Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
399 result(s) for "Biometric Identification - standards"
Sort by:
A Facial Recognition Mobile App for Patient Safety and Biometric Identification: Design, Development, and Validation
Patient verification by unique identification is an important procedure in health care settings. Risks to patient safety occur throughout health care settings by failure to correctly identify patients, resulting in the incorrect patient, incorrect site procedure, incorrect medication, and other errors. To avoid medical malpractice, radio-frequency identification (RFID), fingerprint scanners, iris scanners, and other technologies have been implemented in care settings. The drawbacks of these technologies include the possibility to lose the RFID bracelet, infection transmission, and impracticality when the patient is unconscious. The purpose of this study was to develop a mobile health app for patient identification to overcome the limitations of current patient identification alternatives. The development of this app is expected to provide an easy-to-use alternative method for patient identification. We have developed a facial recognition mobile app for improved patient verification. As an evaluation purpose, a total of 62 pediatric patients, including both outpatient and inpatient, were registered for the facial recognition test and tracked throughout the facilities for patient verification purpose. The app was developed to contain 5 main parts: registration, medical records, examinations, prescriptions, and appointments. Among 62 patients, 30 were outpatients visiting plastic surgery department and 32 were inpatients reserved for surgery. Whether patients were under anesthesia or unconscious, facial recognition verified all patients with 99% accuracy even after a surgery. It is possible to correctly identify both outpatients and inpatients and also reduce the unnecessary cost of patient verification by using the mobile facial recognition app with great accuracy. Our mobile app can provide valuable aid to patient verification, including when the patient is unconscious, as an alternative identification method.
Halt the use of facial-recognition technology until it is regulated
Until appropriate safeguards are in place, we need a moratorium on biometric technology that identifies individuals, says Kate Crawford. Until appropriate safeguards are in place, we need a moratorium on biometric technology that identifies individuals, says Kate Crawford. “These tools are harmful when they fail and dangerous when they work.”
Repeatability and agreement of biometric measurements using spectral domain anterior segment optical coherence tomography and Scheimpflug tomography in keratoconus
To compare the repeatability and agreement in biometric measurements using Spectral Domain Anterior Segment OCT (AS-OCT, REVO-NX, Optopol) and Scheimpflug tomography (Pentacam-AXL, Oculus) in keratoconus. Prospective case series at a university hospital tertiary center. Axial length (AL), anterior chamber depth (ACD), central corneal thickness (CCT), and thinnest corneal thickness (TCT) were measured using both devices in patients with keratoconus. Three groups were analyzed: eyes with no prior crosslinking or contact lens wear (Group A), eyes with prior crosslinking (Group B), and eyes with prior contact lens wear (Group C). Repeatability and agreement of measurements were analyzed. The study comprised of 214 eyes of 157 subjects. In Group A (n = 95 eyes), Group B (n = 86 eyes), and Group C (n = 33 eyes), intraclass correlation coefficient (ICC) was higher than 0.90 for all examined parameters, except for ACD readings in Group A with the REVO-NX (ICC = 0.83). Differences in ACD, TCT, and CCT were significantly different between the two devices for Groups A, B and C (p<0.05). AL measurements differed significantly in Groups A and B (p<0.05) but not in Group C (p = 0.18). Repeatability did not vary significantly between Groups A, B, or C in any parameter with both devices (p>0.05). There was poor agreement between the two devices across all parameters (p<0.05). Both devices demonstrated good repeatability but poor agreement across AL, ACD, CCT and TCT measurements. There was no significant difference in repeatability in virgin eyes compared to eyes with prior crosslinking or contact lens wear, however, the interchangeable use of the two devices is not recommended.
Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan’s scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.
The controversial company using DNA to sketch the faces of criminals
Parabon Nanolabs shot to fame using DNA and genealogy analysis to solve cold cases. Then it hit a setback. Parabon Nanolabs shot to fame using DNA and genealogy analysis to solve cold cases. Then it hit a setback.
Measuring What Latent Fingerprint Examiners Consider Sufficient Information for Individualization Determinations
Latent print examiners use their expertise to determine whether the information present in a comparison of two fingerprints (or palmprints) is sufficient to conclude that the prints were from the same source (individualization). When fingerprint evidence is presented in court, it is the examiner's determination--not an objective metric--that is presented. This study was designed to ascertain the factors that explain examiners' determinations of sufficiency for individualization. Volunteer latent print examiners (n = 170) were each assigned 22 pairs of latent and exemplar prints for examination, and annotated features, correspondence of features, and clarity. The 320 image pairs were selected specifically to control clarity and quantity of features. The predominant factor differentiating annotations associated with individualization and inconclusive determinations is the count of corresponding minutiae; other factors such as clarity provided minimal additional discriminative value. Examiners' counts of corresponding minutiae were strongly associated with their own determinations; however, due to substantial variation of both annotations and determinations among examiners, one examiner's annotation and determination on a given comparison is a relatively weak predictor of whether another examiner would individualize. The extensive variability in annotations also means that we must treat any individual examiner's minutia counts as interpretations of the (unknowable) information content of the prints: saying \"the prints had N corresponding minutiae marked\" is not the same as \"the prints had N corresponding minutiae.\" More consistency in annotations, which could be achieved through standardization and training, should lead to process improvements and provide greater transparency in casework.
Unveiling the Biometric Potential of Finger-Based ECG Signals
The ECG signal has been shown to contain relevant information for human identification. Even though results validate the potential of these signals, data acquisition methods and apparatus explored so far compromise user acceptability, requiring the acquisition of ECG at the chest. In this paper, we propose a finger-based ECG biometric system, that uses signals collected at the fingers, through a minimally intrusive 1-lead ECG setup recurring to Ag/AgCl electrodes without gel as interface with the skin. The collected signal is significantly more noisy than the ECG acquired at the chest, motivating the application of feature extraction and signal processing techniques to the problem. Time domain ECG signal processing is performed, which comprises the usual steps of filtering, peak detection, heartbeat waveform segmentation, and amplitude normalization, plus an additional step of time normalization. Through a simple minimum distance criterion between the test patterns and the enrollment database, results have revealed this to be a promising technique for biometric applications.
A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems
Heterogeneous mobile authentication is a crucial technique to securely retrieve the resource of e-healthcare cloud servers which are commonly implemented in a public key Infrastructure (PKI). Conventionally, a mobile data user can utilize a self-chosen password along with a portable device to request the access privilege of clouds. However, to validate the membership of users, a cloud server usually has to make use of a password table, which not only increases the burden of management, but also raises the possibility of information leakage. In this paper, we propose a secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems. In our system structure, an e-healthcare cloud server of traditional PKIs does not have to store a password table. A legitimate data user only possesses a security token hardware and keeps an offline updatable password without using any private key. Our scheme is classified into the category of dynamic ID authentication techniques, since a data user is able to preserve his/her anonymity during authentication processes. We formally prove that the proposed mechanism fulfills the essential authenticated key exchange (AKE) security and owns lower computational costs. To further ensure the practical application security, an automatic security validation tool called AVISPA is also adopted to analyze possible attacks and pitfalls of our designed protocol.
A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault
Biometric authentication is the process of recognizing a person by means of his\\her psychological or behavioral traits. One of the most important issues faced by the biometric system developer is to protect the template obtained from the biometric of a person. Unimodal biometric system has some drawbacks such as noisy data, interclass variations and spoof attack. Multimodal biometric system has been developed to address the boundaries of unimodal biometric system and increase the security of template. In this paper, template security analysis of multimodal biometric system based of fingerprint and palmprint is proposed and implemented. Fuzzy vault scheme is employed to protect both the fingerprint and palmprint template. At enrollment, image processing techniques such as image enhancement, segmentation and bottom-hat filtering are applied on both the biometric to improve the quality and subsequently the most important features are extracted. Extracted features are concatenated. Combined features along with secret key are utilized to generate the database in the vault. During authentication, query images are sent as an input with the stored template to recover the key. Experimental results are shown that the proposed multi biometrics system performs well than the other methods considered for comparison.
Fingerprint Liveness Detection in the Presence of Capable Intruders
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.