Lockie, 2009 - Google Patents
Biometric technologyLockie, 2009
- Document ID
- 6741390441225654206
- Author
- Lockie M
- Publication year
External Links
- 238000005516 engineering process 0 title abstract description 94
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ashbourn | Biometrics: advanced identity verification: the complete guide | |
Kindt | Privacy and data protection issues of biometric applications | |
Woodward | Biometrics: Privacy's foe or privacy's friend? | |
Jain et al. | An introduction to biometric recognition | |
Andrejevic et al. | Facial recognition | |
Woodward | Biometric scanning, law & policy: identifying the concerns-drafting the biometric blueprint | |
Kim | Biometrics, is it a viable proposition for identity authentication and access control? | |
Lyon | Under my skin: from identification papers to body surveillance | |
Harper | Identity Crisis: How identification is overused and misunderstood | |
Yun | The ‘123’of biometric technology | |
Boukhonine et al. | Future security approaches and biometrics | |
Kindt | An introduction into the use of biometric technology | |
Sujithra et al. | Next generation biometric security system: An approach for mobile device security | |
Bhatnagar et al. | Conventional biometrics and hidden biometric: a comparative study | |
Kumar et al. | Employment of footprint recognition system | |
Lockie | Biometric technology | |
Adkins | Biometrics: weighing convenience and national security against your privacy | |
Lockie | The Biometric Industry Report-Forecasts and Analysis to 2006 | |
Okumura et al. | Identity verification using face recognition improved by managing check-in behavior of event attendees | |
Stanley et al. | Biometric authentication: A trustworthy technology for improved authentication | |
Kindt | The Processing of Biometric Data. A comparative legal analysis with a focus on the proportionality principle and recommendations for a legal framework. | |
Moradoff | Biometrics: Proliferation and constraints to emerging and new technologies | |
Iqbal | An overview of leading biometrics technologies used for human identity | |
Di Nardo | Biometric technologies: functionality, emerging trends, and vulnerabilities | |
Vorobyeva et al. | Benefits and issues of biometric technologies. Are biometrics worth using? |