Search results

1 – 10 of 722
Article
Publication date: 26 May 2020

S. Veluchamy and L.R. Karlmarx

Biometric identification system has become emerging research field because of its wide applications in the fields of security. This study (multimodal system) aims to find more…

Abstract

Purpose

Biometric identification system has become emerging research field because of its wide applications in the fields of security. This study (multimodal system) aims to find more applications than the unimodal system because of their high user acceptance value, better recognition accuracy and low-cost sensors. The biometric identification using the finger knuckle and the palmprint finds more application than other features because of its unique features.

Design/methodology/approach

The proposed model performs the user authentication through the extracted features from both the palmprint and the finger knuckle images. The two major processes in the proposed system are feature extraction and classification. The proposed model extracts the features from the palmprint and the finger knuckle with the proposed HE-Co-HOG model after the pre-processing. The proposed HE-Co-HOG model finds the Palmprint HE-Co-HOG vector and the finger knuckle HE-Co-HOG vector. These features from both the palmprint and the finger knuckle are combined with the optimal weight score from the fractional firefly (FFF) algorithm. The layered k-SVM classifier classifies each person's identity from the fused vector.

Findings

Two standard data sets with the palmprint and the finger knuckle images were used for the simulation. The simulation results were analyzed in two ways. In the first method, the bin sizes of the HE-Co-HOG vector were varied for the various training of the data set. In the second method, the performance of the proposed model was compared with the existing models for the different training size of the data set. From the simulation results, the proposed model has achieved a maximum accuracy of 0.95 and the lowest false acceptance rate and false rejection rate with a value of 0.1.

Originality/value

In this paper, the multimodal biometric recognition system based on the proposed HE-Co-HOG with the k-SVM and the FFF is developed. The proposed model uses the palmprint and the finger knuckle images as the biometrics. The development of the proposed HE-Co-HOG vector is done by modifying the Co-HOG with the holoentropy weights.

Details

Sensor Review, vol. 40 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 August 2019

Ziaul Haque Choudhury and M. Munir Ahamed Rabbani

Nowadays, the use of forged e-passport is increasing, which is threatening national security. It is important to improve the national security against international crime or…

Abstract

Purpose

Nowadays, the use of forged e-passport is increasing, which is threatening national security. It is important to improve the national security against international crime or terrorism. There is a weak verification process caused by lack of identification processes such as a physical check, biometric check and electronic check. The e-passport can prevent the passport cloning or forging resulting from the illegal immigration. The paper aims to discuss these issues.

Design/methodology/approach

This paper focuses on face recognition to improve the biometric authentication for an e-passport, and it also introduces facial permanent mark detection from the makeup or cosmetic-applied faces, twins and similar faces. An algorithm is proposed to detect the cosmetic-applied facial permanent marks such as mole, freckle, birthmark and pockmark. Active Shape Model into Active Appearance Model using Principal Component Analysis is applied to detect the facial landmarks. Facial permanent marks are detected by applying the Canny edge detector and Gradient Field Histogram of Oriented Gradient.

Findings

This paper demonstrated an algorithm and proposed facial marks detection from cosmetic or makeup-applied faces for a secure biometric passport in the field of personal identification for national security. It also presented to detect and identify identical twins and similar faces. This paper presented facial marks detection from the cosmetic-applied face, which can be mixed with traditional methods. However, the use of the proposed technique faced some challenges due to the use of cosmetic. The combinations of the algorithm for facial mark recognition matching with classical methods were able to attain lower errors in this proposed experiment.

Originality/value

The proposed method will enhance the national security and it will improve the biometric authentication for the e-passport. The proposed algorithm is capable of identifying facial marks from cosmetic-applied faces accurately, with less false positives. The proposed technique shows the best results.

Details

International Journal of Intelligent Unmanned Systems, vol. 8 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 1 June 2015

Wilson Abel Alberto Torres, Nandita Bhattacharjee and Bala Srinivasan

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system…

1364

Abstract

Purpose

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with an individual and cannot be revoked or cancelled, especially when biometric data are compromised, leading to privacy issues.

Design/methodology/approach

By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris.

Findings

The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol.

Research limitations/implications

The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated.

Originality/value

The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 11 May 2012

Olli I. Heimo, Antti Hakkala and Kai K. Kimppa

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear…

929

Abstract

Purpose

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear problems with the databases into which biometric data are being collected, due to use of this data for other (publicly), non‐intended uses.

Design/methodology/approach

The approach of this paper is both a meta‐study of the flaws in the technological specifications as well as the social implementation of RFID/biometric passports. Finland is used as a case, but the results extend beyond Finland in most, if not all the topics presented – not necessarily all results to all implementations, but all to some others.

Findings

The current implementations of RFID/biometric passports are lacking in both technical and social implementations and pose clear risks to their use, both due to lax implementation of the technology itself but specifically due to the social changes brought about. These problems cause both erosion of privacy and trust.

Research limitations/implications

Further research into other potential social implications on a national level is required. The authors fear that the cases presented do not necessarily reflect all the potential problems, but just the most evident ones.

Practical implications

The problems with the technological implications can be averted by using the best technological solutions, and thus the best technological solutions should be used instead of the ones proven to be lacking.

Social implications

The social implications should at least be brought forth for public discourse and acknowledged, which currently does not seem to happen.

Originality/value

The paper contributes to the understanding of problems with current RFID/biometric passport implementations as well as inherent social problems that are hard, if not impossible to avoid. The problems belong under the category of critical eGovernment applications, and similar issues are visible in other eGovernment applications.

Details

Journal of Information, Communication and Ethics in Society, vol. 10 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 6 March 2009

Hilary C. Murphy and Damien Rottet

This paper aims to review the determinants that influence adoption of biometric technologies, with particular emphasis on both devices and hotel processes.

2428

Abstract

Purpose

This paper aims to review the determinants that influence adoption of biometric technologies, with particular emphasis on both devices and hotel processes.

Design/methodology/approach

The overall objective was to identify the critical hotel processes and devices. This was achieved by a quantitative survey of 300 hotel customers which focused on the key dimensions of technology behaviour, holiday characteristics, hotel processes, biometric technologies and the “willingness” to adopt.

Findings

The findings show that 87.3 per cent of hotel customers may be “willing to use” biometric devices and that there is some correlation between the different processes as well as the different biometric technologies.

Practical implications

Conclusions and recommendations are made as to which specific hotel processes might benefit from biometrics and also how hoteliers might anticipate the rollout of biometric technologies.

Originality/value

This paper provides a first, empirical study into customer adoption of biometrics. It reveals opportunities for hotels to profit from emerging biometric technologies.

Details

International Journal of Contemporary Hospitality Management, vol. 21 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Content available
Article
Publication date: 1 December 2003

194

Abstract

Details

Sensor Review, vol. 23 no. 4
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 2 June 2022

Huey Chern Boo and Bee-Lia Chua

This study aims to explain how hotel guests form attitudes toward facial recognition technology in Singapore by integrating technology acceptance model (TAM), privacy calculus…

2521

Abstract

Purpose

This study aims to explain how hotel guests form attitudes toward facial recognition technology in Singapore by integrating technology acceptance model (TAM), privacy calculus theory and personal innovativeness.

Design/methodology/approach

A self-administered online questionnaire was developed with measurements adopted from past research. Guests who stayed in four- or five-star hotels in Singapore were recruited via systematic random sampling. Structural equation modeling was conducted to examine the proposed integrated models.

Findings

Results showed that hotel guests performed calculative cognitive processes, weighing the benefits and risks of using facial recognition check-in system. Contradictory to the past research which suggested that trust activates both perceived risk and benefits, this study demonstrated that trust independently directed consumer attention on the benefits gained while risk perception was triggered by privacy concern. Furthermore, the current study revealed that the ease of use of facial recognition check-in system could possibly backfire.

Practical implications

The research indicates that the effort to adopt new technology in the hotel industry is promising in view of the growing millennials and Generation Z population who are digital natives. Furthermore, the current study highlights ways to elevate institutional trust and divert consumers’ attention from risk perception to enhance their positive attitude and behavior toward accepting facial recognition check-in system.

Originality/value

This study integrated TAM with privacy calculus theory and personal innovativeness in examining the acceptance of facial recognition check-in system in the hotel industry in Singapore. This study is also the first, to the best of the authors’ knowledge, to investigate the relationships among privacy concern, perceived risk, institutional trust and perceived benefits, as well as their effects on consumers’ attitudes and behavior toward the biometric system.

Details

International Journal of Contemporary Hospitality Management, vol. 34 no. 11
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 28 February 2023

Lysann Seifert, Nathan Kunz and Stefan Gold

Although the UN Sustainable Development Goals (SDGs) emphasize the importance of leaving no one behind, the opposite is happening for the world's 89 million forcibly displaced…

Abstract

Purpose

Although the UN Sustainable Development Goals (SDGs) emphasize the importance of leaving no one behind, the opposite is happening for the world's 89 million forcibly displaced people who are mostly left out of SDGs’ reporting and progress. A key reason for this poor outcome is that host country governments plan refugee camps as short-term shelters, but refugees stay in these camps for more than a decade on average due to ongoing conflicts in their home country. This disparity between intent and reality prevents sustainable living conditions for refugee populations. Operational innovations are needed to find sustainable solutions that ensure a higher quality of life and progress toward sustainability in refugee camps.

Design/methodology/approach

Through an abductive case study, the authors develop a theoretical framework on sustainable operational innovations for refugee camps. The authors use this framework to analyze four sustainable operational innovations implemented in three refugee camps in Jordan.

Findings

The authors develop three research propositions that describe the conditions required for these operational innovations to succeed: they need to include specific needs and cultural preferences of refugees, they must accommodate host governments' restrictions that limit permanent settlement, and finally, technological innovations require careful data management policies to protect refugees. Doing this, the authors account for the broader political-economic and ecological environments that refugee camps are embedded in.

Originality/value

This paper opens a new area of research on sustainable innovation in humanitarian operations. It provides insights into key contingency factors moderating the link between operational innovations and sustainability outcomes. It represents one of the few studies that build their theorizing upon field data collected in refugee camps.

Details

International Journal of Operations & Production Management, vol. 43 no. 10
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 5 October 2015

Jonathan Clough

The purpose of this paper is to consider potential criminal law responses to the global challenge of “identity crime”. In particular, it focuses on a specific offence of “identity…

2563

Abstract

Purpose

The purpose of this paper is to consider potential criminal law responses to the global challenge of “identity crime”. In particular, it focuses on a specific offence of “identity theft”. It begins with a discussion of the meaning of “identity” in the context of modern transactions, before defining “identity crime” and related terms. Legal responses are then considered before turning to the importance of harmonisation. The transnational nature of modern identity crimes makes it essential that law enforcement agencies not only have suitable offences at their disposal but also the frameworks to facilitate international cooperation.

Design/methodology/approach

Given the increasingly transnational and organized nature of modern identity crime, this paper adopts a comparative approach. It draws upon provisions from Australia, Canada, the UK and the USA. It also looks at responses to identity crime at the regional and international level.

Findings

Although there is currently no international instrument which specifically and comprehensively addresses identity theft, it is argued that there is an urgent need for further international discussion as to the desirability and form of identity theft provisions. While international agreement may not be reached, such discussions are important in assisting countries to develop appropriate legal frameworks and capacity to address the modern fraud environment.

Originality/value

It is hoped that this paper will contribute to, and facilitate, important ongoing discussions as to the most effective ways in which to tackle identity crime at the national and international levels.

Details

Journal of Financial Crime, vol. 22 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 April 1998

Marius Dannenberg and Dorothée Kellner

This article presents opportunities for the effective utilization of the Internet with regard to the banking industry. It is shown that the appropriate application of today’s…

3013

Abstract

This article presents opportunities for the effective utilization of the Internet with regard to the banking industry. It is shown that the appropriate application of today’s cutting‐edge technology can lead to a momentous competitive advantage for banks. This is illustrated by a scenario focussing on the potentials of “Advising via Internet”.

Details

International Journal of Bank Marketing, vol. 16 no. 2
Type: Research Article
ISSN: 0265-2323

Keywords

1 – 10 of 722