In the next part of the work we present four exemplary simulation models of biometric authentication environments as well as the results of their examination.
Źródło:
Journal of Telecommunications and Information Technology; 2010, 4; 68-74
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Przetwarzanie danych biometrycznych. Aspekty prawne
Biometric Data Processing. Legal Aspects
Autorzy:
Pyka, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/927595.pdf
Data publikacji:
2018-09-15
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
biometrics
data processing
personal data
Opis:
Biometric data processing and related data protection issues have gained importance as a result of a wide use of technologies using such data for the identification and verification of data subjects. Problems may arise due to the lack of awareness of the need to comply with the provisions on the protection of personal data. Such a problem could also have arisen in Poland. The Act on personal data protection, no longer in force, did not refer literally to any of the provisions on biometric data. This potentially could raise doubts, inter alia, with regard to the application of this Act, especially since only the General Regulation (Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (General Data Protection Regulation) introduced a definition of such data and classified them in special categories of personal data, the processing of which will require one of the conditions set out in Article 9(2) of the General Regulation. Such singularity of biometric data results from the source of their acquisition (physiological, physical and behavioural traits). This, however, should not be seen as an argument for the limiting of the processing of biometric data. It is nevertheless important that the processing of these personal data is in line with the principles set out in the General Regulation. The use of biometrics is likely to become more widespread in the long term. This trend is already taking place, but there is a noticeable concern on the part of the data subjects about the collection of these data. The legal provisions repealed in the context of the data protection reform in 2018 have also been taken into account in the deliberations.
Źródło:
Studia Prawa Publicznego; 2018, 3 (23); 133-153
2300-3936
Pojawia się w:
Studia Prawa Publicznego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Robust and Accurate Iris Segmentation Algorithm for Color and Noisy Eye Images
Autorzy:
Strzelczyk, P.
Powiązania:
https://bibliotekanauki.pl/articles/308523.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometrics
image segmentation
iris recognition
Opis:
Efficient and robust segmentation of iris images captured in the uncontrolled environments is one of the challenges of non-cooperative iris recognition systems. We address this problem by proposing a novel iris segmentation algorithm, which is suitable both for monochrome and color eye images. The method presented use modified Hough transform to roughly localize the possible iris and pupil boundaries, approximating them by circles. A voting mechanisms is applied to select a candidate iris regions. The detailed iris boundary is approximated by the spline curve. Its shape is determined by minimizing introduced boundary energy function. The described algorithm was submitted to the NICE.I iris image segmentation contest, when it was ranked 11th and 10th out of total 97.
Źródło:
Journal of Telecommunications and Information Technology; 2010, 4; 5-9
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Monitoring of spruce stands in the Czerwona Woda river catchment of the Stołowe Mountains National Park
Autorzy:
Strzeliński, Paweł
Turski, Mieczysław
Powiązania:
https://bibliotekanauki.pl/articles/2044143.pdf
Data publikacji:
2019
Wydawca:
Instytut Badawczy Leśnictwa
Tematy:
tree biometrics
model trees
Kraft classes
Opis:
In the spring of 2017, Stołowe Mountains National Park started a research program related to the protection of water resources. The research program was started because of, among others, the growing problems of water resources and the dying of spruce trees. One of the projects commissioned by the Park was ‘Monitoring the impact of renaturisation and hydrological status on changes in the biomass of trees and stands’. The monitoring covered spruce stands growing along the main watercourse of the Park (the Czerwona Woda). As a part of the study, three rectangular surfaces (from 0.45 to 0.50 ha) and 10 circular areas (0.04 ha each) were established. On fenced rectangular surfaces, 10 model trees were selected using the Draudt method. They were monitored using hemispheric cameras (changes in crowns), dendrometers (changes in the circumference of stems) and minirhizotronami (changes in the root layer). In addition to the measurements of all the trees on the surface, imaging with terrestrial laser scanning and hemispherical images was done. The data and results presented in this work were created as a result of the implementation of a project financed from funds related to the forestry fund of the State Forests National Forest Holding.
Źródło:
Folia Forestalia Polonica. Series A . Forestry; 2019, 61, 1; 90-95
0071-6677
Pojawia się w:
Folia Forestalia Polonica. Series A . Forestry
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy Preserving and Secure Iris-Based Biometric Authentication for Computer Networks
Autorzy:
Strzelczyk, P.
Powiązania:
https://bibliotekanauki.pl/articles/308388.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
authentication
biometrics
iris recognition
privacy preserving
Opis:
The iris biometrics is considered one of the most accurate and robust methods of the identity verification. The unique iris features of an individual can be presented in a compact binary form which can be easily compared with the reference template to confirm identity. However in contrast to passwords and PINs biometric authentication factors cannot be revoked and changed as they are inherently connected to our characteristics. Once the biometric information is compromised or disclosed it became useless for the purpose of authentication. Therefore there is a need to perform iris features matching without revealing the features itself and the reference template. We propose an extension of the standard irisbased verification protocol which introduces a features and template locking mechanism, which guarantee that no sensitive information is exposed. Presented solutions can be easily integrated into authentication mechanisms used in modern computer networks.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 4; 115-118
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Polish Personal Identity Card as a Tool for Identity Theft
Autorzy:
Owoc, M.
Powiązania:
https://bibliotekanauki.pl/articles/308465.pdf
Data publikacji:
2015
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometrics
identity theft
personal identity card
Opis:
This article discusses the changes that are the result of entry the new personal ID card issued in Poland. The new document contains less information about the owner, i.e. height, eye color or signature, so that the risk of identity theft is signicantly greater.
Źródło:
Journal of Telecommunications and Information Technology; 2015, 2; 23-24
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Iris Recognition System Based on Zak-Gabor Wavelet Packets
Autorzy:
Czajka, A.
Pacut, A.
Powiązania:
https://bibliotekanauki.pl/articles/308521.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometrics
iris recognition
Zak-Gabor transform
Opis:
The paper proposes a new iris coding method based on Zak-Gabor wavelet packet transform. The essential component of the iris recognition methodology design is an effective adaptation of the transformation parameters that makes the coding sensitive to the frequencies characterizing ones eye. We thus propose to calculate the between-to-within class ratio of weakly correlated Zak-Gabor transformation coefficients allowing for selection the frequencies the most suitable for iris recognition. The Zak-Gabor-based coding is non-reversible, i.e., it is impossible to reconstruct the original iris image given the iris template. Additionally, the inference about the iris image properties from the Zak-Gabor-based code is limited, providing a possibility to embed the biometric replay attack prevention methodology into the coding. We present the final prototype system design, including the hardware, and evaluate its performance using the database of 720 iris images.
Źródło:
Journal of Telecommunications and Information Technology; 2010, 4; 10-18
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Iris identification method using only a section of the pattern
Autorzy:
Bobulski, J.
Powiązania:
https://bibliotekanauki.pl/articles/174981.pdf
Data publikacji:
2018
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
biometrics
iris recognition
iris pattern extraction
Opis:
Iris based authentication methods are popular due to their reliability and dependability. This paper proposes the method of the iris recognition that instead uses only two fragments of the pattern. The presented method allows for a simpler iris extraction, as it does not use a complex conversion of an iris pattern from a circular to rectangular shape. The results obtained from this experiment show similarities to other previous ones. Importantly, the proposed method may be treated as an alternative solution. The experiment confirmed the validity of the concept for the proposed iris recognition method. Moreover, this method is quicker in comparison to the others. The additional merit of the proposed solution is the elimination of the distortion which comes from the eyelids and eyelashes at the beginning of the iris image processing. Moreover, this method does not require using additional techniques to eliminate disturbances.
Źródło:
Optica Applicata; 2018, 48, 1; 149-160
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Taxonomic differentiation of Salix retusa agg. (Salicaceae) based on leaf characteristics
Autorzy:
Kosiński, Piotr
Adreas Hilpold, Adam Boratyński
Powiązania:
https://bibliotekanauki.pl/articles/957076.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Instytut Dendrologii PAN
Tematy:
oreophytes
alpine plants
biometrics
morphology
systematics
Opis:
The complex of Salix retusa includes S. retusa s.s., S serpyllifolia and S. kitaibeliana, small, prostrate willows occurring in the subalpine and alpine vegetation belts of the mountains of Central Europe: the Pyrenees, Alps, Apennines, Dynaric Alps, Carpathians and Rila. The systematic positions of these taxa are not fully resolved and are still disputed. The aim of the present study was to biometrically verify differences in leaf characteristics between these taxa. Material was collected from 47 populations, each represented by 25–52 individuals (33 on average). The study was based on 14 leaf morphological characters measured from scans using Win Folia software. The principal component analysis (PCA), Ward’s agglomeration method, the K-means cluster analysis (K-MCA) and Kruskal-Wallis tests were applied to verify the relationships between taxa and their populations. Differences between average leaf characteristics of S. retusa s.s., S. serpyllifolia and S. kitaibeliana were detected. The Pyrenean populations of S. retusa s.s. appeared more similar to S. serpyllifolia. Within the Alpine populations of S. serpyllifolia, several individuals resembling S. retusa s.s. were detected, and vice versa, within populations of S. retusa s.s., and there were also individuals similar to S. serpyllifolia. The controversial S. kitaibeliana was found to be typical of the Tatra Mountains. The results support close taxonomic relations, but also the separate status of S. retusa, S. serpyllifolia and S. kitaibeliana. The differences between them are mainly of a quantitative nature.
Źródło:
Dendrobiology; 2017, 78; 40-50
1641-1307
Pojawia się w:
Dendrobiology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ograniczenia w pomiarach biometrycznych
Limitations in biometrics measurements
Autorzy:
Gołembiewski, J.
Powiązania:
https://bibliotekanauki.pl/articles/152349.pdf
Data publikacji:
2007
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
biometria
obraz cyfrowy
biometrics
digital image
Opis:
Pomiary biometryczne mogą służyć do identyfikacji lub weryfikacji osób. W artykule, na przykładzie systemu biometrycznego rozpoznawania twarzy i rozpoznawania dłoni, przedstawiono ograniczenia występujące w pomiarach biometrycznych. W trybie identyfikacji wyznaczany jest wzorzec biometryczny, który jest następnie porównywany ze zbiorem wszystkich disteobtcg wzorców. W trybie weryfikacji, sprawdzany jest wzorzec przypisany wcześniej kontrolowanej osobie, z uzyskanym w trakcie pomiarów biometrycznych. Błąd fałszywej akcetacji dla identyfikacji powinien być mniejszy od setnych części procenta. Dla weryfikacji wskaźnik ten może osiągać wartość kilku procent.
Biometrics measurements can be applied to person`s identyfication or verification. In paper, using as example the biometric system recognising face and palm, some limitations existing in biometric measurements are discussed. In the identification case the system is trained with patterns of severan persons, a biometric template is calculated, and then is matched against every known template. In the verification mode a person`s identity is claimed a priori and is compared with the person`s individual template. False acceptance rate for identificatio should be less than 0.01% and several percentage for verification, respectively.
Źródło:
Pomiary Automatyka Kontrola; 2007, R. 53, nr 9 bis, 9 bis; 384-385
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Gender recogniotion methods useful in mobile authentication applications
Autorzy:
Stawska, Z.
Milczarski, P.
Powiązania:
https://bibliotekanauki.pl/articles/94859.pdf
Data publikacji:
2016
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
face identification
gender recognition
face authentication
biometrics
Opis:
Soft biometrics methods that involve gender, age and ethnicity are still developed. Face recognition methods often rely on gender recognition. The same applies to the methods reconstructing the faces or building 2D or 3D models of the faces. In the paper, we conduct study on different set of gender recognition methods and their mobile applications. We show the advantages and disadvantages of that methods and future challenges to the researches. In the previous papers, we examined a range variety of skin detection methods that help to spot the face in the images or video stream. On acquiring faces, we focus on gender recognition that will allow us to create pattern to build 2D and 3D automatic faces models from the images. That will result also in face recognition and authentication, also.
Źródło:
Information Systems in Management; 2016, 5, 2; 248-259
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Face Tracking and Recognition with the Use of Particle-Filtered Local Features
Autorzy:
Stasiak, Ł. A.
Pacut, A.
Powiązania:
https://bibliotekanauki.pl/articles/308537.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometrics
face recognition
particle filtering
video analysis
Opis:
A consistent particle filtering-based framework for the purpose of parallel face tracking and recognition from video sequences is proposed. A novel approach to defining randomized, particle filtering-driven local face features for the purpose of recognition is proposed. The potential of cumulating classification decisions based on the proposed feature set definition is evaluated. By applying cumulation mechanisms to the classification results determined from single frames and with the use of particle-filtered features, good recognition rates are obtained at the minimal computational cost. The proposed framework can operate in real-time on a typical modern PC. Additionally, the application of cumulation mechanisms makes the framework resistant to brief visual distortions, such as occlusions, head rotations or face expressions. A high performance is also obtained on low resolution images (video frames). Since the framework is based on the particle filtering principle, it is easily tunable to various application requirements (security level, hardware constraints).
Źródło:
Journal of Telecommunications and Information Technology; 2010, 4; 26-36
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies