Filtry
wszystkich: 41
Wyniki wyszukiwania dla: AUTHENTICATION
-
Chemical composition analysis and authentication of whisky
PublikacjaW pracy przedstawiono informacje dotyczące porównania różnych rodzajów whisky i innych napojów alkoholowych, identyfikacji różnych rodzajów whisky, oceny jakości i potwierdzania autentyczności whisky. Ponadto w pracy omówiono różne techniki stosowane w analizie whisky, takie jak gazową i cieczową chromatografię z różnymi detektorami (FID, AED, UV-vis), nos elektroniczny, spektrometrię absorpcji atomowej i spektrometrię mas. Ponadto...
-
A model-based approach to analysis of authentication protocols.
PublikacjaW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
User authentication based on keystroke dynamics analysis
PublikacjaW pracy przedstawiono kilka metod, które można wykorzystać do uwierzytelniania użytkowników na podstawie rytmu pisania na klawiaturze. Dwie z opisanych metod wykorzystują miarę odległości zdefiniowaną do porównywania wpisywanych tekstów, natomiast trzecia analizuje parametry rozkładów cech wydobytych z wpisywanych tekstów. Algorytmy te zostały przetestowane na dwóch zbiorach danych. Ponadto oceniona została efektywność metody powstałej...
-
Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition
PublikacjaThe study presented in the article focuses on keystroke dynamics analysis applied to recognize emotional states and to authenticate users. An overview of some studies and applications in these areas is presented. Then, an experiment is described, i.e. the way of collecting data, extracting features, training classifiers and finding out the most appropriate feature subsets. The results show that it is difficult to indicate a universal...
-
Liveness measurements using optical flow for biometric person authentication
PublikacjaAutomatyczne rozpoznawanie twarzy jest jedną z najpopularniejszych technik biometrycznych, jednak nawet najdokładniejsze algorytmy identyfikacji okażą się bezużyteczne, jeśli będzie można je oszukać, np. używając zdjęcia zamiast rzeczywistej osoby. Dlatego też odpowiedni pomiar żywotności jest niezwykle istotny. W pracy zaprezentowano metodę, która jest w stanie rozróżnić pomiędzy sekwencjami wideo pokazującymi żywe osoby oraz...
-
An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks
PublikacjaHandwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...
-
User Authentication by Eye Movement Features Employing SVM and XGBoost Classifiers
PublikacjaDevices capable of tracking the user’s gaze have become significantly more affordable over the past few years, thus broadening their application, including in-home and office computers and various customer service equipment. Although such devices have comparatively low operating frequencies and limited resolution, they are sufficient to supplement or replace classic input interfaces, such as the keyboard and mouse. The biometric...
-
Concept of Multicriteria Aid of Choice of Threshold Value IN Biometrical Authentication System
Publikacja -
Eye Blink Based Detection of Liveness in Biometric Authentication Systems Using Conditional Random Fields
PublikacjaThe goal of this paper was to verify whether the conditional random fields are suitable and enough efficient for eye blink detection in user authentication systems based on face recognition with a standard web camera. To evaluate this approach several experiments were carried on using a specially developed test application and video database.
-
Authentication of whisky due to its botanical origin and way of production by instrumental analysis and multivariate classification methods
PublikacjaHeadspacemass-spectrometry (HS-MS), mid infrared (MIR) and UV–vis spectroscopywere used to authenticate whisky samples from different origins and ways of production ((Irish, Spanish, Bourbon, TennesseeWhisky and Scotch). The collected spectra were processed with partial least-squares discriminant analysis (PLS-DA) to build the classification models. In all cases the five groups ofwhiskieswere distinguished, but the best resultswere...
-
MRM–MS of marker peptides and their abundance as a tool for authentication of meat species and meat cuts in single-cut meat products
PublikacjaThe abundance of protein markers in different types of meat cuts was explored in the context of authentication of raw meat (pork, beef and chicken) and processed meat products. Peptides originating from myoglobin (Mb) and myosin (My) were analyzed using multiple reaction monitoring mass spectrometry (MRM–MS). Analytical protocol was optimized for good repeatability (CV < 10%) and high sensitivity. The MS signal intensity of Mb...
-
Relative quantification of pork and beef in meat products using global and species-specific peptide markers for the authentication of meat composition
PublikacjaWe used global and species-specific peptide markers for a relative quantitative determination of pork and beef in raw and processed meat products made of the two meat species. Four groups of products were prepared (i.e., minced raw meats, sausages, raw and fried burgers) in order to represent products with different extents of food processing. In each group, the products varied in the pork/beef proportions. All products were analysed...
-
Edge-Computing based Secure E-learning Platforms
PublikacjaImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublikacjaThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
The secure transmission protocol of sensor Ad Hoc network
PublikacjaThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Biometryczna kontrola dostępu
PublikacjaOpisano szczegółowo algorytm detekcji oraz identyfikacji człowieka na podstawie punktów nodalnych twarzy. Zdefiniowano pojęcia: biometria, proces pomiaru biometrycznego, metody biometrycznej identyfikacji oraz kontrola dostępu. Przedstawiono opis opracowanego systemu biometrycznej identyfikacji wykorzystującego sztuczne sieci neuronowe. Podano wyniki badań oraz przeprowadzono ich wnikliwą dyskusję.Biometrics is the study of automated...
-
Uwierzytelnienie i autoryzacja w systemie STRADAR
PublikacjaPrzedstawiono rozwiązanie serwera uwierzytelnienia i autoryzacji (AA) w rozproszonym systemie STRADAR, udostępniającym funkcjonalności dla prowadzenia działań operacyjnych Morskiego Oddziału Straży Granicznej. System umożliwia prezentację na stanowisku wizualizacji zdarzeń (SWZ) bieżącej i archiwalnej sytuacji na mapie (AIS, radary), obrazu z kamer, zdjęć, notatek, rozmów telefonicznych oraz plików i wiadomości tekstowych (SMS)...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublikacjaBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Facial data registration facility for biometric protection of electronic documents
PublikacjaIn modern world, information is crucial, and its leakage may lead to serious losses. Documents as the main medium of information must be therefore highly protected. Nowadays, the most common way of protecting data is using passwords, however it seems inconvenient to type complex passwords, when it is needed many times a day. For that reason a significant research has been conducted on biometric authentication...
-
Analysis of human behavioral patterns
PublikacjaWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...