This paper deals with the design of a biometric security system based upon the fingerprint and speech technology. In the first chapter there are the biometric security systems and a concept of an integration of the both technologies introduced. Then the fingerprint technology followed by the speech technology is shortly described. There are discussed some… (More)
This paper deals with a description of wireless sensor networks at the beginning. Further follows the introduction to the agent platform suitable for wireless networks. Mobile code and sensor networks suffer from considerable security problems. Our proposal of countermeasure is based on combination of smartcards with sensor nodes. Smartcards as a tamper… (More)
Travelling is becoming available for more and more people. Millions of people are on a way every day. That is why a better control over global human transfer and a more reliable identity check is desired. A recent trend in a field of personal identification documents is to use RFID (Radio Frequency Identification) technology and biometrics, especially (but… (More)
Affirmation This dissertation is the result of my own work. The work has not been submitted either in whole or in part for a degree at any other university. Certain parts of the work have already been published in conference Dedication I dedicate this work to my parents. Abstract This dissertation describes certain special art of biometric systems. General… (More)
This paperp roposesamethodology to measuret he semantic conformance rate of standardized biometricm inutia interchanger ecords. Thep aper proposes af ingerprint modality specific assertiont est. Ac onformancet estb ased on this methodologyc an attest foragivena lgorithmo rs oftwareu ndert estt hatt he generatedm inutiaet emplates areaf aithfulr… (More)
This article introduces briefly the theory for estimation of fingerprint image quality. This is followed by the description of experiments with fingerprint image quality, concretely image contrast, mean value and number of papillary lines in fingerprint using the scanners Suprema.
In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a different function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The… (More)