biometric technology
Recently Published Documents


TOTAL DOCUMENTS

258
(FIVE YEARS 80)

H-INDEX

16
(FIVE YEARS 2)

Author(s):  
A S Sochipem Zimik ◽  
◽  
Chingreipam Keishing ◽  

Biometric technology is a contemporary method of identifying and verifying individuals by studying human behavior. The study is focused on primary data obtained at random from numerous employees working, and appropriate questionnaires are provided for additional analysis. As the safety of both persons and corporate assets grows more important, biometrics devices are becoming increasingly promising. The study will help in understanding whether biometric devices will not only just fulfill the basic purpose of identification and verification but rather help in influencing employees to work efficiently by critically evaluating their behavior and result in a positive impact on the organization's productivity. The study finds that biometric technology may be regarded as one of the characteristics of competitive advantage. Because of its low cost, reliability, and responsiveness, the technology is viewed as a method of boosting an organization's security, dependability, cost-effectiveness, and productivity, necessitating a promotion and marketing strategy. Using biometric equipment, the research investigates the effects and performance of employees. According to the findings of the survey, employees are more interested in working for a company that offers flexible scheduling. The study also discovers that the market growth of biometric devices is promising. The research was carried out utilizing qualitative methods.


Author(s):  
Rahila Ayoub

Abstract: Within the biometric industry, computerized person identification using ear pictures is a hot topic. The ear, like other biometrics like the face, iris, and fingerprints, contains a huge number of particular and unique traits that may be used to identify a person. Due to the mask-wearing scenario, most face detection methods fail in this present international COVID-19 pandemic. The eardrum is a great data source for inactive person authentication since it doesn't necessitate the person we're attempting to pinpoint to cooperate, and the structure of the ear doesn't change significantly over time.. The acquisition of a human ear is also simple because the ear is apparent even while wearing a mask. An ear biometric system can enhance other biometric technology in an automated person identification system by giving authentication cues when other information is unreliable or even missing. We provide a six-layer deep convolutional architecture for ear identification in this paper. On the IITD ear dataset, the deep network's potential efficiency is assessed. The IITD has a detection performance of 97.36 percent for the deep network model and 96.99 percent for the IITD. When paired with a competent surveillance system, this approach can be beneficial in identifying people in a large crowd. Keywords: Biometrics, Person identification, IIT-D, Deep learning, Ear dataset


2021 ◽  
Vol 23 (1) ◽  
Author(s):  
Abraham Morake ◽  
Lucas T. Khoza ◽  
Tebogo Bokaba

Background: Over the years, attention has been focused on digital banking and financial technology with little or no attention being paid to biometric banking technology.Objective: The study aimed to investigate the need for security and simplicity in the authentication of retail payments, digital banking and financial technology through the application of biometric systems.Method: The study employed quantitative research methodology and a response rate of 52% was achieved. A set of questionnaires was distributed for data collection.Results: The study’s findings indicated it is imperative for all businesses that participate in financial businesses to fully implement the best possible security measures or systems to ensure or enhance security for financial business activities.Conclusion: Based on the findings of the study, it is recommended that businesses must adopt the new innovative and secured mechanisms of financial dealings to enhance innovation, security and flexibility.


2021 ◽  
pp. 92-102
Author(s):  
Sergiy Rassomakhin ◽  
Olha Melkozerova ◽  
Oleksii Nariezhnii

The subject matter of the paper is the development of fingerprint local structures based on the new method of the minutia vicinity decomposition (MVD) for the solution to the task of fingerprint verification. It is an essential task because it is produced attempts to introduce biometric technology in different areas of social and state life: criminology, access control system, mobile device applications, banking. The goal is to develop real number vectors that can respond to criteria for biometric template protection schemes such as irreversibility with the corresponding accuracy of equal error rate (EER). The problem to be solved is the problem of accuracy in the case of verification because there are false minutiae, disappearing of truth minutiae and there are also linear and angular deformations. The method is the new method of MVD that used the level of graphs with many a point from 7 to 3. This scheme of decomposition is shown in this paper; such a variant of decomposition is never used in science articles. The following results were obtained: description of a new method for fingerprint verification. The new metric for creating vectors of real numbers were suggested – a minimal path for points in the graphs. Also, the algorithm for finding out minimal paths for points was proposed in the graphs because the classic algorithm has a problem in some cases with many points being 6. These problems are crossing and excluding arcs are in the path. The way of sorting out such problems was suggested and examples are given for several points are 20. Results of false rejection rate (FRR), false acceptance rate (FAR), EER are shown in the paper. In this paper, the level of EER is 33 % with full search. 78400 false and 1400 true tests were conducted. The method does not use such metrics as distances and angles, which are used in the classical method of MVD and will be used in future papers. This result is shown for total coincidences of real number, not a similarity that it is used at verifications. It is a good result in this case because the result from the method index-of-max is 40 %.


Author(s):  
Christopher Allan O'Neill ◽  
Mark Andrejevic ◽  
Neil Selwyn ◽  
Xin Gu ◽  
Gavin Smith

In this paper we analyse data gathered through facial recognition tradeshow ethnographies and interviews with members of the biometrics industry, as we consider recent shifts in industry discourse towards promoting the ‘ethical’ use of biometric technology. As the biometrics industry increasingly moves towards a ‘Video Surveillance as a Service’ (VSaaS) model, the study of facial recognition infrastructures is becoming a crucial aspect of the interrogation of the Internet of Things. We demonstrate that the facial recognition industry is acutely aware of critiques of facial recognition cameras and biometric technologies as enabling social harms related to intrusiveness and bias (see Stark, 2019), and that members of the industry are keen to promote a more prosocial public image of the technology. Towards this end we find that biometric monitoring of children has gained a prominent place in the promotion of facial recognition technologies as a mode of ‘careful’ surveillance. We identify three key ‘use cases’ in which the face of the child takes on a prominent role as justifying and legitimating the use of facial recognition technologies – in the auditing of humanitarian food supply programs, in the detection of so-called ‘staging’ of family units at the US border, and in the detection of underage gambling in Australia. We argue that the immanent ‘ethical’ framing of the child’s face in this context serves to obscure the political ramifications of the extension of facial recognition and of biometric surveillance tools more broadly.


Author(s):  
Rohini M ◽  
Meganathan K ◽  
Kamali S ◽  
Yuvan Shankar S ◽  
Nitheesh M ◽  
...  

Automatic attendance methods are very helpful for students and workers in order to make use of their time more effectively. Maintaining attendance is the most troublesome assignment in different organizations. In recent days we have seen abrupt increment in the utilization of biometric technology in the fields of IT, education institute, transportation, etc. Internet of things is also blooming parallel. Automatic attendance system is an implementation of internet of things through Arduino ide, thingspeak finger print scanner R305 in order to reduce the time consumed by the traditional attendance method. There are various technologies like RFID, fingerprint and face recognition technologies are introduced in order to save time and reduce efforts. In this paper we are going to compare those technologies and understand which is best among them.


2021 ◽  
pp. 016344372110369
Author(s):  
David Humphrey

This article examines the Japanese biometrics industry and its discourse, with a focus on the language of biometric ‘sensing’ that has shaped its development over the past two decades. Rooted in the ubiquitous computing boom of the early 2000s, the language of sensing reimagines biometric technology as a mediator between the digital and the human, laying the foundation for biometric surveillance’s expansion into everyday settings such as retail ones. In these newer settings, biometric surveillance is promoted as a means for collecting data on human affect and behavior to be used for marketing and other applications. I argue that this growing ambiguity of biometric surveillance re-articulates a convergence between production and consumption, while it also informs safe society discourses and the shifting role of embodiment within digital culture.


2021 ◽  
pp. 004728162110301
Author(s):  
Isidore K. Dorpenyo

In this article, I focus on two competing technical communication discourses used to represent the biometric technology Ghana adopted in 2012 and subsequent elections to demonstrate how communication about technology could potentially marginalize local, nondominant knowledge systems whereas it privileges global, dominant knowledge systems. Representation of the biometric technology, therefore, reflects ways that technical communication can become complicit in silencing, excluding, and marginalizing local voices. I call attention to how communication that focuses on dominant narratives obscures and delegitimizes the knowledge of disenfranchised and less privileged groups.


Author(s):  
Choon Beng Tan ◽  
Mohd Hanafi Ahmad Hijazi ◽  
Norazlina Khamis ◽  
Puteri Nor Ellyza binti Nohuddin ◽  
Zuraini Zainol ◽  
...  

AbstractThe emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.


Sign in / Sign up

Export Citation Format

Share Document