Página 1 dos resultados de 701 itens digitais encontrados em 0.003 segundos

Characterizing patterns in DNA sequence trace data through informatics tools

Mendonça, Pedro Alberto Fernández de
Fonte: Universidade de Coimbra Publicador: Universidade de Coimbra
Tipo: Dissertação de Mestrado
ENG
Relevância na Pesquisa
27.37%
Sequence trace data files produced by the Sanger sequencing method were believed to create peak height values of random height and with no added value for base calling. Our study is the first to comprehensively prove the existence of definable peak height patterns and to develop tools that allow the characterization of the frequency of such patterns for each sequence frame. By studying hundreds of mtDNA samples sequenced in two certified forensic laboratories, in the United States of America and in Portugal, we were able to prove that peak height patterns are predictable and the same from sample to sample if the chemistry and primer combination is kept constant within the same laboratory. Moreover, the characterization of these patterns and the ability to predict their behavior for other samples led us to develop the novel concept of Sequence Biometrics. Sequence Biometrics defines the characteristics of these peak height patterns for a certain stretch of sequenced DNA, independently of the origin and sample, which is specific to the primer/chemistry combination used within the laboratory. Therefore, Sequence Biometrics is a new quality parameter for sample processing and can be used by novel expert systems in the assessment of new data. This work provides the basic informatics tools and workflow mechanisms to build standard Sequence Biometrics tables...

A segurança na identificação: a biometria da íris e da retina; Identification security: íris and retina biometrics

Garcia, Iberê Anselmo
Fonte: Biblioteca Digitais de Teses e Dissertações da USP Publicador: Biblioteca Digitais de Teses e Dissertações da USP
Tipo: Dissertação de Mestrado Formato: application/pdf
Publicado em 20/05/2009 PT
Relevância na Pesquisa
37.51%
A presente dissertação aborda o processo de identificação por biometria das estruturas oculares, analisando suas bases biológicas e tecnológicas e sua aplicabilidade e confiabilidade para utilização jurídica. Está dividida em três partes. Na primeira, são analisados aspectos do conceito de identidade em suas diversas acepções e do processo de identificação médico legal por meio da utilização de diferentes métodos. Na segunda, passa-se a estudar a biometria da íris e da retina, abordando suas bases biológicas e tecnológicas. Na terceira e última parte, estuda-se a aplicabilidade e confiabilidade da biometria ocular para finalidades jurídicas, como método de perícia da identidade.; The purpose of this work is to study the identification process by ocular biometrics, from its biological and technological basis to its forensic and legal system applications. It is divided into three sections. The first section discusses the concept of identity and the identification methods used by forensic professionals. The second section discusses the ocular biometrics methods using iris and retinal traits, emphasizing their biological as well as their technological basis. The third and last section discusses the reliability and applicability of these biometrics modalities as identification methods in legal and forensic issues.

Assimetria humana no reconhecimento multibiométrico.; Human asymmetry in multibiometric recognition.

Vertamatti, Rodolfo
Fonte: Biblioteca Digitais de Teses e Dissertações da USP Publicador: Biblioteca Digitais de Teses e Dissertações da USP
Tipo: Tese de Doutorado Formato: application/pdf
Publicado em 13/10/2011 PT
Relevância na Pesquisa
27.45%
A combinação de fontes biométricas não redundantes da multibiometria supera a precisão de cada fonte individual (monobiometria). Além do mais, dois problemas em biometria, ruído e ataques de usurpadores, podem ser minimizados pelo uso de múltiplos sensores e biometria multimodal. Entretanto, se as similaridades estão em todos traços biométricos, como em gêmeos monozigotos (MZ), o processamento de múltiplas fontes não melhora a performance. Para distinguir extrema similitude, influências epigenéticas e ambientais são mais importantes do que o DNA herdado. Esta tese examina a plasticidade fenotípica na assimetria humana como uma ferramenta para melhorar a multibiometria. A técnica de Processamento Bilateral (PB) é introduzida para analisar discordâncias em lados esquerdo e direito dos traços biométricos. PB foi testado com imagens de espectro visível e infravermelho usando Correlação Cruzada, Wavelets e Redes Neurais Artificiais. Os traços selecionados foram dentes, orelhas, íris, impressões digitais, narinas e bochechas. PB acústico também foi implementado para avaliação da assimetria vibracional durante sons vocálicos e comparado a um sistema reconhecedor de locutores com parametrização via MFCC (Mel Frequency Cepstral Coefficients) e classificado por Quantização Vetorial. Para o PB de imagens e acústico foram coletadas 20 amostras por traço biométrico durante um ano de nove irmãos masculinos adultos. Com propósito de teste...

Biometria no Brasil e o registro de identidade civil: novos rumos para a identificação; Biometrics in Brazil and the civil identity register: new directions to identify

Kanashiro, Marta Mourão
Fonte: Biblioteca Digitais de Teses e Dissertações da USP Publicador: Biblioteca Digitais de Teses e Dissertações da USP
Tipo: Tese de Doutorado Formato: application/pdf
Publicado em 23/09/2011 PT
Relevância na Pesquisa
37.1%
O tema geral desta pesquisa são as tecnologias que permitem o controle de acesso, vigilância, monitoramento e identificação de pessoas, e que se aliam a construção de bancos de dados e perfis sobre a população. Neste amplo universo, a tecnologia biométrica para identificação foi focalizada a partir de um estudo de caso sobre o novo documento biométrico de identidade brasileiro: o Registro de Identidade Civil. Retomando o conceito de dispositivo em Michel Foucault, buscou-se trazer a tona os discursos, as instituições, as leis, o debate legal, as medidas, decisões, e enunciados científicos que configuram o funcionamento do poder na atualidade. No âmbito das ciências, a biometria hoje distancia-se da antropometria e das formas de identificação do século XIX, vinculando-se a um exercício do poder que não é mais aquele para disciplinar os corpos (Michel Foucault), mas para gerir os fluxos de dados, um corpo de dados. As novas tecnologias focalizadas apontam para um exercício do poder mais próximo do que Gilles Deleuze chamou de sociedades de controle.; This research focus on technologies that are enabled to access control, surveillance, monitoring and identification of persons, connected with databases and profiles construction on the population. In this vast universe...

Methodology proposal for acquisition of biotelemetric data in a real time

Canciglieri Jr., Osiris; Rudek, M.; Bodaczny, Lucas A.; De Souza, Teófilo Miguel
Fonte: Universidade Estadual Paulista Publicador: Universidade Estadual Paulista
Tipo: Conferência ou Objeto de Conferência
ENG
Relevância na Pesquisa
27.37%
This work presents a methodological proposal for acquisition of biometric data through telemetry basing its development on a research-action and a case study. Nowadays, the qualified professionals of physical evaluation have to use specific devices to obtain biometric signals and data. These devices in the most of the time are high cost and difficult to use and handling. Therefore, the methodological proposal was elaborate in order to develop, conceptually, a bio telemetric device which could acquire the desirable biometric signals: oxymetry, biometrics, corporal temperature and pedometry which are essential for the area of physical evaluation. It was researched the existent biometrics sensors, the possible ways for the remote transmission of signals and the computer systems available so that the acquisition of data could be possible. This methodological proposal of remote acquisition of biometrical signals is structured in four modules: Acquisitor of biometrics data; Converser and transmitter of biometric signals; Receiver and Processor of biometrics signals and Generator of Interpretative Graphs. The modules aim the obtention of interpretative graphics of human biometric signals. In order to validate this proposal a functional prototype was developed and it is presented in the development of this work.

Análise de desempenho do Criptossistema Fuzzy Vault em aplicações reais

Fornazin, Marcelo
Fonte: Universidade Estadual Paulista (UNESP) Publicador: Universidade Estadual Paulista (UNESP)
Tipo: Dissertação de Mestrado Formato: 90 f. : il. color.
POR
Relevância na Pesquisa
27.37%
Pós-graduação em Ciência da Computação - IBILCE; Biometria trata do reconhecimento de indivíduos baseado em características fisiológicas ou comportamentais, sendo que umas de suas aplicações é autenticação biométrica. A autenticação biométrica tem vantagens com relação às senhas, no entanto, as informações biométricas também precisam ser protegidas. Ao contrário das senhas, a biometria apresenta variabilidade no sinal, isto é, raramente duas representações de uma mesma característica biometria são idênticas, sendo que, os criptossistemas tradicionais não suportam essa propriedade. Para contornar esse problema, criptossistemas biométricos unem biometria e criptografia para encriptar informações biométricas e protegê-las. Fuzzy Vault é uma construção criptográfica que pode ser utilizada na encriptação de características biométricas e atualmente, há propostas de implementação do Fuzzy Vault para impressões digitais, íris, face e assinaturas. O presente estudo implementa o Fuzzy Vault para impressões digitais e analisa seu desempenho em um ambiente de aplicação real e em um cenário de proteção de imagens médicas usando biometria. A proposta de implementação do Fuzzy Vault encripta e desencripta o Fuzzy Vault para impressões digitais realizando o alinhamento da impressão digital. A proteção de imagens médicas encripta imagens médicas com um criptossistema tradicional e encripta a chave criptográfica com a implementação do Fuzzy Vault. Os experimentos apresentaram entre 92% e 97...

Biometrias comportamentais em dispositivos móveis; Behavioral biometrics in mobile devices

Domingos, Nadine dos Santos
Fonte: Universidade do Minho Publicador: Universidade do Minho
Tipo: Trabalho de Conclusão de Curso
Publicado em //2014 POR
Relevância na Pesquisa
37.1%
Dissertação de mestrado integrado em Engenharia e Gestão de Sistemas de Informação; Ao longo dos tempos, tem-se verificado um aumento da utilização de dispositivos móveis tácteis, que proporcionam diversos benefícios e facilidades, como o acesso à internet e contas pessoais. Ou seja, estes já não se destinam unicamente a funcionalidade de comunicação. Uma vez que os dispositivos guardam credenciais e outras informações pessoais e são facilmente roubados ou perdidos, torna-se importante encontrar mecanismos de autenticação mais eficazes que protejam estes dados. Uma técnica que é amplamente utilizada para a autenticação é a inserção de palavras-chave. Contudo esta técnica possui algumas limitações, pois as palavras-chave são fáceis de roubar e é necessário a sua memorização. Desta forma é desejável encontrar soluções que sejam mais fáceis de utilizar e que não provoquem desconforto aos utilizadores, proporcionando até algum tipo de autenticação continua. Neste trabalho propõem-se demonstrar a possibilidade de utilização das biometrias comportamentais na autenticação contínua do utilizador, em dispositivos móveis de ecrã táctil e, de uma forma mais objetiva, que variáveis afetam a sua eficácia.; Through the times...

Embedded System for ECG Biometrics

Matos, André Cigarro; Lourenço, André; Nascimento, José M. P.
Fonte: Instituto Politécnico de Lisboa Publicador: Instituto Politécnico de Lisboa
Tipo: Conferência ou Objeto de Conferência
Publicado em /09/2013 ENG
Relevância na Pesquisa
37.1%
Comunication in Internationa Conference with Peer Review First International Congress on Cardiovasular Technologies - CARDIOTECHNIX, Vilamoura, Portugal, 2013; Biometric recognition has recently emerged as part of applications where the privacy of the information is crucial, as in the health care field. This paper presents an embedded system for individual recognition based on Electrocardiographic (ECG) biometrics. The proposed system implements a real-time state-of-the-art recognition algorithm, which extracts information from the frequency domain, on an architecture based ARM Cortex 4. The system is designed to be free-standing, non-intrusive and easy to use on different environments. Preliminary results show the successful on-the-fly implementation in a embedded platform, enabling its usage on a myriad of operations.

The Application of Hierarchical Clustering Algorithms for Recognition Using Biometrics of the Hand

Sousa, Lúcia; Gama, João
Fonte: International Journal of Advanced Engineering Research and Science (IJAERS) Publicador: International Journal of Advanced Engineering Research and Science (IJAERS)
Tipo: Artigo de Revista Científica
Publicado em /12/2014 ENG
Relevância na Pesquisa
37.37%
In data analysis, the hierarchical clustering algorithms are powerful tools allowing to identify natural clusters, often without any priori information of the data structure, and are quite often used because provide a graphical representation of the resulting partitions, a hierarchy or dendrogram, revealing more information than non-hierarchical algorithms that returns a unique partition. Moreover, it is not necessary specify the number of clusters à priori. Cutting the dendrogram in different levels on the hierarchy produces different partitions and also, the use of different clusters aggregation methods for the same data set can produces different hierarchies and hence different partitions. So, several studies have been concerned with validate the resulting partitions comparing them, for instance, by the analysis of cohesion and separation of their clusters. The work presented here focuses on the problem of choosing the best partition in hierarchical clustering. The procedure to search for the best partition is made in the nested set of partitions, defined by the hierarchy. In traditional approaches each partition is defined by horizontal lines cutting the dendrogram at a determined level. In [3] is proposed an improved method...

A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System

Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum
Fonte: Hindawi Publishing Corporation Publicador: Hindawi Publishing Corporation
Tipo: Artigo de Revista Científica
EN
Relevância na Pesquisa
27.62%
Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.

Comitês de Classificadores para o Reconhecimento Multibiométrico em Dados Biométricos Revogáveis

Pintro, Fernando
Fonte: Universidade Federal do Rio Grande do Norte; BR; UFRN; Programa de Pós-Graduação em Sistemas e Computação; Ciência da Computação Publicador: Universidade Federal do Rio Grande do Norte; BR; UFRN; Programa de Pós-Graduação em Sistemas e Computação; Ciência da Computação
Tipo: Tese de Doutorado Formato: application/pdf
POR
Relevância na Pesquisa
27.51%
This work discusses the application of techniques of ensembles in multimodal recognition systems development in revocable biometrics. Biometric systems are the future identification techniques and user access control and a proof of this is the constant increases of such systems in current society. However, there is still much advancement to be developed, mainly with regard to the accuracy, security and processing time of such systems. In the search for developing more efficient techniques, the multimodal systems and the use of revocable biometrics are promising, and can model many of the problems involved in traditional biometric recognition. A multimodal system is characterized by combining different techniques of biometric security and overcome many limitations, how: failures in the extraction or processing the dataset. Among the various possibilities to develop a multimodal system, the use of ensembles is a subject quite promising, motivated by performance and flexibility that they are demonstrating over the years, in its many applications. Givin emphasis in relation to safety, one of the biggest problems found is that the biometrics is permanently related with the user and the fact of cannot be changed if compromised. However, this problem has been solved by techniques known as revocable biometrics...

A Highly Efficient Biometrics Approach for Unconstrained Iris Segmentation and Recognition

Chen, Yu
Fonte: FIU Digital Commons Publicador: FIU Digital Commons
Tipo: Artigo de Revista Científica Formato: application/pdf
Relevância na Pesquisa
37.45%
This dissertation develops an innovative approach towards less-constrained iris biometrics. Two major contributions are made in this research endeavor: (1) Designed an award-winning segmentation algorithm in the less-constrained environment where image acquisition is made of subjects on the move and taken under visible lighting conditions, and (2) Developed a pioneering iris biometrics method coupling segmentation and recognition of the iris based on video of moving persons under different acquisitions scenarios. The first part of the dissertation introduces a robust and fast segmentation approach using still images contained in the UBIRIS (version 2) noisy iris database. The results show accuracy estimated at 98% when using 500 randomly selected images from the UBIRIS.v2 partial database, and estimated at 97% in a Noisy Iris Challenge Evaluation (NICE.I) in an international competition that involved 97 participants worldwide involving 35 countries, ranking this research group in sixth position. This accuracy is achieved with a processing speed nearing real time. The second part of this dissertation presents an innovative segmentation and recognition approach using video-based iris images. Following the segmentation stage which delineats the iris region through a novel segmentation strategy...

Hardware/software architectures for iris biometrics

Liu Jiménez, Judith
Fonte: Universidade Carlos III de Madrid Publicador: Universidade Carlos III de Madrid
Tipo: info:eu-repo/semantics/doctoralThesis; info:eu-repo/semantics/doctoralThesis Formato: application/pdf
ENG
Relevância na Pesquisa
37.55%
Nowadays, the necessity of identifying users of facilities and services has become quite important not only to determine who accesses a system and/or service, but also to determine which privileges should be provided to each user. For achieving such identification, Biometrics is emerging as a technology that provides a high level of security, as well as being convenient and comfortable for the citizen. Most biometric systems are based on computer solutions, where the identification process is performed by servers or workstations, whose cost and processing time make them not feasible for some situations. However, Microelectronics can provide a suitable solution without the need of complex and expensive computer systems. Microelectronics is a subfield of Electronics and as the name suggests, is related to the study, development and/or manufacturing of electronic components, i.e. integrated circuits (ICs). We have focused our research in a concrete field of Microelectronics: hardware/software co-design. This technique is widely used for developing specific and high computational cost devices. Its basis relies on using both hardware and software solutions in an effective way, thus, obtaining a device faster than just a software solution...

Contribution to the knowledge of hierarchical clustering algorithms and consensus clustering. Studies applied to personal recognition by hands biometrics

Sousa, Lúcia
Fonte: Instituto Politécnico de Viseu Publicador: Instituto Politécnico de Viseu
Tipo: Tese de Doutorado
Publicado em 29/06/2015 ENG
Relevância na Pesquisa
37.26%
In exploratory data analysis, hierarchical clustering algorithms with its features can provide different clusterings when applied to the same data set. In the presence of several clusterings, each one identifying a specific data structure, consensus clustering provide a contribution to deal with this issue. The work reported here is composed by two parts: In the first part, we intend to explore the profile of base hierarchical clusterings, according to their variabilities, to obtain the consensus clustering. As a first result of our researches, we identified the consensus clustering technique as having better performance than the others, depending on the characteristics of hierarchical clusterings used as base. This result allows us to identify a sufficient condition for the existence of consensus clustering, as well as define a new strategy to evaluate the consensus clustering. It also leads to study a new property of hierarchical clustering algorithms. In the second part, we explore a real-world application. In a first analysis, we use data sets derived by biometrics extracted from hands for personal recognition. We show that the hierarchical clusterings obtained by SEP/COP algorithms, can provide results with great accuracy when applied to these data sets. Furthermore...

TOC Biometrics: nuevo sistema de verificación de identidad

Toc S. A.; Universidad de la Frontera; Mabel Guerrero A.
Fonte: Corporação de Fomento da Produção Publicador: Corporação de Fomento da Produção
Tipo: Proyecto
Publicado em 02/09/2010
Relevância na Pesquisa
27.59%
Chile en el último tiempo ha experimentado un importante desarrollo en materias tecnológicas. Este desarrollo se ha traducido en la implementación de una serie de soluciones que han permitido hacer más eficiente entre otros muchos aspectos la forma cómo administrar y gestionar información facilitando esta actividad, logrando con ello importantes aumentos de eficiencia derivados de esta mejora. No obstante los beneficios asociados a la utilización de nuevas tecnologías se han puesto de manifiesto también la necesidad de extremar las medidas de seguridad que permitan evitar el mal uso de la información además de la posibilidad de realización de fraudes por manipulación de la información. Chile no ha estado exento de esta realidad y no es difícil conocer casos de personas afectadas por fraudes asociados a la suplantación de identidad o mal uso de su información personal. Por tanto el desarrollo de sistemas de seguridad y herramientas tecnológicas que permitan frenar la posibilidad de la realización de fraudes se vuelve tarea crítica en la dirección de mejorar las medidas de seguridad en el mercado nacional. Conscientes de esta realidad la empresa TOC Sociedad Anónima desarrolló el sistema de verificación de identidad TOC Biometrics...

Does the centrality of human values in the lisbon treaty promise more than it can actually offer? Biometrics law and policy as a case study

Gonçalves, M. E.; Gameiro, M. I.
Fonte: DINÂMIA'CET Publicador: DINÂMIA'CET
Tipo: Trabalho em Andamento
Publicado em /08/2010
Relevância na Pesquisa
37.26%
DINÂMIA'CET, Agosto de 2010.; The adoption of the Treaty of Lisbon and the granting to the Charter of Fundamental Rights of the same legal force as the Treaty lent a new impulse to the consideration of fundamental human values by the European Union (EU). The question remains, however, of how this legal discourse centred on human values is actually shaping the EU regulatory framework in specific policy domains. The aim of this paper is to critically appraise the ways that certain values rendered explicit through the Charter’s rights and principles are being construed in the context of EU policy and law on biometrics, an ethically and morally sensitive security technology whose development and use are being actively promoted by the EU. We conclude that the interpretation of the pertinent Charter’s rights and principles as well as their balancing owes to a great deal to the goals of EU policies, shaped largely by political and economic considerations. In respect of biometrics, research priorities, combined with those of EU security policy, then tend to prevail over ethically or morally based legal claims.

Secure Biometrics: Concepts, Authentication Architectures and Challenges

Rane, Shantanu; Wang, Ye; Draper, Stark. C.; Ishwar, Prakash
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 21/05/2013
Relevância na Pesquisa
27.45%
BIOMETRICS are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, bio- metrics are fundamentally noisy and irreplaceable. There are always slight variations among the measurements of a given biometric, and, unlike passwords or identification numbers, biometrics are derived from physical characteristics that cannot easily be changed. The proliferation of biometric usage raises critical privacy and security concerns that, due to the noisy nature of biometrics, cannot be addressed using standard cryptographic methods. In this article we present an overview of "secure biometrics", also referred to as "biometric template protection", an emerging class of methods that address these concerns.; Comment: 16 pages, 11 figures, 1 table

SilentSense: Silent User Identification via Dynamics of Touch and Movement Behavioral Biometrics

Bo, Cheng; Zhang, Lan; Li, Xiang-Yang
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 31/08/2013
Relevância na Pesquisa
27.45%
With the increased popularity of smartphones, various security threats and privacy leakages targeting them are discovered and investigated. In this work, we present \ourprotocoltight, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. We build a "touch-based biometrics" model of the owner by extracting some principle features, and then verify whether the current user is the owner or guest/attacker. When using the smartphone, the unique operating dynamics of the user is detected and learnt by collecting the sensor data and touch events silently. When users are mobile, the micro-movement of mobile devices caused by touch is suppressed by that due to the large scale user-movement which will render the touch-based biometrics ineffective. To address this, we integrate a movement-based biometrics for each user with previous touch-based biometrics. We conduct extensive evaluations of our approaches on the Android smartphone, we show that the user identification accuracy is over 99%.

Ear Biometrics Based on Geometrical Feature Extraction

Choraś, Micha
Fonte: Universidade Autônoma de Barcelona Publicador: Universidade Autônoma de Barcelona
Tipo: Artigo de Revista Científica Formato: application/pdf
Publicado em //2005 ENG
Relevância na Pesquisa
37.62%
Biometrics identification methods proved to be very efficient, more natural and easy for users than traditional methods of human identification. In fact, only biometrics methods truly identify humans, not keys and cards they posses or passwords they should remember. The future of biometrics will surely lead to systems based on image analysis as the data acquisition is very simple and requires only cameras, scanners or sensors. More importantly such methods could be passive, which means that the user does not have to take active part in the whole process or, in fact, would not even know that the process of identification takes place. There are many possible data sources for human identification systems, but the physiological biometrics seem to have many advantages over methods based on human behaviour. The most interesting human anatomical parts for such passive, physiological biometrics systems based on images acquired from cameras are face and ear. Both of those methods contain large volume of unique features that allow to distinctively identify many users and will be surely implemented into efficient biometrics systems for many applications. The article introduces to ear biometrics and presents its advantages over face biometrics in passive human identification systems. Then the geometrical method of feature extraction from human ear images in order to perform human identification is presented.

Envisioning technology through discourse: a case study of biometrics in the National Identity Scheme in the United Kingdom

Martin, Aaron K.
Fonte: London School of Economics and Political Science Thesis Publicador: London School of Economics and Political Science Thesis
Tipo: Thesis; NonPeerReviewed Formato: application/pdf
Publicado em /09/2011 EN
Relevância na Pesquisa
27.62%
Around the globe, governments are pursuing policies that depend on information technology (IT). The United Kingdom’s National Identity Scheme was a government proposal for a national identity system, based on biometrics. These proposals for biometrics provide us with an opportunity to explore the diverse and shifting discourses that accompany the attempted diffusion of a controversial IT innovation. This thesis offers a longitudinal case study of these visionary discourses. I begin with a critical review of the literature on biometrics, drawing attention to the lack of in-depth studies that explore the discursive and organizational dynamics accompanying their implementation on a national scale. I then devise a theoretical framework to study these speculative and future-directed discourses based on concepts and ideas from organizing visions theory, the sociology of expectations, and critical approaches to studying the public’s understanding of technology. A methodological discussion ensues in which I explain my research approach and methods for data collection and analysis, including techniques for critical discourse analysis. After briefly introducing the case study, I proceed to the two-part analysis. First is an analysis of government actors’ discourses on biometrics...