Enhancing Security through Biometric Technology

Author(s):  
Stephen Fried
Keyword(s):  
Author(s):  
Tsu-Wang Shen ◽  
Shan-Chun Chang

Abstract Purpose Although electrocardiogram (ECG) has been proven as a biometric for human identification, applying biometric technology remains challenging with diverse heart rate circumstances in which high intensity heart rate caused waveform deformation may not be known in advance when ECG templates are registered. Methods A calibration method that calculates the ratio of the length of an unidentified electrocardiogram signal to the length of an electrocardiogram template is proposed in this paper. Next, the R peak is used as an axis anchor point of a trigonometric projection (TP) to attain the displacement value. Finally, the unidentified ECG signal is calibrated according to the generated trigonometric value, which corresponds to the trigonometric projection degree of the ratio and the attained displacement measurement. Results The results reveal that the proposed method provides superior overall performance compared with that of the conventional downsampling method, based on the percentage root mean square difference (PRD), correlation coefficients, and mean square error (MSE). Conclusion The curve fitting equation directly maps from the heart rate levels to the TP degree without prior registration information. The proposed ECG calibration method offers a more robust system against heart rate interference when conducting ECG identification.


2021 ◽  
Vol 20 (1) ◽  
pp. 23-43
Author(s):  
Harrison Adewale Idowu

The paper interrogates the prospect of attaining sustainable democracy in Africa using biometric technology (BT) for elections. Technology has become relevant in virtually every aspect of human endeavour, including election management and democratic development. In Africa, BT has also been deployed to improve the quality of elections and democracy. Using document analysis and review of relevant literature, findings indicate that to a large extent, BT is charting the path for sustainable democracy in Africa. However, the deployment of BT for African elections still faces serious challenges such as its high cost, inability to address some forms of electoral fraud, and lack of technical know-how. The paper concludes that the cultivation of political will to improve the quality of elections is important in order to address the current challenges of using BT in African elections and increase the prospect of attaining sustainable democracy.


Author(s):  
Abhilove Kumar ◽  
Apoorv Mishra

Biometric technology classified into two stanzas as authentication and second one is identification this is majorly used in various fields or different- different applications because it verifies the data with help of other rectification technique. Here, we face so many difficulties which play an essential role in rectification process such as the disturbance in picture, blurring, not cleared the minutiae points and picture superiority. Here we use some algorithm which boosts up the algorithms and performance of recognition. This process is very efficient to rectify any of the documents and it is also been good to detect the features or attributes in terms of security.


2014 ◽  
Vol 9 (2) ◽  
pp. 107
Author(s):  
Muhammad Ilyas Sikki ◽  
Sugi Guritman ◽  
Hendra Rahmawan

The e-voting system which developed using two central facilities protokol consist of three component that is voting machine as client for interaction with voter, central legitimization agency (CLA) as server voter authentication, and central tabulating facility (CTF) as server for result recapitulation voter vote count. Research in this paper just focused to voter authentication process on voting machine toward database of voter that stored in CLA with using fingerprint biometric technology. Fingerprint biometric technology used for voter registration process, voter verification process, and voter authentication process who will doing election. Registration process for acquiring voter fingerprint image database, verification process to be sure voter database can be verificated or not, and authentication process for voter authorization who can be permitted or not by system give of vote in election.


Author(s):  
Ridha Ilyas Bendjillali ◽  
Mohammed Beladgham ◽  
Khaled Merit ◽  
Abdelmalik Taleb-Ahmed

<p><span>In the last decade, facial recognition techniques are considered the most important fields of research in biometric technology. In this research paper, we present a Face Recognition (FR) system divided into three steps: The Viola-Jones face detection algorithm, facial image enhancement using Modified Contrast Limited Adaptive Histogram Equalization algorithm (M-CLAHE), and feature learning for classification. For learning the features followed by classification we used VGG16, ResNet50 and Inception-v3 Convolutional Neural Networks (CNN) architectures for the proposed system. Our experimental work was performed on the Extended Yale B database and CMU PIE face database. Finally, the comparison with the other methods on both databases shows the robustness and effectiveness of the proposed approach. Where the Inception-v3 architecture has achieved a rate of 99, 44% and 99, 89% respectively.</span></p>


2019 ◽  
Vol 1 (2) ◽  
Author(s):  
Wai Kit Wong ◽  
Thu Soe Min ◽  
Shi Enn Chong

This paper proposed a fingerprint based school debit transaction system using minutiae matching biometric technology. This biometric cashless transaction system intensely shortens the luncheon line traffic and labour force compared to conventional cash payment system. Furthermore, contrast with card cashless transaction system, fingerprint cashless transaction system with benefit that user need not carry additional identification object and remember lengthy password. The implementation of this cashless transaction system provides a more organize, reliable and efficient way to operate the school debit transaction system. 


Author(s):  
Z.-M. Zadorozhnyy ◽  
V. Muravskyi ◽  
S. Yatsyshyn ◽  
O. Shevchuk

Abstract. Modern conditions of growing cyber threats caused by the hybrid conflicts around the world and looming biological threat of the COVID-19 pandemic necessitate the introduction of biometric authentication of employees, leading to the transformation in the methodology and organization of accounting at enterprises. The procedure for accounting and control of time worked and wages of the employees is the first to undergo changes due to the forcibly limited access of employees to the enterprise data and premises, which determines the topicality and aims of this research. The aim of the article is to investigate the prospects for monitoring the working time and movement of employees on the premises (facilities) of the enterprise with the use of biometric technology in order to develop the methodology of automation of the accounting of payments made to employees and to ensure the cybersecurity of economic entities. The prospects of using an automated employee checkpoint system based on biometrics for the purposes of accounting and control are explored. The paper improves the methodology of accounting and control over the working time and wages of employees based on the automated employee authentication system using data on the time spent on premises and performance of job functions. Recommendations are made on ensuring biological and cyber security of enterprises in terms of categorizing the enterprise premises and equipment according to their functions and level of access to information and material flows. The research examines the prospects of accounting for the employee costs, as well as accurate distribution of overhead and other costs based on data of the biometric employee authentication system. It is advised to conduct further research into the peculiarities of methodology and organization of accounting under conditions of distance and isolated job performance by accounting employees, as it raises the requirements to cybersecurity of enterprises. Keywords: accounting, working time, wages (salary), biometrics, employee authentication, automation of accounting and control, cybersecurity, COVID-19. JEL Classification M41, M49 Formulas: 0; fig.: 2; tabl.: 1; bibl.: 18.


Sign in / Sign up

Export Citation Format

Share Document