دانلود و نمایش مقالات مرتبط با Identity::صفحه 2
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Identity

تعداد مقالات یافته شده: 227
ردیف عنوان نوع
11 Design of a fingerprint template protection scheme using elliptical structures
طراحی طرح محافظت از اثر انگشت با استفاده از ساختارهای بیضوی-2021
Although biometric authentication is viewed as more prominent than password or token-based methodology in identity verification, biometric templates are vulnerable to attacks. This paper proposes a new approach for securing fingerprint templates using elliptical structures generated from the fingerprint minutiae. Authors generate a feature vector from the ellipse and will be projected onto a 3D-space to compute a binary string. The resultant binary string is transformed to frequency domain (DFT) and multiplied with a user specific random matrix to make it permanently non-invertible and secure. The results show the efficacy of the proposed method for protecting the fingerprints. c 2021 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Fingerprint | Ellipse | Discrete Fourier transform | Template protection
مقاله انگلیسی
12 Corporate accounting information disclosure based on FPGA and neural network
افشای اطلاعات حسابداری شرکت بر اساس FPGA و شبکه عصبی-2021
Corporate accounting information is a measure of the company’s accounting and external reporting systems. It is routinely disclosed, which is quantitative data on its financial position and performance audit. The corporate accounting information system contains confidential information that needs to be secured. The consequences of unauthorized access are data loss from identity theft issues. To solve the problem, encrypt and decrypt the sensitive corporate accounting information and product the data using the proposed algorithm Neural Network (NN) and Field Programmable Gate Array (FPGA) is used to classify the corporate accounting information authorized person and unauthorized person. When one authorized user accesses the corporate account infor- mation, it generates the secret critical process. The proposed algorithm unauthorized person cannot access the information is not allowed for stealing. Encryption is the process of converting to something as random and meaningless as direct text data. Decryption is the process of restoring the ciphertext plaintext.
keywords: اطلاعات حسابداری شرکت | شبکه عصبی (NN) | fpga | فرد مجاز | شخص غیر مجاز | رمزگذاری | رمزگشایی | Corporate accounting information | Neural network (NN) | FPGA | Authorized person | Unauthorized person | Encryption | Decryption
مقاله انگلیسی
13 A review on speaker recognition: Technology and challenges
مروری بر تشخیص گوینده: فناوری و چالش ها-2021
Voice is a behavioral biometric that conveys information related to a person’s traits, such as the speaker’s ethnicity, age, gender, and feeling. Speaker recognition deals with recognizing the identity of people based on their voice. Although researchers have been working on speaker recognition in the last eight decades, advancements in technology, such as the Internet of Things (IoT), smart devices, voice assistants, smart homes, and humanoids, have made its usage nowadays trendy. This paper provides a comprehensive review of the literature on speaker recognition. It discusses the advances made in the last decade, including the challenges in this area of research. This paper also highlights the system and structure of speaker recognition as well as its feature extraction and classifiers. The use of speaker recognition in applications is also presented. As recent studies showed the possibility of fooling machine learning into giving an incorrect pre-diction; thus, the adversarial attack is also discussed. The aim is to enhance researchers’ under-standing in the area of speaker recognition.
Keywords: Biometric | Open system | Speaker recognition | Text-independent | Feature extraction | Classifier | Machine learning | Adversarial attack
مقاله انگلیسی
14 Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management
نظرات در مورد اعتبارنامه های غیرقابل انتقال مبتنی بر بیومتریک و کاربرد آنها در مدیریت هویت مبتنی بر بلاک چین-2021
In IT-ecosystems, access to unauthorized parties is prevented with credential-based access control techniques (locks, RFID cards, biometrics, etc.). Some of these methods are ineffective against malicious users who lend their credentials to other users. To obtain non-transferability, Adams proposed a combination of biometrics encapsulated in Pedersen commitment with Brands digital credential. However, Adams’ work does not consider the Zero Knowledge Proof-of Knowledge (ZKPoK) system for Double Discrete Logarithm Representation of the credential. Besides, biometrics is used directly, without employing any biometric cryptosystem to guarantee biometric privacy, thus Adams’ work cannot be GDP compliant. In this paper, we construct the missing ZKPoK protocol for Adam’s work and show its inefficiency. To overcome this limitation, we present a new biometric-based nontransferable credential scheme that maintains the efficiency of the underlying Brands credential. Secondly, we show the insecurity of the first biometric-based anonymous credential scheme designed by Blanton et al.. In this context, we present a brute-force attack against Blanton’s biometric key generation algorithm implemented for fuzzy vault. Next, we integrate an Oblivious PRF (OPRF) protocol to solve the open problem in Blanton’s work and improve its efficiency by replacing the underlying signature scheme with PS-signatures. Finally, we evaluate application scenarios for non-transferable digital/anonymous credentials in the context of Blockchain-based Identity Management (BBIM). We show that our modified constructions preserve biometric privacy and efficiency, and can easily be integrated into current BBIM systems built upon efficient Brands and PS-credentials.
Keywords: Biometrics security | Non-transferability | Digital credentials | Anonymous credentials | Fuzzy vault | Fuzzy extractors | Double discrete logarithm (DDL) | Brands DLRep | Selective disclosure | Blockchain | Identity management
مقاله انگلیسی
15 ActID: An efficient framework for activity sensor based user identification
ActID: یک چارچوب کارآمد برای شناسایی کاربر براساس سنسور فعالیت-2021
Identification is the core of any authentication protocol design as the purpose of the authentication is to verify the user’s identity. The efficient establishment and verification of identity remain a big challenge. Recently, biometrics-based identification algorithms gained popularity as a means of identifying individuals using their unique biological characteristics. In this paper, we propose a novel and efficient identification framework, ActID, which can identify a user based on his/her hand motion while walking. ActID not only selects a set of high-quality features based on Optimal Feature Evaluation and Selection and Correlation- based Feature Selection algorithms but also includes a novel sliding window based voting classifier. Therefore, it achieves several important design goals for gait authentication based on resource-constrained devices, including lightweight and real-time classification, high identification accuracy, a minimum number of sensors, and a minimum amount of data collected. Performance evaluation shows that ActID is cost-effective and easily deployable, satisfies real-time requirements, and achieves a high identification accuracy of 100%.© 2021 Elsevier Ltd. All rights reserved.
Keywords: Wearables | Sensors | Biometric | Identification | Classification
مقاله انگلیسی
16 A Tokenless Cancellable Scheme for Multimodal Biometric Systems
طرح غیر قابل لغو برای سیستم های بیومتریک چند حالته-2021
Biometric template protection (BTP) is an open problem for biometric identity management systems. Cancellable biometrics is commonly designed to protect biometric templates with two input factors i.e., biometrics and a token used in template replacement. However, the token is often required to be kept secretly; otherwise, the protected template could be vulnerable to several security attacks and breaches of privacy. In this paper, we propose a tokenless cancellable biometrics scheme called Multimodal Extended Feature Vector (M•EFV) Hashing that employs an improved XOR encryption/decryption notion to operate on the transformation key. We stress on multimodal biometrics where the real-valued face and fingerprint vectors are fused and embedded into a binarized cancellable template. Specifically, M•EFV hashing consists of three stages of transformation: 1) normalization and bio- metric fusion; 2) randomization and binarization; and 3) cancellable template generation. To evaluate the proposed scheme, several benchmarking datasets, i.e., FVC2002, FVC2004 for fingerprint and LFW for face are used in experiments. The verification performance is vali- dated by employing the FVC matching protocol. Various attacks are simulated and analysed in the worst-case scenario. Lastly, unlinkability and revocability properties are examined experimentally.© 2021 Elsevier Ltd. All rights reserved.
Keywords: Feature-level Fusion | Multimodal Biometrics | Tokenless Cancellable Biometrics | Privacy and security | XOR encryption/decryption
مقاله انگلیسی
17 Improving user verification in human-robot interaction from audio or image inputs through sample quality assessment
بهبود تأیید کاربر در تعامل انسان و روبات از طریق ورودی های صوتی یا تصویری از طریق ارزیابی کیفیت نمونه-2021
In this paper, we tackle the task of improving biometric verification in the context of Human-Robot Interaction (HRI). A robot that wants to identify a specific person to provide a service can do so by either image verification or, if light conditions are not favourable, through voice verification. In our approach, we will take advantage of the possibility a robot has of recovering further data until it is sure of the identity of the person. The key contribution is that we select from both image and audio signals the parts that are of higher confidence. For images we use a system that looks at the face of each person and selects frames in which the confidence is high while keeping those frames separate in time to avoid using very similar facial appearance. For audio our approach tries to find the parts of the signal that contain a person talking, avoiding those in which noise is present by segmenting the signal. Once the parts of interest are found, each input is described with an independent deep learning architecture that obtains a descriptor for each kind of input (face/voice). We also present in this paper fusion methods that improve performance by combining the features from both face and voice, results to validate this are shown for each independent input and for the fusion methods.© 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Keywords: Biometric verification | Audiovisual verification | Human robot interaction
مقاله انگلیسی
18 Redefining recovery: Accounts of treatment experiences of dependent cannabis users in Nigeria
بازسازی دوباره بازیابی: حساب های تجربیات درمان از کاربران وابسته به کانابیس وابسته در نیجریه-2021
Background: Research on addiction recovery describes recovery as a process leading to cessation of drug use. Few researchers have explored alternative views of recovery, and the interplay of individuals’ agency and social context in the recovery process. This study explored situated understandings of recovery among cannabis users that emphasized process and contingency. Methods: We conducted the study in Uyo, Akwa Ibom State in Nigeria. Participants were current (street-involved) cannabis users aged 21 to 34 (n = 97), recruited through time-location sampling. The study collected data through in-depth, individual interviews, which study staff transcribed, coded, and analyzed thematically. Results: Participants’ accounts indicated a quest for treatment as a means of recovery and redemption (i.e., repairing an identity damaged by dependent cannabis use). Relapse affected recovery when participants defined the latter as abstinence. Framing recovery this way showed the effects of social and structural factors on indi- vidual agency and treatment experiences. Yet some participants’ accounts highlighted a redefinition of recovery as a process (“recovering”), measured by such outcomes as reduced drug use and improved overall well-being. Conclusions: Reframing recovery, as some participants’ accounts in our study capture, speaks to the need for treatment programs that are informed by the principles of harm reduction and health promotion. Instead of foisting a singular treatment goal defined as total abstinence onto drug users seeking treatment, treatment should be attuned to the experiences and life circumstances of users and support them in achieving their recovery goals.
keywords: آژانس | شاهدانه | هویت | نیجریه | بهبود | رفتار | Agency | Cannabis | Identity | Nigeria | Recovery | Treatment
مقاله انگلیسی
19 Optokinetic response for mobile device biometric liveness assessment
پاسخ اپتوکینتیک برای ارزیابی زنده بودن بیومتریک دستگاه تلفن همراه-2021
As a practical pursuit of quantified uniqueness, biometrics explores the parameters that make us who we are and provides the tools we need to secure the integrity of that identity. In our culture of constant connectivity, an in- creasing reliance on biometrically secured mobile devices is transforming them into a target for bad actors. While no system will ever prevent all forms of intrusion, even state of the art biometric methods remain vulnerable to spoof attacks. As these attacks become more sophisticated, liveness based attack detection methods provide a po- tential deterrent. We present a novel optokinetc nystagmus (OKN) based liveness assessment system for mobile applications which leverages phase-locked temporal features of a unique reflexive behavioral response. In this paper we provide proof of concept for eliciting, collecting and extracting the OKN response motion signature on a mobile device. Results of our most successful experimental machine learning classifier are reported for a multi-layer LSTM based model demonstrating a 98.4% single stimulus detection performance for simulated video based attacks.© 2021 Elsevier B.V. All rights reserved.
Keywords: Biometrics | Eye movement | Ocular biometrics | Ocular kinetics | Digital identity | Mobile device security | Liveness | Behavioral biometrics
مقاله انگلیسی
20 Deep-learning-based reading eye-movement analysis for aiding biometric recognition
خواندن تجزیه و تحلیل حرکت چشم مبتنی بر یادگیری عمیق برای کمک به تشخیص بیومتریک-2021
Eye-movement recognition is a new type of biometric recognition technology. Without considering the characteristics of the stimuli, the existing eye-movement recognition technology is based on eye- movement trajectory similarity measurements and uses more eye-movement features. Related studies on reading psychology have shown that when reading text, human eye-movements are different between individuals yet stable for a given individual. This paper proposes a type of technology for aiding biometric recognition based on reading eye-movement. By introducing a deep-learning framework, a computational model for reading eye-movement recognition (REMR) was constructed. The model takes the text, fixation, and text-based linguistic feature sequences as inputs and identifies a human subject by measuring the similarity distance between the predicted fixation sequence and the actual one (to be identified). The experimental results show that the fixation sequence similarity recognition algorithm obtained an equal error rate of 19.4% on the test set, and the model obtained an 86.5% Rank-1 recognition rate on the test set.© 2020 Elsevier B.V. All rights reserved.
Keywords: Eye tracking | Eye-movement model | Deep-learning | Biometrics | Identity authentication | Reading eye-movement
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5834 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 40101 :::::::: افراد آنلاین: 51