Search Results - "impostor"

Refine Results
  1. 1
  2. 2

    Cancellable biometrics and annotations on BioHash by TEOH, A, KUAN, Y, LEE, S

    Published 2008
    “…However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. …”
    Get full text
    Get full text
  3. 3

    Generation of replaceable cryptographic keys from dynamic handwritten signatures by Yip, , WK, Goh, , A, Ngo, , DCL, Teoh, , ABJ

    Published 2006
    “…Our experiments indicate encouraging result especially for skilled and random forgery whereby the equal error rates are < 6.7% and similar to 0% respectively, indicating that the keys generated are sufficiently distinguishable from impostor keys. …”
    Get full text
  4. 4

    Performance evaluation of face verification: a comparative study on different classifiers by Nazeer, Shahrin Azuan, Khalid, Mazuki, Omar, Nazaruddin, Awang, Mat Kamil

    Published 2007
    “…The task offace verification is to verify the identity or decide whether the a priori user is an impostor or not from the known a priori identity of the user. …”
    Get full text
    Get full text
  5. 5

    DPD-DFF: a dual phase distributed scheme with double fingerprint fusion for fast and accurate identification in large databases by Peralta, Daniel, Triguero, Isaac, García, Salvador, Herrera, Francisco, Benitez, Jose M.

    Published 2016
    “…The experiments show that DPD-DFF obtains very competitive results in comparison with the state-of-the-art score fusion techniques, especially when dealing with large databases or impostor fingerprints.…”
    Get full text
  6. 6

    Feature fusion using a modified genetic algorithm for face and signature recognition system by Suryanti, Awang

    Published 2015
    “…This thesis focuses on the development of feature level fusion of bimodal biometrics system for face and dynamic signature recognition system The modalities of biometric are used due to the ability to avoid spoof attack since it is difficult for impostor to imitate two different characteristics (behaviour and physical) at the same time. …”
    Get full text
    Get full text
  7. 7

    Design and development of an automatic fingerprint verification system by Sulong, Ghazali

    Published 2005
    “…Biometrics is more reliable and more capable of differentiating between an authorised person and a fraudulent impostor than traditional methods such as passwords and PIN numbers. …”
    Get full text
    Get full text
  8. 8

    A hybrid cryptosystem for biometric authentication and template protection by Jegede, Abayomi Joshua

    Published 2017
    “…Overall, the hybrid scheme provides good recognition accuracy and increases the security of stored biometric data, privacy of legitimate users and protection against loss of identity even if an impostor compromises the constituent template protection algorithms.…”
    Get full text
    Get full text
  9. 9

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…Additionally, the algorithms developed in this study are also validated and verified based on three performance measures namely genuine acceptance rate (GAR) for plate as 96% based on registered car plate during exit whilst face GAR of 80% for registered owner or user to be allowed to exit. As for impostors, the rejection rate (IRR) calculated is 100% as indicator of the specificity of impostors as well as prohibiting unregistered owner or user to proceed and exit.…”
    Get full text
  10. 10

    A single photon quantum user bi-directional authentication scheme over noiseless channel by Buhari, Abudhahir, Ahmad Zukarnain, Zuriati, K. Subramaniam, Shamala, Zainuddin, Hishamuddin, Saharudin, Suhairi

    Published 2012
    “…Security analysis proves our proposed scheme is resistant to impostors' attacks and eavesdropper. Furthermore, our proposed protocol can extend to multiparty environment and permits to re-use many times of the shared secret key without revealing it.…”
    Get full text
    Get full text
  11. 11

    Iris recognition system by using support vector machines by Ali, Hasimah, Salami, Momoh Jimoh Eyiomika, Martono, Wahyudi

    Published 2008
    “…This feature is then used to recognize authentic users and to reject impostors. Support Vector Machines (SVMs) technique was used for the classification process. …”
    Get full text
    Get full text
  12. 12

    Iris recognition system using support vector machines by Ali, Hasimah, Salami, Momoh Jimoh Emiyoka

    Published 2011
    “…This feature is then used to recognize authentic users and to reject impostors. Support Vector Machines (SVMs) technique was used for the classification process. …”
    Get full text
    Get full text
  13. 13

    Speaker recognition based on Hidden Markov Model by Shaikh Salleh, Sheikh Hussain, Sha'arneri, Ahmad Zuri, Yusoff, Zulkamain, AI-Attas, Syed Abdul Rahman, Lim, Soon Chieh, Abdul Rahman, Ahmad Idil, Mat Tahir, Shahirina

    Published 2000
    “…Speaker recognition, experiments were performed to evaluate the performance of the system with 30 speakers (22 impostors and 8 clients). The identification error was 2%, the false acceptance rate was 28% and the false rejection rate was 1%.…”
    Get full text
    Get full text
  14. 14

    Keystroke pressure-based typing biometrics authentication system using support vector machines by Martono, Wahyudi, Ali, Hasimah, Salami, Momoh Jimoh Eyiomika

    Published 2007
    “…The combination of maximum pressure exerted on the keyboard and time latency between keystrokes is used as features to create typing patterns for individual users so as to recognize authentic users and to reject impostors. Support vector machines (SVMs), which is relatively new machine learning, is used as a pattern matching method. …”
    Get full text
    Get full text
  15. 15

    Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network by Sulong, A., Wahyudi, Martono, Siddiqi, Muhammad Umar

    Published 2009
    “…The combination of maximum pressure exerted on the keyboard and time latency between keystrokes is used as features to create typing patterns for individual users so as to recognize authentic users and to reject impostors. Radial basis function network (RBFN), which is one of the artificial neural network, is used as a pattern matching method. …”
    Get full text
    Get full text
  16. 16

    Typing Dynamics Biometric Authentication through Fuzzy Logic by Zhe, Jin, Andrew Beng Jin, Teoh, Thian Song, Ong, Connie, Tee

    Published 2008
    “…The request to protect sensitive data and computer systems from malicious impostors while allowing ease of access for legitimate users is one of the greatest challenges in the computer security field. …”
    Get full text
  17. 17

    Face recognition using bit-plane feature extraction approach in neutal networks by Ting, Kung Chuang

    Published 2009
    “…The research is concluded with proven result that bit-plane feature extraction is a reliable feature for face recognition due to its high recognition rate and ability in impostors’ rejection.…”
    Get full text
    Get full text
  18. 18

    Implementation of speaker identification system by means of personal computer by Shaikh Salleh, Sheikh Hussain, Sha'ameri, Ahmad Zuri, Yusoff, Zulkarnian, Syed Al Attas, Syed Rahman, Lim, Soon Chieh

    Published 2000
    “…For speaker recognition, experiments were performed to evaluate the performance of the system with 30 speakers (22 impostors and 8 clients). The identification error was 2%, the false acceptance rate was 28% and the false rejection rate was 1%. …”
    Get full text
    Get full text
  19. 19

    Multimodality to improve Security and Privacy in Fingerprint Authentication System by Islam, Md. Rajibul, Sayeed, Md. Shohel, Samraj, Andrews

    Published 2007
    “…Traditional biometric systems that are based on single biometric usually suffer from problems like impostors' attack or hacking, unacceptable error rates. …”
    Get full text
  20. 20

    Multimodality to improve Security and Privacy in Fingerprint Authentication System by Islam, Md. Rajibul, Sayeed, Md. Shohel, Samraj, Andrews

    Published 2007
    “…Traditional biometric systems that are based on single biometric usually suffer from problems like impostors’ attack or hacking, unacceptable error rates. …”
    Get full text
    Get full text