Biometrics

View this topic in
Biometrics, or biometric authentication, consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. (Wikipedia.org)






Conferences related to Biometrics

Back to Top

2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invited sessions of the latest significant findings and developments in all the major fields of biomedical engineering. Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.

  • 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The conference will cover diverse topics ranging from biomedical engineering to healthcare technologies to medical and clinical applications. The conference program will consist of invited plenary lectures, symposia, workshops, invited sessions and oral and poster sessions of unsolicited contributions. All papers will be peer reviewed and accepted papers of up to 4 pages will appear in the Conference Proceedings and be indexed by IEEE Xplore and Medline/PubMed.

  • 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The conference program will consist of plenary lectures, symposia, workshops and invited sessions of the latest significant findings and developments in all the major fields of biomedical engineering. Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.

  • 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The Annual International Conference of the IEEE Engineering in Medicine and Biology Society covers a broad spectrum of topics from biomedical engineering and physics to medical and clinical applications. The conference program will consist of invited plenary lectures, symposia, workshops, invited sessions, oral and poster sessions of unsolicited contributions. All papers will be peer reviewed and accepted papers of up to 4 pages will appear in the Conference Proceedings and be indexed by PubMed and EI. Prop

  • 2012 34th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc.

  • 2010 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc


2014 IEEE International Conference on Systems, Man and Cybernetics - SMC

SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.

  • 2013 IEEE International Conference on Systems, Man and Cybernetics - SMC

    SMC 2013 targets advances in Systems Science and Engineering Human-machine Systems and Cybernetics involving state-of-the-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies and emerging applications.

  • 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research, and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC2010) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2009 IEEE International Conference on Systems, Man, and Cybernetics (SMC2009) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.


2014 IEEE Sensors

The IEEE Sensors Conference is a forum for presentation, discussion, andexchange of state -of-the art information including the latest research and development in sensors andtheir related fields. It brings together researchers, developers, and practitioners from diverse fieldsincluding international scientists and engineers from academia, research institutes, and companies topresent and discuss the latest results in the general field of sensors.

  • 2013 IEEE Sensors

    The IEEE SENSORS Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2012 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state-of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2011 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state-of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors. IEEE SENSORS 2011 will include keynote addresses by eminen

  • 2010 IEEE Sensors

    The IEEE SENSORS 2010 Conference is a forum for state-of-the-art presentations on sensors and related topics covering from theory to application, device to system, modeling to implementation and from macro/nano to scale.

  • 2009 IEEE Sensors

    IEEE Sensors Conference 2009 is intended to provide a common forum for researchers, scientists, engineers and practitioners throughout the world to present their latest research findings, ideas, developments and applications in the area of sensors and sensing technology. IEEE Sensors Conference 2009 will include keynote addresses by eminent scientists as well as special, regular and poster sessions.


2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)

AVSS focuses on video and signal based surveillance. Topics include: 1) Sensors and data fusion, 2) Processing, detection & recognition, 3) Analytics, behavior & biometrics, 4) Data management and human-computer interfaces, 5) Applications and 6) Privacy Issues


2013 35th International Conference on Information Technology Interfaces (ITI)

The ITI Conference is a scientific, multidisciplinary conference with the mission of fostering interaction among researchers within the broad framework of information and communication technology arena. Each year there is a special topic offered for the Conference. For the year 2013, the featured topic is: "Research and Education using Mobile and Social Networking: When, Where, and How".

  • 2012 34th International Conference on Information Technology Interfaces (ITI)

    The ITI Conference is a scientific, multidisciplinary conference with the mission of fostering interaction among researchers within the broad framework of information and communication technology arena. Each year there is a special topic offered for the Conference. For the year 2012, the featured topic is: "Academic and Business Collaboration: Innovative BI".

  • 2011 33rd International Conference on Information Technology Interfaces (ITI)

    The ITI Conference is a scientific, multidisciplinary conference with the mission of fostering interaction among researchers within the broad framework of information and communication technology arena. Each year there is a special topic offered for the Conference. For the year 2011, the featured topic is: " Statistics, Computing and IT in the Coming Decade".

  • 2010 32nd International Conference on Information Technology Interfaces (ITI)

    The ITI Conference is a scientific, multidisciplinary conference with the mission of fostering interaction among researchers within the broad framework of information and communication technology arena. Each year there is a special topic offered for the Conference. For the year 2010, the featured topic is: "Language Technologies: An Infrastructure for Information Society".

  • 2009 31st International Conference on Information Technology Interfaces (ITI)

    The ITI Conference is a scientific, multidisciplinary conference with the mission of fostering interaction among researches within the broad framework of information and communication technology arena. Each year there is a special topic offered for the Conference. For the year 2009, the featured topic is: Medical Informatics.

  • 2008 30th International Conference on Information Technology Interfaces (ITI)

    The ITI Conference is a scientific, multidisciplinary conference with the mission of fostering interaction among researches within the broad framework of information and communication technology arena. Each year there is a special topic offered for the Conference. For the year 2007 the featured topic is: Computer at the University.


More Conferences

Periodicals related to Biometrics

Back to Top

Biomedical Circuits and Systems, IEEE Transactions on

The Transactions on Biomedical Circuits and Systems addresses areas at the crossroads of Circuits and Systems and Life Sciences. The main emphasis is on microelectronic issues in a wide range of applications found in life sciences, physical sciences and engineering. The primary goal of the journal is to bridge the unique scientific and technical activities of the Circuits and Systems ...


Biomedical Engineering, IEEE Reviews in

The IEEE Reviews in Biomedical Engineering will review the state-of-the-art and trends in the emerging field of biomedical engineering. This includes scholarly works, ranging from historic and modern development in biomedical engineering to the life sciences and medicine enabled by technologies covered by the various IEEE societies.


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Computational Biology and Bioinformatics, IEEE/ACM Transactions on

Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


More Periodicals


Xplore Articles related to Biometrics

Back to Top

Real-time speaker identification and verification

T. Kinnunen; E. Karpov; P. Franti IEEE Transactions on Audio, Speech, and Language Processing, 2006

In speaker identification, most of the computation originates from the distance or likelihood computations between the feature vectors of the unknown speaker and the models in the database. The identification time depends on the number of feature vectors, their dimensionality, the complexity of the speaker models and the number of speakers. In this paper, we concentrate on optimizing vector quantization ...


Feature selection method for facial representation using parzen-window density estimation

Heng Fui Liau; Dino Isa 2010 Second International Conference on Computational Intelligence and Natural Computing, 2010

This paper proposes a feature selection method that aims to select an optimal feature subset to representing facial image from the point of view of minimizing the total error rate (TER) of the system. In this proposed approach, the genuine user score distribution and the imposter score distribution are modeled based on a Parzen-window density estimation to enable the direct ...


The nose on your face may not be so plain: Using the nose as a biometric

A. Moorhouse; A. N. Evans; G. A. Atkinson; J. Sun; M. L. Smith 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP 2009), 2009

Noses are hard to conceal and relatively invariant to facial expression. Notwithstanding, their use as a biometric has been largely unexplored. Using photometric stereo images, this paper proposes two new features for nose recognition. The first of these uses Fourier descriptors to capture the ridge shape, from the nasion to the tip, and the second uses geometric ratios. Both features ...


Analysis of the effect of using non-composite multi-channel raw color images on face recognition accuracy with arbitrary large off-the-plane rotations

Iliana V. Voynichka; Dalila B. Megherbi 2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015

The need for a solution capable of identifying individuals from a distance, possibly wearing a disguise and in a crowded and busy environment is steadily increasing in many homeland security applications. The use of face recognition techniques has unique advantages when compared to other biometric methodologies - face images can be obtained from a distance and without the cooperation of ...


Neural network based speaker verification for security systems

E. Turajlic; O. Bozanovic 2012 20th Telecommunications Forum (TELFOR), 2012

This paper investigates the use of neural networks and MFCC coefficients for automatic, text-dependent, speaker verification in security systems. We have aimed to optimize the classification performance in terms of learning strategy and neural network architecture, as well as to establish the optimal choice of parameters for the voice signature, where MFCC coefficients derivatives are considered. The performance evaluation is ...


More Xplore Articles

Educational Resources on Biometrics

Back to Top

eLearning

Real-time speaker identification and verification

T. Kinnunen; E. Karpov; P. Franti IEEE Transactions on Audio, Speech, and Language Processing, 2006

In speaker identification, most of the computation originates from the distance or likelihood computations between the feature vectors of the unknown speaker and the models in the database. The identification time depends on the number of feature vectors, their dimensionality, the complexity of the speaker models and the number of speakers. In this paper, we concentrate on optimizing vector quantization ...


Feature selection method for facial representation using parzen-window density estimation

Heng Fui Liau; Dino Isa 2010 Second International Conference on Computational Intelligence and Natural Computing, 2010

This paper proposes a feature selection method that aims to select an optimal feature subset to representing facial image from the point of view of minimizing the total error rate (TER) of the system. In this proposed approach, the genuine user score distribution and the imposter score distribution are modeled based on a Parzen-window density estimation to enable the direct ...


The nose on your face may not be so plain: Using the nose as a biometric

A. Moorhouse; A. N. Evans; G. A. Atkinson; J. Sun; M. L. Smith 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP 2009), 2009

Noses are hard to conceal and relatively invariant to facial expression. Notwithstanding, their use as a biometric has been largely unexplored. Using photometric stereo images, this paper proposes two new features for nose recognition. The first of these uses Fourier descriptors to capture the ridge shape, from the nasion to the tip, and the second uses geometric ratios. Both features ...


Analysis of the effect of using non-composite multi-channel raw color images on face recognition accuracy with arbitrary large off-the-plane rotations

Iliana V. Voynichka; Dalila B. Megherbi 2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015

The need for a solution capable of identifying individuals from a distance, possibly wearing a disguise and in a crowded and busy environment is steadily increasing in many homeland security applications. The use of face recognition techniques has unique advantages when compared to other biometric methodologies - face images can be obtained from a distance and without the cooperation of ...


Neural network based speaker verification for security systems

E. Turajlic; O. Bozanovic 2012 20th Telecommunications Forum (TELFOR), 2012

This paper investigates the use of neural networks and MFCC coefficients for automatic, text-dependent, speaker verification in security systems. We have aimed to optimize the classification performance in terms of learning strategy and neural network architecture, as well as to establish the optimal choice of parameters for the voice signature, where MFCC coefficients derivatives are considered. The performance evaluation is ...


More eLearning Resources

IEEE-USA E-Books

  • Biometric Encryption: The New Breed of Untraceable Biometrics

    This chapter contains sections titled: Introduction The Case for Building Privacy into Biometric Technologies Introduction to Untraceable Biometrics (UB) Biometric Entropy Overview of UB Technologies Security Issues with UB: Attacks Privacy and Security Advantages of BE BE Current State and Challenges Summary and Conclusions References

  • Index

    No abstract.

  • Multimodal Physiological Biometrics Authentication

    This chapter contains sections titled: Introduction Experimental Protocol Authentication Algorithm Based on EEG Authentication Algorithm Based on ECG EEG and ECG Fusion Conclusion Summary Acknowledgments References

  • Standard Interview Questions

    Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement.

  • A Multiresolution Analysis of the Effect of Face Familiarity on Human EventRelated Potentials

    This chapter contains sections titled: Introduction Theory Methods Results Discussion Conclusion References

  • Learning in Fingerprints

    This chapter contains sections titled: Introduction Acquisition Preprocessing Feature Extraction Matching Fingerprint Classification Conclusion Acknowledgments References

  • OnLine SignatureBased Authentication: Template Security Issues and Countermeasures

    This chapter contains sections titled: Introduction Signature-Based User-Adaptive Fuzzy Commitment Security-Scalable Signature-Based Authentication System Using Data Hiding Summary References

  • Bibliography

    Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement.

  • A Taxonomy of Emerging Multilinear Discriminant Analysis Solutions for Biometric Signal Recognition

    This chapter contains sections titled: Introduction Multilinear Basics Multilinear Discriminant Analysis Empirical Comparison of MLDA Variants on Face Recognition Conclusions Acknowledgments Appendix: Multilinear Decompositions References

  • DecisionMaking Support in BiometricBased Physical Access Control Systems: Design Concept, Architecture, and Applications

    This chapter contains sections titled: Introduction Fundamental Design Concepts of the Pass Decision-Making Support Assistant Design Hyperspectral Analysis and Synthesis of Facial Skin Texture Prototype Decision-Making Support Assistant Design The Training System T-PASS Discussion and Open Problems Conclusion Acknowledgments References



Standards related to Biometrics

Back to Top

Health Informatics - Personal Health Device Communication - Application Profile - Optimized Exchange Protocol

Within the context of the ISO/IEEE 11073 family of standards for device communication, this project defines a common framework for making an abstract model of personal health data available in transport independent transfer syntax required to establish logical connections between systems, provide presentation capabilities and services needed to perform communication tasks. The protocol is optimized to personal health usage requirements ...


Health Informatics - Personal Health Device Communication - Device Specialization - Blood Pressure Monitor

Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of communication between personal telehealth blood pressure monitor devices and compute engines (e.g. cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards including ISO/IEEE 11073 terminology, ...


Health Informatics - Personal Health Device Communication - Device Specialization - Glucose Meter

Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of communication between personal telehealth glucose meter devices and compute engines (e.g. cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards including ISO/IEEE 11073 terminology, information ...


Health Informatics - Personal Health Device Communication - Device Specialization - Pulse Oximeter

Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of communication between personal telehealth pulse oximeter devices and compute engines (e.g. cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards including ISO/IEEE 11073 terminology, information ...


Health Informatics - Personal Health Device Communication - Device Specialization - Weighing Scale

Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of communication between personal telehealth weighing scale devices and compute engines (e.g. cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards including ISO/IEEE 11073 terminology, information ...


More Standards