Lin et al., 2021 - Google Patents
Establishment of Biometric Verification System Based on Design Science Research Methodology and Sensing System for Smart Border Control.Lin et al., 2021
View PDF- Document ID
- 13467213824418315449
- Author
- Lin I
- Hung W
- Publication year
- Publication venue
- Sensors & Materials
External Links
Snippet
Rapidly increasing traveler traffic has burdened the border security and clearance service. Therefore, assisting border guards and travelers to carry out sustainable border strategies is becoming more crucial. The key of such strategies centers on the interaction between …
- 238000000034 method 0 title abstract description 52
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00885—Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
- G06K9/00892—Use of multiple biometrics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00885—Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
- G06K9/00899—Spoof detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khan et al. | The use of biometric technology at airports: The case of customs and border protection (CBP) | |
Singh et al. | Biometric identification system: security and privacy concern | |
Wayman et al. | Biometric systems: Technology, design and performance evaluation | |
Millett et al. | Biometric recognition: Challenges and opportunities | |
Patel | Airport passenger processing technology: a biometric airport journey | |
Lyon | Technology vs ‘terrorism’: circuits of city surveillance since September 11th | |
Sutrop et al. | From identity verification to behavior prediction: Ethical implications of second generation biometrics | |
Das | Biometric technology: authentication, biocryptography, and cloud-based architecture | |
Lin et al. | Establishment of Biometric Verification System Based on Design Science Research Methodology and Sensing System for Smart Border Control. | |
Ruhrmann | Facing the future: protecting human rights in policy strategies for facial recognition technology in law enforcement | |
Lai et al. | Mass evidence accumulation and traveler risk scoring engine in e-border infrastructure | |
Girelli | Laterally Reversed Fingerprints Detected in Fake Documents. | |
Parsheera | Adoption and Regulation of Facial Recognition Technologies in India: Why and Why Not? | |
Marakalala et al. | Border management identification: The biometric technology to detect criminals and terrorists often travel using falsified identity documents | |
Mills et al. | Embracing broadscale applications of biometric technologies in hospitality and tourism: is the business ready? | |
Crumpler et al. | How Does Facial Recognition Work | |
Marinović et al. | Personal identification by eyes | |
Al-Alawi et al. | Evaluating the effectiveness of biometric technologies in controlling the border ports of the state of Kuwait | |
Nakanishi et al. | Advancing the state-of-the-art in transportation security identification and verification technologies: Biometric and multibiometric systems | |
Maeko et al. | Technical Requirements Survey on Multimodal Biometric Selection for Deployment in Governments | |
Roorda | “Facial Recognition for Public Safety”: a supportive tool for the municipal decision-making process on using facial recognition for public safety, the FRPS risk governance method. | |
Reddy et al. | Reinforced Voting Security Through Iris Recognition and Deep Learning Models | |
Chethana et al. | Domain Specific Information Based Learning for Facial Image Forensics | |
Common | Myths | |
Ochora et al. | The Role of Biometric Identification Management System to Uganda’s Rwamwanja Refugee Settlement Food Assistance Programme |